⏰Cron Job Abuse

🎯 Overview

Misconfigured cron jobs running as root with writable scripts provide privilege escalation opportunities through script modification and command injection.

πŸ” Cron Job Enumeration

Find Cron Jobs

# System cron jobs
cat /etc/crontab
ls -la /etc/cron.d/
ls -la /etc/cron.daily/
ls -la /etc/cron.hourly/
ls -la /etc/cron.weekly/
ls -la /etc/cron.monthly/

# User cron jobs
crontab -l
ls -la /var/spool/cron/crontabs/

Find Writable Scripts

πŸ•΅οΈ Process Monitoring with pspy

Install and Run pspy

Identify Cron Patterns

🎯 Exploitation Techniques

Script Modification

Timing Analysis

πŸš€ Common Payloads

Reverse Shell

Privilege Escalation

File Extraction

πŸ”§ Advanced Techniques

Stealth Modifications

Conditional Payloads

πŸ“‹ Detection Script

πŸ”‘ Quick Reference

Immediate Checks

Emergency Exploitation

Timing Patterns


Cron job abuse exploits automated administrative tasks - writable scripts executed as root provide direct privilege escalation through command injection and script modification.

Last updated