Capabilities abuse
Understanding Linux Capabilities
What Makes Capabilities Dangerous
Capabilities Discovery and Enumeration
Finding Capabilities on Files
# Find all files with capabilities set
getcap -r / 2>/dev/null
# Find capabilities in common directories
getcap -r /usr/bin /usr/sbin /bin /sbin 2>/dev/null
# Find capabilities in user directories
getcap -r /home /tmp /var/tmp 2>/dev/null
# Check specific binary for capabilities
getcap /path/to/binaryHigh-Value Capability Exploits
CAP_SETUID - Direct Root Access
CAP_SETGID - Group-Based Escalation
CAP_DAC_OVERRIDE - File System Bypass
CAP_FOWNER - File Ownership Manipulation
CAP_CHOWN - Ownership Changes
CAP_SYS_ADMIN - System Administration Access
Interpreter-Specific Exploits
Python Capabilities
Node.js Capabilities
Perl Capabilities
Binary-Specific Capability Abuse
tar with Capabilities
gdb with CAP_SYS_PTRACE
Capability-Based File Operations
Reading Sensitive Files
Writing Critical System Files
Container Escape via Capabilities
Container Capability Abuse
Capability Exploitation Strategies
Prioritizing Capability Targets
Key Operational Considerations
Success Indicators
Common Failure Points
Exploitation Notes
Last updated
Was this helpful?