Privilege Escalation Methods

🌐Community
by sickn33 · vlatest · Repository

This skill details various privilege escalation techniques, crucial for understanding and mitigating potential security vulnerabilities.

Install on your platform

We auto-selected Claude Code based on this skill’s supported platforms.

1

Run in terminal (recommended)

terminal
claude mcp add privilege-escalation-methods npx -- -y @trustedskills/privilege-escalation-methods
2

Or manually add to ~/.claude/settings.json

~/.claude/settings.json
{
  "mcpServers": {
    "privilege-escalation-methods": {
      "command": "npx",
      "args": [
        "-y",
        "@trustedskills/privilege-escalation-methods"
      ]
    }
  }
}

Requires Claude Code (claude CLI). Run claude --version to verify your install.

About This Skill

What it does

This skill provides detailed techniques for escalating privileges on compromised Linux and Windows systems, moving from a low-privileged user to root or administrator access. It focuses on methods used in penetration testing post-exploitation phases and red team operations, covering both Linux and Active Directory environments. The skill details specific exploits of misconfigured binaries, scheduled tasks (cron), and capabilities.

When to use it

  • During a penetration test after initial system compromise to gain higher privileges.
  • In red team exercises to simulate advanced persistent threat (APT) activities.
  • To understand potential vulnerabilities in systems with existing low-privilege access.
  • When investigating suspicious activity or unauthorized access on a system.

Key capabilities

  • Linux Privilege Escalation: Exploiting sudo binaries, abusing scheduled tasks (cron), and leveraging file capabilities.
  • GTFOBins exploitation: Provides examples of using common Linux binaries to escalate privileges.
  • Active Directory Attacks: Offers techniques for domain compromise when appropriate prerequisites are met.
  • Tool Integration: Requires tools like Mimikatz, PowerView, Responder, Impacket, and Rubeus (though the skill itself doesn't directly use them).

Example prompts

  • "Show me examples of how to escalate privileges on Linux using sudo binaries."
  • "What are some techniques for abusing cron jobs to gain root access?"
  • "Describe methods for privilege escalation in an Active Directory environment."
  • “Explain how I can use file capabilities to elevate my privileges.”

Tips & gotchas

  • Prerequisites: This skill requires initial low-privilege shell access on a target system and familiarity with Linux/Windows privilege models.
  • Tool Dependency: While the skill describes techniques, it relies on external tools like Mimikatz and PowerView for execution; these are not included within the skill itself.
  • Environment Specificity: The effectiveness of these methods depends heavily on the specific system configuration and installed software.

Tags

🛡️

TrustedSkills Verification

Unlike other registries that point to live repositories, TrustedSkills pins every skill to a verified commit hash. This protects you from malicious updates — what you install today is exactly what was reviewed and verified.

Security Audits

Gen Agent Trust HubPass
SocketPass
SnykPass

Details

Version
vlatest
License
Author
sickn33
Installs
170

🌐 Community

Passed automated security scans.