Writable files and directories abuse

Understanding Writable Files and Directories Exploitation

What Makes Writable Files Dangerous

Writable files and directories can be exploited when they contain configuration data, scripts, or other resources that privileged processes read or execute. By modifying these files, attackers can alter system behavior, inject malicious code, or escalate privileges through legitimate system processes that trust the modified content.

The Attack Principle: Exploit scenarios where:

  • Configuration files control privileged process behavior

  • Log files are processed by automated systems

  • Startup scripts and service configurations can be modified

  • Shared directories allow file replacement or injection

  • Backup files contain sensitive information or can be manipulated

Why This Works: Many services and applications read configuration files, process logs, or execute scripts with elevated privileges. If these files are writable by unprivileged users, malicious modifications can lead to privilege escalation.

Writable Files Discovery and Enumeration

Finding Writable Files and Directories

Basic Writable Discovery:

# Find world-writable files
find / -type f -perm -002 2>/dev/null

# Find world-writable directories
find / -type d -perm -002 2>/dev/null

# Find files writable by current user
find / -type f -writable 2>/dev/null

# Find directories writable by current user
find / -type d -writable 2>/dev/null

Group-Writable Discovery:

Focused Writable Search:

High-Value Writable File Targets

Configuration File Abuse

System Configuration Files:

Application Configuration Exploitation:

Service Configuration Abuse

Systemd Service Modification:

Init Script Modification:

Log File Abuse

Log Injection and Processing:

Log Rotation Exploitation:

Application-Specific File Abuse

Web Application Files

Web Root Modification:

SSH Configuration Abuse

SSH Config Modification:

Shared Directory Exploitation

Shared Application Directories

Application Data Directory Abuse:

Backup and Archive Abuse

Backup File Manipulation

Backup Directory Exploitation:

Real-World Exploitation Examples

Example 1: Writable Systemd Service Directory

Discovery:

Exploitation:

Example 2: Writable Log Directory

Discovery:

Exploitation:

Example 3: Writable Web Configuration

Discovery:

Exploitation:

Key Operational Considerations

Success Indicators

  • Writable configuration files discovered in critical directories

  • Service configurations successfully modified

  • Log processing systems accepting malicious input

  • Privilege escalation achieved through file modification

Common Failure Points

  • Proper file permissions preventing write access

  • File integrity monitoring detecting modifications

  • Service validation rejecting malformed configurations

  • Automated restoration reverting file changes

Exploitation Notes

  • Development environments often have relaxed file permissions

  • Custom applications may create writable config files

  • Backup directories frequently overlooked in permission audits

  • Log directories sometimes writable for application convenience

Writable files and directories abuse is particularly effective in environments where file permissions are not strictly controlled, offering multiple paths to privilege escalation and persistence.

Last updated

Was this helpful?