Privilege Escalation Methods

by Unknown v1.1

This skill provides a detailed guide to escalating privileges from a low-privileged user to root/administrator access on compromised Linux and Windows systems. It covers a wide array of techniques, from abusing Sudo binaries and scheduled tasks on Linux to token impersonation and service abuse on Windows. It also includes methods for Active Directory attacks such as Kerberoasting and Golden Ticket creation.

Designed for penetration testers, red team operators, and security professionals, this skill is essential for the post-exploitation phase of security assessments. It equips users with the knowledge and tools necessary to identify and exploit vulnerabilities that lead to privilege escalation, enabling them to gain deeper access to target systems and networks. It also provides guidance on credential harvesting and maintaining persistence.

What It Does

Provides techniques to elevate privileges from a low-privileged user to root/administrator on compromised Linux and Windows systems, including Active Directory environments.

When To Use

When you have initial low-privilege shell access on a target system and need to gain higher privileges for further exploitation or access to sensitive data.

Installation

Copy SKILL.md to your skills directory

View Universal documentation

Have a Skill to Share?

Join the community and help AI agents learn new capabilities. Submit your skill and reach thousands of developers.