🎭Capabilities

🎯 Overview

Linux capabilities provide fine-grained privileges to processes. Misconfigured capabilities on binaries can be exploited for privilege escalation without requiring SUID bits.

πŸ” Enumeration

Find Binaries with Capabilities

# Search all common binary directories
find /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin -type f -exec getcap {} \; 2>/dev/null

# System-wide capability search
getcap -r / 2>/dev/null

# Example output:
# /usr/bin/vim.basic = cap_dac_override+eip
# /usr/bin/ping = cap_net_raw+ep

πŸ”‘ Dangerous Capabilities

High-Risk Capabilities

Capability
Impact

cap_setuid

Change effective UID to any user (including root)

cap_setgid

Change effective GID to any group

cap_sys_admin

Broad administrative privileges

cap_dac_override

Bypass file read/write/execute permissions

Other Notable Capabilities

πŸš€ Exploitation Examples

cap_dac_override (File Permission Bypass)

cap_setuid (UID Manipulation)

cap_sys_admin (Administrative Access)

πŸ”§ Advanced Exploitation

Non-interactive File Editing

Python/Interpreter Capabilities

πŸ” Detection Script

πŸ”‘ Quick Reference

Immediate Checks

Emergency Exploitation


Capabilities provide fine-grained privilege control but misconfigured capability assignments can offer direct privilege escalation paths without traditional SUID requirements.

Last updated