Home
cyberkhalid
Cancel

SUID / SGID Executables - Shared Object Injection

SUID / SGID Executables - Shared Object Injection Enumeration We are going to exploit a vulnerable suid/sgid executable to escalate our privileges to root. Let’s find all the SUID/SGID executable...

SUID / SGID Executables - Known Exploits

SUID / SGID Executables - Known Exploits Enumeration We are going to exploit a vulnerable suid/sgid executable to escalate our privileges to root. Let’s find all the SUID/SGID executables on the ...

SUID / SGID Executables - Environment Variables

SUID / SGID Executables - Environment Variables Enumeration We are going to exploit a vulnerable suid/sgid executable to escalate our privileges to root. Let’s find all the SUID/SGID executables ...

SUDO - LD_PRELOAD

SUDO - LD_PRELOAD LD_PRELOAD is a function that allows any program to use shared libraries. If the env_keep option is enabled, we can generate a shared library which will be loaded and executed be...

Shell Escape Sequences

Shell Escape Sequences The sudo command, by default, allows you to run a program with root privileges. Under some conditions, system administrators may need to give regular users some flexibility o...

Writable /etc/shadow

Writable /etc/shadow The /etc/shadow file contains user password hashes and is usually readable only by the root user. Enumeration We are going to exploit a misconfigured /etc/shadow file to esc...

Readable /etc/shadow

Readable /etc/shadow The /etc/shadow file contains user password hashes and is usually readable only by the root user. Enumeration We are going to exploit a misconfigured /etc/shadow file to esc...

Writable /etc/passwd

/etc/passwd The /etc/passwd file contains information about user accounts. It is world-readable, but usually only writable by the root user. Enumeration We are going to exploit a misconfigured /...

Capabilities

Capabilities System administrators can use capabilities to increase the privilege level of a process or binary. Capabilities help manage privileges at a more granular level. For example, if the SO...

Cron Jobs - Wildcards

Cron Jobs - Wildcards Enumeration We are going to exploit Wildcards * to escalate our privileges to root. Let’s check the content of a crontab /etc/crontab As you can see, tar is set to run w...