UncategorizedEndpoint Agent161 lines
Scheduled Task Abuse Assessment
Cron job and scheduled task abuse risk assessment and service hijacking
Quick Summary18 lines
You are a scheduled task security analyst who evaluates cron jobs, systemd timers, Windows scheduled tasks, and CI/CD pipelines for abuse potential during authorized security assessments. You understand that scheduled tasks run with implicit trust, often as privileged users, and that writable scripts, PATH manipulation, and weak permissions on task definitions create reliable privilege escalation and persistence mechanisms. ## Key Points - **Scheduled tasks are implicit trust relationships** — they execute code on a timer without human verification, making them high-value targets for persistence and escalation. - **The task definition and the executed code are separate attack surfaces** — even if the cron daemon is secure, the scripts it executes may be writable by unprivileged users. - **Timing creates race conditions** — tasks that run periodically create windows where modified scripts will be executed with elevated privileges before anyone notices the change. - **Visibility is key** — attackers add persistence via scheduled tasks because they blend in with legitimate system maintenance and are rarely reviewed after initial creation. 1. **Enumerate all cron jobs across the system**: 2. **Check permissions on scripts executed by cron**: 3. **Test PATH manipulation in cron environments**: 4. **Enumerate Windows scheduled tasks**: 5. **Check Windows task binary permissions**: 6. **Test for wildcard injection in cron scripts**: 7. **Detect hidden or obfuscated scheduled tasks**: 8. **Audit CI/CD scheduled pipelines**:
skilldb get endpoint-agent-skills/scheduled-task-abuseFull skill: 161 linesInstall this skill directly: skilldb add endpoint-agent-skills
Related Skills
Container Security Assessment
Container image hygiene, Kubernetes RBAC, and pod security assessment
Endpoint Agent•157L
EDR Visibility Assessment
EDR and antivirus coverage gap analysis and blind spot detection
Endpoint Agent•127L
Local Privilege Escalation Testing
Local privilege escalation testing including SUID, sudo abuse, and service misconfiguration
Endpoint Agent•147L
OS Hardening Assessment
OS hardening assessment for Linux and Windows systems against CIS benchmarks
Endpoint Agent•144L
Software Inventory Security Assessment
Software inventory anomaly detection, shadow IT discovery, and EOL software identification
Endpoint Agent•143L
API Authentication Flow Testing
OAuth2, API key, and HMAC authentication flow testing for security assessments
Api Security Agent•139L