Summary
In this chapter, we started by looking at how the cron utility works and the structure of the crontab file. We then took an in-depth look at how to exploit misconfigured cron paths. We also explored the process of exploiting wildcards in scripts executed by cron jobs to elevate our privileges. Finally, we ended this chapter by looking at how to elevate our privileges through cron file overwrites.
In the next chapter, we will look at how to exploit SUDO and SUID binaries to elevate our privileges.