linux-sudo-suid-capabilities

Official

Gain root via Linux privilege escalation.

Authorblacklanternsecurity
Version1.0.0
Installs0

System Documentation

What problem does it solve?

This Skill helps penetration testers escalate privileges on Linux systems by exploiting common misconfigurations in sudo, SUID binaries, and Linux capabilities, ultimately aiming to achieve root access.

Core Features & Use Cases

  • Sudo Exploitation: Leverages NOPASSWD misconfigurations, environment variable abuse (LD_PRELOAD), and known CVEs (e.g., Baron Samedit, PwnKit) to gain elevated privileges.
  • SUID/SGID Binary Abuse: Exploits binaries with the SUID/SGID bits set, using GTFOBins or custom analysis to achieve privilege escalation.
  • Linux Capabilities: Utilizes specific Linux capabilities (e.g., CAP_SETUID, CAP_SYS_ADMIN) to bypass restrictions and gain root.
  • Use Case: During a penetration test, you discover a user can run sudo vim without a password. This Skill guides you to use vim to execute a shell as root.

Quick Start

Attempt to exploit sudo misconfigurations using GTFOBins for privilege escalation.

Dependency Matrix

Required Modules

None required

Components

scriptsreferences

💻 Claude Code Installation

Recommended: Let Claude install automatically. Simply copy and paste the text below to Claude Code.

Please help me install this Skill:
Name: linux-sudo-suid-capabilities
Download link: https://github.com/blacklanternsecurity/red-run/archive/main.zip#linux-sudo-suid-capabilities

Please download this .zip file, extract it, and install it in the .claude/skills/ directory.
View Source Repository

Agent Skills Search Helper

Install a tiny helper to your Agent, search and equip skill from 223,000+ vetted skills library on demand.