📄️ Path Abuse
Path abuse occurs when a misconfigured $PATH environment variable or unquoted paths in scripts/services allow an attacker to execute unintended binaries with elevated privileges.
📄️ Permissions Abuse
SUID Permissions
📄️ Cron Job Abuse
Cron jobs run scheduled tasks, often as root. Misconfigured or writable cron jobs can be abused to gain elevated privileges.
📄️ Containers
LXD Privilege Escalation
📄️ LD_Preload Abuse
LD_PRELOAD is an environment variable in Linux that allows users to load shared libraries before others when running a program.
📄️ Shared Object Hijacking
Shared Object Hijacking is an attack where malicious shared libraries are injected into programs that load shared libraries from non-standard locations.
📄️ Python Library Hijacking
Python Library Hijacking is an attack where a malicious actor tricks Python into loading a rogue library instead of the intended one, leading to unauthorized code execution. This can happen due to misconfigured import paths, dependency confusion, or poisoned PyPI packages.