ExploitWorks/TaskThief

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

VersionLicensePlatformBash

Advanced Security Testing Tool for Scheduled Tasks

TaskThief is a sophisticated security tool for active testing of scheduled tasks and cron jobs on Linux systems. It helps identify and evaluate misconfigurations in task schedulers that could lead to privilege escalation or persistent backdoors.

πŸ” Discover β†’ πŸ›‘οΈ Analyze β†’ πŸ§ͺ Test β†’ πŸ“Š Report
FeatureDescription
πŸ” Enhanced DiscoverySystematically detects all scheduled tasks, including hidden ones in udev rules, systemd units, and more
πŸ›‘οΈ Configuration AnalysisEvaluates settings against security best practices to identify potential vulnerabilities
πŸ§ͺ Simulated AttacksPerforms controlled modifications to test for privilege escalation vectors
πŸ“Š Comprehensive ReportingGenerates detailed HTML and text reports with actionable recommendations
πŸ“ Advanced LoggingConfigurable logging levels with enhanced backup and restore mechanisms
πŸ” Smart Privilege HandlingIntelligently manages root access requirements for operations
🧩 Modular ArchitectureEasily extensible with additional modules for other schedulers
⌨️ CLI SupportRun specific operations directly from the command line
  • Bash 4.0 or higher
  • Linux operating system
  • Root privileges for full functionality (can be provided via sudo)
# Clone the repository
git clone https://.com/reschjonas/TaskThief.git

# Navigate to the directory
cd TaskThief

# Make the script executable
chmod +x taskthief.sh

# Run TaskThief
./taskthief.sh
πŸ” Automatic Discovery [Requires Root]
β€’ Identifies cron jobs, systemd timers, AT jobs, and anacron jobs
β€’ Discovers hidden scheduled tasks like udev rules, startup scripts, and more
β€’ Gathers detailed information about each scheduled task
πŸ›‘οΈ Configuration Analysis [Requires Root]
β€’ Analyzes cron jobs and systemd timers for security issues
β€’ Checks for permission problems in configuration files
β€’ Identifies weak configurations that could be exploited
πŸ§ͺ Task Manipulation [Requires Root]
β€’ Tests cron job hijacking by attempting controlled modifications
β€’ Tests systemd timer manipulation to identify privilege escalation vectors
β€’ Demonstrates how an attacker might create persistent backdoors
πŸ“Š Reporting
β€’ Generates comprehensive HTML or text reports
β€’ Provides detailed findings and recommendations
β€’ Exports results for documentation purposes
./taskthief.sh [OPTION]
OptionDescription
-h, --helpDisplay help message
-v, --versionDisplay version information
-d, --discoverRun full discovery immediately
-a, --analyzeRun full analysis immediately
-r, --reportGenerate a full report immediately

TaskThief automatically detects when root privileges are required and offers options to:

  1. Continue without root privileges (limited functionality)
  2. Restart with sudo to gain full functionality
  3. Exit the application

For critical operations that require root access, TaskThief will prompt you to elevate privileges when needed.

LevelDescription
DEBUGMost verbose, logs all operations
INFOStandard information (default)
WARNINGOnly logs warnings and errors
ERROROnly logs errors
NONEDisables logging

Configure logging in the Settings menu or by editing the config file.

TaskThief is designed for legitimate security testing and educational purposes. When using this tool:

  • βœ… Always ensure you have proper authorization to test the target systems
  • βœ… Use in a controlled environment when possible
  • βœ… Backup important files before running manipulation tests
  • βœ… Review all findings and manipulations carefully

The tool performs active testing that modifies system files to demonstrate vulnerabilities. You should use this tool cautiously and only on systems you are authorized to test.

This project is licensed under the MIT License - see the LICENSE.md file for details.

Developed as a penetration testing tool for identifying vulnerabilities in scheduled task systems.


Built with ❀️ for security professionals and system administrators

About

Advanced Penetration Testing Tool for Scheduled Task Privilege Escalation

Topics

Resources

Code of conduct

Stars

Watchers

Forks

Releases

No releases published

Languages