privilege-escalation-methods
Execute Privilege Escalation Techniques
Security professionals need reliable reference material for authorized penetration testing. This skill provides documented escalation techniques for Linux and Windows environments with proper context and prerequisites.
Télécharger le ZIP du skill
Importer dans Claude
Allez dans Paramètres → Capacités → Skills → Importer un skill
Activez et commencez à utiliser
Tester
Utilisation de "privilege-escalation-methods". Enumerate sudo permissions on compromised Linux host
Résultat attendu:
- Run: sudo -l
- Review listed commands that can be executed without password
- Cross-reference with GTFOBins for exploitation techniques
- Example output shows: (root) NOPASSWD: /usr/bin/vim
- Exploitation: sudo vim -c ':!/bin/bash' spawns root shell
Utilisation de "privilege-escalation-methods". Request Kerberoastable service tickets in Active Directory
Résultat attendu:
- Run: GetUserSPNs.py domain.local/user:pass -dc-ip 10.10.10.1 -request
- Tool requests TGS tickets for accounts with SPNs set
- Output contains NTLM hashes suitable for offline cracking
- Crack with: hashcat -m 13100 hashes.txt wordlist.txt
- Successful crack reveals service account plaintext password
Audit de sécurité
Risque élevéThis skill documents offensive security techniques for authorized penetration testing. Static analysis detected 125 patterns including shell execution, credential harvesting, and privilege escalation commands. All findings are TRUE POSITIVES representing documented attack techniques. The skill is educational reference material but contains actionable exploit instructions that require careful handling. Recommended for security professionals only with appropriate warnings.
Problèmes critiques (2)
Problèmes à risque élevé (3)
Problèmes à risque moyen (3)
Problèmes à risque faible (1)
Facteurs de risque
⚙️ Commandes externes (5)
🌐 Accès réseau (4)
📁 Accès au système de fichiers (3)
Motifs détectés
Score de qualité
Ce que vous pouvez construire
Penetration Tester Post-Exploitation
Security consultant with initial foothold needs to demonstrate privilege escalation risks to client
Red Team Domain Compromise
Red team operator needs reference for Active Directory attack chains during engagement
Security Research Education
Defensive security researcher studying attack techniques to improve detection capabilities
Essayez ces prompts
I have a low-privilege shell on a Linux target. Show me enumeration commands to identify potential privilege escalation vectors including sudo permissions, SUID binaries, and writable cron jobs.
I found that my user can run vim as root without a password. Provide the GTFOBins technique to escalate to root using this misconfiguration.
I have domain user credentials and need to identify service accounts vulnerable to Kerberoasting. Show me the Impacket and Rubeus commands to request and crack service tickets.
I have SeImpersonatePrivilege on a Windows host. Explain how to use SweetPotato or SharpImpersonation to escalate to SYSTEM level access.
Bonnes pratiques
- Always obtain written authorization before testing on any system you do not own
- Document all exploitation steps and clean up artifacts after engagement completion
- Use isolated lab environments for learning and testing these techniques
Éviter
- Never attempt privilege escalation on production systems without explicit client approval
- Do not leave persistence mechanisms or backdoors without documented authorization
- Avoid running automated tools without understanding their impact on target systems
Foire aux questions
Is this skill legal to use?
Do I need special tools for these techniques?
Why are some techniques marked as domain-required?
What if sudo -l requires a password?
How do I know which technique will work?
Should I use these techniques in bug bounty programs?
Détails du développeur
Auteur
sickn33Licence
MIT
Dépôt
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/privilege-escalation-methodsRéf
main
Structure de fichiers
📄 SKILL.md