Privilege Escalation Methods

This skill should be used when the user asks to "escalate privileges", "get root access", "become administrator", "privesc techniques", "abuse sudo", "exploit SUID binaries", "Kerberoasting", "pass-the-ticket", "token impersonation", or needs guidance on post-exploitation privilege escalation for Linux or Windows systems.

Author

zebbern

Category

Other Tools

Install

Hot:5

Download and extract to your skills directory

Copy command and send to OpenClaw for auto-install:

Download and install this skill https://openskills.cc/api/download?slug=sickn33-skills-privilege-escalation-methods&locale=en&source=copy

Privilege Escalation Methods - A Penetration Testing Permission Escalation Guide

Skills Overview

Privilege Escalation Methods is a permission-escalation techniques guide for penetration testers and security researchers. It provides a complete escalation method library for moving from low-privilege users to root/administrators, covering local privilege escalation for Linux and Windows systems, attacks in Active Directory domain environments, and credential-harvesting techniques—only for legally authorized security testing scenarios.

Applicable Scenarios

1. Post-Exploitation Phase in Penetration Testing

After a security tester gains initial access and a low-privilege shell, they need to obtain higher privileges through privilege escalation techniques to achieve testing objectives. This skill offers systematic escalation methods, including Linux techniques such as SUID abuse, exploiting misconfigured Sudo settings, and Cron job hijacking, as well as Windows techniques such as token forgery, service permission abuse, and privilege exploitation. It helps testers quickly evaluate security risks in how system privileges are managed.

2. Red Team Exercises and Internal Network Penetration

In red-team exercises that simulate real attacks, the attacking team must use legitimate escalation techniques to model the attacker’s behavior path. This skill covers advanced attack techniques in Active Directory environments, such as Kerberoasting, AS-REP Roasting, Golden Ticket, Pass-the-Ticket, and other domain privilege escalation methods, as well as credential-collection techniques like LLMNR poisoning and NTLM relay. It enables red teams to comprehensively assess an organization’s internal security defenses under authorized conditions.

3. Security Research and Defense Building

Security researchers and enterprise defense teams need to understand the privilege escalation techniques attackers use in order to design effective defense strategies. This skill demonstrates in detail the principles behind various privilege escalation attacks, the exploitation conditions, and detection methods. Researchers can learn these techniques to develop automated detection tools (e.g., LinPEAS, WinPEAS, BloodHound), while defense teams can use this knowledge to configure security policies, harden system configurations, and deploy monitoring and alerts—thereby improving an organization’s overall security posture.

Core Features

1. Linux Privilege Escalation Techniques Library

Provides a comprehensive set of Linux privilege escalation methods, including abuse of GTFOBins binaries (such as vim, find, python, perl, and other exploitation approaches), Cron scheduled task hijacking, abuse of Linux capabilities, exploitation of the NFS no_root_squash vulnerability, and privilege escalation of database services running as root. Each technique includes concrete command examples and exploitation conditions, helping testers quickly identify viable escalation paths and execute the corresponding attack code.

2. Windows and Active Directory Attacks

Includes a complete technology stack for local privilege escalation and AD domain penetration on Windows. Local escalation covers token forgery (SweetPotato, SharpImpersonation), service permission abuse (PowerUp), privilege exploitation (SeBackupPrivilege, SeLoadDriverPrivilege), GPO abuse, and more. Domain attacks include extracting Kerberos service account hashes via Kerberoasting, AS-REP Roasting, forging Golden Ticket tickets, Pass-the-Ticket ticket relay/usage, exporting DCSync credentials, and more. It supports using mainstream tools such as Mimikatz, Rubeus, and Impacket.

3. Credential Harvesting and Persistent Access

Integrates multiple techniques for credential collection and maintaining access, including LLMNR/NetBIOS name resolution poisoning (Responder), NTLM relay attacks (ntlmrelayx), and obtaining credentials by copying sensitive files from VSS volume shadow copies. It also provides persistence mechanisms such as creating scheduled tasks, installing services, and modifying the registry. The skill includes quick-reference tables to help testers select appropriate tools and techniques based on the target environment (Linux/Windows) and whether domain access privileges are required.

Common Questions

What is privilege escalation, and why is it needed in penetration testing?

Privilege escalation (Privilege Escalation) refers to the process by which an attacker or security tester obtains higher privileges (such as Linux root or Windows Administrator) from a low-privilege user account. In penetration testing, privilege escalation is a core step in the post-exploitation phase. Initial compromise usually only grants ordinary user privileges, while many sensitive operations (such as reading system configuration, installing backdoors, and exporting credential databases) require higher privileges to perform. With systematic privilege escalation techniques, testers can thoroughly assess privilege-management weaknesses and help organizations discover and fix security risks.

How can I quickly detect privilege escalation vulnerabilities on a Linux system?

The most effective approach is to use automated enumeration tools such as LinPEAS, which can comprehensively check common escalation vectors like system configuration, SUID files, Sudo permissions, Cron jobs, Capabilities, and NFS shares. For manual detection, you can start with a few key steps: a) nothing.

Wait, the user text seems continue.