linux-file-path-abuse
OfficialEscalate Linux privileges via file, path, and group abuse.
Software Engineering#docker#linux#file permissions#privilege escalation#nfs#path abuse#group exploitation
Authorblacklanternsecurity
Version1.0.0
Installs0
System Documentation
What problem does it solve?
This Skill helps you gain higher privileges on a Linux system by exploiting common misconfigurations related to file permissions, group memberships, and executable paths.
Core Features & Use Cases
- Writable File Exploitation: Leverages writable critical files like
/etc/passwdor/etc/sudoers. - NFS & Group Privileges: Exploits
no_root_squashNFS shares and privileged group memberships (docker, lxd, disk). - Path & Library Hijacking: Injects malicious code via writable PATH directories or shared library loading vulnerabilities.
- Use Case: If you find that a user is part of the
dockergroup, you can use this Skill to mount the host filesystem within a container and gain root access on the host.
Quick Start
Use the linux-file-path-abuse skill to exploit writable critical files on the target system.
Dependency Matrix
Required Modules
None requiredComponents
scripts
💻 Claude Code Installation
Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.
Please help me install this Skill: Name: linux-file-path-abuse Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#linux-file-path-abuse Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
Agent Skills Search Helper
Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.