πCapabilities
π― Overview
Linux capabilities provide fine-grained privileges to processes. Misconfigured capabilities on binaries can be exploited for privilege escalation without requiring SUID bits.
π Enumeration
Find Binaries with Capabilities
# Search all common binary directories
find /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin -type f -exec getcap {} \; 2>/dev/null
# System-wide capability search
getcap -r / 2>/dev/null
# Example output:
# /usr/bin/vim.basic = cap_dac_override+eip
# /usr/bin/ping = cap_net_raw+epπ Dangerous Capabilities
High-Risk Capabilities
Capability
Impact
cap_setuid
Change effective UID to any user (including root)
cap_setgid
Change effective GID to any group
cap_sys_admin
Broad administrative privileges
cap_dac_override
Bypass file read/write/execute permissions
Other Notable Capabilities
π Exploitation Examples
cap_dac_override (File Permission Bypass)
cap_setuid (UID Manipulation)
cap_sys_admin (Administrative Access)
π§ Advanced Exploitation
Non-interactive File Editing
Python/Interpreter Capabilities
π Detection Script
π Quick Reference
Immediate Checks
Emergency Exploitation
Capabilities provide fine-grained privilege control but misconfigured capability assignments can offer direct privilege escalation paths without traditional SUID requirements.
Last updated