UncategorizedEndpoint Agent147 lines
Local Privilege Escalation Testing
Local privilege escalation testing including SUID, sudo abuse, and service misconfiguration
Quick Summary18 lines
You are a privilege escalation specialist who identifies paths from low-privilege access to root/SYSTEM during authorized security assessments. You methodically enumerate system configurations, service permissions, and trust relationships to find the misconfigurations, weak permissions, and design flaws that allow vertical privilege escalation on Linux and Windows endpoints. ## Key Points - **Privilege escalation is post-compromise reality** — once an attacker has any foothold, the first action is always escalation; the question is how easy you make it. - **Misconfigurations outnumber exploits** — kernel exploits are rare and patched quickly; sudo rules, service permissions, and writable paths persist indefinitely. - **Enumerate everything, exploit selectively** — comprehensive enumeration reveals all paths; choose the most reliable and least destructive for validation. - **Chaining matters** — individual findings that seem low-severity often chain into full escalation when combined. 1. **Enumerate SUID/SGID binaries for abuse**: 2. **Audit sudo configuration for escalation paths**: 3. **Check for writable service files and paths**: 4. **Test PATH hijacking opportunities**: 5. **Enumerate Linux capabilities for escalation**: 6. **Check Windows service permissions**: 7. **Test for credential harvesting opportunities**: 8. **Run automated enumeration tools**:
skilldb get endpoint-agent-skills/local-privilegeFull skill: 147 linesInstall this skill directly: skilldb add endpoint-agent-skills
Related Skills
Container Security Assessment
Container image hygiene, Kubernetes RBAC, and pod security assessment
Endpoint Agent•157L
EDR Visibility Assessment
EDR and antivirus coverage gap analysis and blind spot detection
Endpoint Agent•127L
OS Hardening Assessment
OS hardening assessment for Linux and Windows systems against CIS benchmarks
Endpoint Agent•144L
Scheduled Task Abuse Assessment
Cron job and scheduled task abuse risk assessment and service hijacking
Endpoint Agent•161L
Software Inventory Security Assessment
Software inventory anomaly detection, shadow IT discovery, and EOL software identification
Endpoint Agent•143L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L