June 20, 2023, 11:35 a.m. | Ali AK

InfoSec Write-ups - Medium infosecwriteups.com

Part-4

Check the previous parts of this series HERE

In this part of this series, I’m going to cover 3 more techniques.

10. Privilege Escalation: Cron Jobs (Script full/Absolute Path Not Defined)

Theory

Cron (daemon/service) is used to schedule a Process or task to execute automatically at a specific time or action (same as task scheduler in windows). By default, they run with the privilege of their owners. (Means who set up that particular job). Cron job configurations are stored …

absolute action advanced basic cron ctf cybersecurity daemon defined escalation ethical hacking jobs linux parts path penetration testing privilege privilege escalation privileges privileges escalation process scheduler script series service task task scheduler techniques

Social Engineer For Reverse Engineering Exploit Study

@ Independent study | Remote

Offensive Security Engineer

@ Ivanti | United States, Remote

Senior Security Engineer I

@ Samsara | Remote - US

Senior Principal Information System Security Engineer

@ Chameleon Consulting Group | Herndon, VA

Junior Detections Engineer

@ Kandji | San Francisco

Data Security Engineer/ Architect - Remote United States

@ Stanley Black & Decker | Towson MD USA - 701 E Joppa Rd Bg 700