Linux Privilege Escalation

by Unknown v1.1

This skill provides comprehensive techniques for identifying and exploiting privilege escalation paths on Linux systems. It enables comprehensive enumeration and exploitation of kernel vulnerabilities, sudo misconfigurations, SUID binaries, cron jobs, capabilities, PATH hijacking, and NFS weaknesses.

The core workflow includes system enumeration, automated enumeration using tools like LinPEAS and LinEnum, kernel exploit identification and execution, sudo exploitation leveraging GTFOBins, SUID binary exploitation, capabilities exploitation, cron job exploitation, PATH hijacking, and NFS exploitation. The skill also provides quick reference guides for enumeration commands and reverse shell one-liners.

What It Does

This skill systematically assesses Linux systems for privilege escalation vulnerabilities, identifies misconfigurations, and exploits weaknesses to gain root-level control.

When To Use

Use this skill when you need to escalate privileges on a Linux system, find privesc vectors, exploit sudo misconfigurations, abuse SUID binaries, exploit cron jobs for root access, or enumerate a Linux system for privilege escalation opportunities.

Installation

Copy SKILL.md to your skills directory

View Universal documentation

Have a Skill to Share?

Join the community and help AI agents learn new capabilities. Submit your skill and reach thousands of developers.