March 3, 2023, 1:19 p.m. | Ali AK

System Weakness - Medium systemweakness.com

Part-4

Check the previous parts of this series HERE

In this part of this series, I’m going to cover 3 more techniques.

10. Privilege Escalation: Cron Jobs (Script full/Absolute Path Not Defined)

Theory

Cron (daemon/service) is used to schedule a Process or task to execute automatically at a specific time or action (same as task scheduler in windows). By default, they run with the privilege of their owners. (Means who set up that particular job). Cron job configurations are stored …

absolute action advanced basic cron ctf cybersecurity daemon defined escalation ethical hacking job jobs linux path penetration testing privilege privilege escalation privileges privileges escalation process run scheduler script series service task task scheduler techniques windows

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)