privilege-escalation-methods
Execute Privilege Escalation Techniques
Security professionals need reliable reference material for authorized penetration testing. This skill provides documented escalation techniques for Linux and Windows environments with proper context and prerequisites.
下載技能 ZIP
在 Claude 中上傳
前往 設定 → 功能 → 技能 → 上傳技能
開啟並開始使用
測試它
正在使用「privilege-escalation-methods」。 Enumerate sudo permissions on compromised Linux host
預期結果:
- Run: sudo -l
- Review listed commands that can be executed without password
- Cross-reference with GTFOBins for exploitation techniques
- Example output shows: (root) NOPASSWD: /usr/bin/vim
- Exploitation: sudo vim -c ':!/bin/bash' spawns root shell
正在使用「privilege-escalation-methods」。 Request Kerberoastable service tickets in Active Directory
預期結果:
- Run: GetUserSPNs.py domain.local/user:pass -dc-ip 10.10.10.1 -request
- Tool requests TGS tickets for accounts with SPNs set
- Output contains NTLM hashes suitable for offline cracking
- Crack with: hashcat -m 13100 hashes.txt wordlist.txt
- Successful crack reveals service account plaintext password
安全審計
高風險This skill documents offensive security techniques for authorized penetration testing. Static analysis detected 125 patterns including shell execution, credential harvesting, and privilege escalation commands. All findings are TRUE POSITIVES representing documented attack techniques. The skill is educational reference material but contains actionable exploit instructions that require careful handling. Recommended for security professionals only with appropriate warnings.
嚴重問題 (2)
高風險問題 (3)
中風險問題 (3)
低風險問題 (1)
風險因素
📁 檔案系統存取 (3)
偵測到的模式
品質評分
你能建構什麼
Penetration Tester Post-Exploitation
Security consultant with initial foothold needs to demonstrate privilege escalation risks to client
Red Team Domain Compromise
Red team operator needs reference for Active Directory attack chains during engagement
Security Research Education
Defensive security researcher studying attack techniques to improve detection capabilities
試試這些提示
I have a low-privilege shell on a Linux target. Show me enumeration commands to identify potential privilege escalation vectors including sudo permissions, SUID binaries, and writable cron jobs.
I found that my user can run vim as root without a password. Provide the GTFOBins technique to escalate to root using this misconfiguration.
I have domain user credentials and need to identify service accounts vulnerable to Kerberoasting. Show me the Impacket and Rubeus commands to request and crack service tickets.
I have SeImpersonatePrivilege on a Windows host. Explain how to use SweetPotato or SharpImpersonation to escalate to SYSTEM level access.
最佳實務
- Always obtain written authorization before testing on any system you do not own
- Document all exploitation steps and clean up artifacts after engagement completion
- Use isolated lab environments for learning and testing these techniques
避免
- Never attempt privilege escalation on production systems without explicit client approval
- Do not leave persistence mechanisms or backdoors without documented authorization
- Avoid running automated tools without understanding their impact on target systems
常見問題
Is this skill legal to use?
Do I need special tools for these techniques?
Why are some techniques marked as domain-required?
What if sudo -l requires a password?
How do I know which technique will work?
Should I use these techniques in bug bounty programs?
開發者詳情
作者
sickn33授權
MIT
儲存庫
https://github.com/sickn33/antigravity-awesome-skills/tree/main/skills/privilege-escalation-methods引用
main
檔案結構
📄 SKILL.md