Linux Privilege Escalation

This skill should be used when the user asks to "escalate privileges on Linux", "find privesc vectors on Linux systems", "exploit sudo misconfigurations", "abuse SUID binaries", "exploit cron jobs for root access", "enumerate Linux systems for privilege escalation", or "gain root access from low-privilege shell". It provides comprehensive techniques for identifying and exploiting privilege escalation paths on Linux systems.

Author

zebbern

Category

Other Tools

Install

Hot:15

Download and extract to your skills directory

Copy command and send to OpenClaw for auto-install:

Download and install this skill https://openskills.cc/api/download?slug=sickn33-skills-linux-privilege-escalation&locale=en&source=copy

Linux Privilege Escalation - Linux System Privilege Escalation Assessment Skills

Skill Overview


Linux Privilege Escalation is a specialized automated skill for assessing privilege escalation on Linux systems. It helps penetration testers and security researchers perform an end-to-end detection and exploitation workflow to elevate privileges from a low-privilege user up to the root level.

Use Cases

1. Penetration Testing and Red Team Operations


After obtaining a low-privilege shell on a target Linux system, this skill helps systematically enumerate all possible privilege escalation vectors—such as kernel vulnerabilities, misconfigured Sudo settings, SUID binaries, Cron jobs, and more—quickly building a complete privilege escalation path map.

2. CTF Competitions and Security Challenges


In Capture The Flag (CTF) competitions, this skill provides a structured Linux privilege escalation methodology. It covers the full chain from information gathering to vulnerability exploitation, helping participants quickly locate and exploit hidden privilege escalation vulnerabilities.

3. System Security Assessments


System administrators and security auditors can use this skill to proactively detect potential privilege escalation risks on Linux servers, including enumerating SUID files, checking Sudo permission configurations, reviewing Cron jobs, and more—so issues can be found and fixed before attackers exploit them.

Core Features

1. Comprehensive System Enumeration and Information Gathering


This skill integrates multiple automated tools, including LinPEAS, LinEnum, and Linux Smart Enumeration, enabling a thorough scan of the target system and collection of critical information:
  • Kernel version and architecture information for vulnerability matching

  • User, group, and permission enumeration

  • Discovery of SUID/SGID files

  • Checking Sudo permission configurations

  • Enumerating Cron jobs and systemd timers

  • Identifying Linux Capabilities

  • Analyzing network connections and listening services

  • Checking environment variables and PATH settings
  • 2. Coverage of Multiple Privilege Escalation Techniques


    Supports a wide range of privilege escalation techniques, from basic to advanced:

    Kernel Exploitation

  • Automatically identifies the kernel version and matches known CVEs

  • Supports classic vulnerabilities such as Dirty COW and Dirty Pipe

  • Provides integrated support for Linux Exploit Suggester
  • Sudo Misconfiguration Abuse

  • Integrated GTFOBins reference set

  • LD_PRELOAD hijacking techniques

  • Environment variable preservation exploitation
  • SUID Binary Exploitation

  • Privilege escalation techniques for common SUID programs

  • File read/write exploitation methods

  • Works with John the Ripper for password cracking
  • Other Techniques

  • Cron job hijacking

  • PATH environment variable hijacking

  • Abuse of Linux Capabilities

  • NFS no_root_squash bypass
  • 3. Interactive Privilege Escalation Workflow Guidance


    This skill is not just a collection of tools—it also provides a clear step-by-step privilege escalation process:
  • Basic information gathering (system, user, network)

  • Deploy automated enumeration tools

  • Manual validation and in-depth analysis

  • Exploit the vulnerability and elevate privileges

  • Validate results and document findings
  • For each technique, specific command examples and troubleshooting guides are provided to ensure users understand the underlying principles and can apply them flexibly across different environments.

    Frequently Asked Questions

    What Is Linux Privilege Escalation?


    Linux Privilege Escalation refers to the process in which an attacker or tester elevates privileges on a Linux system from a low-privilege user (such as a regular user like www-data or user) to root or another high-privilege user. Privilege escalation is a critical phase in penetration testing—once root access is obtained, the attacker can fully control the system. Common privilege escalation paths include: exploiting kernel vulnerabilities, abusing misconfigured Sudo settings, exploiting SUID binaries, hijacking Cron jobs, and more.

    How Do You Detect Privilege Escalation Vulnerabilities on a Linux System?


    Detecting Linux privilege escalation vulnerabilities typically combines automated tools with manual checks:

  • Use automated enumeration scripts: Deploy scripts like LinPEAS, LinEnum, or Linux Smart Enumeration. These tools automatically scan the system and flag suspicious configurations.

  • Check the kernel version: Use uname -a to get the kernel version, then use Linux Exploit Suggester or searchsploit to find matching vulnerabilities.

  • Enumerate Sudo permissions: Run sudo -l to view the current user’s Sudo permission configuration.

  • Find SUID files: Execute find / -perm -u=s -type f 2>/dev/null to discover all SUID binaries.

  • Review scheduled tasks: Check task scripts and permissions in /etc/crontab and the /etc/cron.* directories.
  • What’s the Difference Between LinPEAS and LinEnum?


    LinPEAS and LinEnum are both commonly used tools for Linux privilege escalation enumeration, but they differ in their characteristics:

    LinPEAS (Linux Privilege Escalation Awesome Script)

  • Broader enumeration coverage with more fine-grained checks

  • Color-coded output that highlights potential issues

  • Supports silent mode and multiple output formats

  • Maintained by the PEASS-ng project with active updates
  • LinEnum

  • Lightweight with fast execution

  • Concise output, suitable for quick scanning

  • Supports configuring scan depth and specific checks
  • It’s recommended to use LinPEAS for deep enumeration, or use both together for cross-validation of results.