ref #001 - Cron jobs privilege escalation

some of cronjobs in default running under root privileges , attacker could inspect these jobs to see if there is ones of their owned files , services , applications is running on cronjob as root .

since an attacker owns these files , he could compromise this process by injecting payloads to be executed as root .

crontab -l
ls -alh /var/spool/cron
ls -al /etc/ | grep cron
ls -al /etc/cron*
cat /etc/cron*
cat /etc/at.allow
cat /etc/at.deny
cat /etc/cron.allow
cat /etc/cron.deny
cat /etc/crontab
cat /etc/anacrontab
cat /var/spool/cron/crontabs/root