linux-cron-service-abuse

Official

Escalate privileges via cron, services, and D-Bus.

Authorblacklanternsecurity
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill helps you gain higher privileges on a Linux system by exploiting misconfigurations in scheduled tasks, system services, and inter-process communication mechanisms.

Core Features & Use Cases

  • Cron Job Exploitation: Leverages writable scripts, PATH manipulation, and wildcard injection in cron jobs.
  • Systemd Service Abuse: Modifies or replaces systemd service files and binaries for privilege escalation.
  • D-Bus Exploitation: Exploits vulnerable D-Bus services and PolicyKit flaws (like PwnKit).
  • Unix Socket Abuse: Leverages writable Unix sockets, including the Docker socket, for elevated access.
  • Use Case: A penetration tester finds a cron job running as root that executes a script they can write to. They modify the script to create a SUID binary of bash, allowing them to gain a root shell.

Quick Start

Use the linux-cron-service-abuse skill to enumerate cron jobs and systemd timers on the target system.

Dependency Matrix

Required Modules

None required

Components

scriptsreferences

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: linux-cron-service-abuse
Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#linux-cron-service-abuse

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.