Linux SUID Vulnerability Demonstration

  Рет қаралды 7,790

Brian Green

Brian Green

Күн бұрын

Пікірлер: 15
@rafa_br34
@rafa_br34 5 ай бұрын
Helped me a bit to understand how the SUID bit works, but what would even be the reason to add the SUID bit to some executable?
@odinalfather6494
@odinalfather6494 17 күн бұрын
amazing, I love you
@zuberkariye2299
@zuberkariye2299 Жыл бұрын
Amazing Demo!
@tbone907
@tbone907 4 жыл бұрын
Great video! Thanks for sharing.
@janb.9425
@janb.9425 5 ай бұрын
Breaking news: Allowing users to execute a shell as root allows them to get a root shell
@ahmedamr1124
@ahmedamr1124 6 ай бұрын
Nice observation
@adebolama2686
@adebolama2686 3 жыл бұрын
At 8:54 when you typed zsh you were login as root that's why you have the # in your prompt and I guess that was why it didn't ask for permission you are running in root context not as an ordinary user
@hetsonii
@hetsonii 2 жыл бұрын
He got the root zsh because SUID bit was set for zsh. If it wasn't the case, he would have got the non-root zsh. that's the whole point of SUID Vulnerabilities!
@creed404
@creed404 Жыл бұрын
That’s the point he was trying to explain!
@Michael_Jackson187
@Michael_Jackson187 10 ай бұрын
​@@hetsoniiWhat admin in there right fucking mind would set the SUID on a fucking shell, there are some things that need to be run as root and you can use something like gtfobin to escape then and get a sh. i remember using man to privesc during the eJPTv2 exam, this would be a more practical way of privesc like finding out what is already allowed on the system to run as root for the user by typing sudo -l and heading over to gtfobins for example "man" sudo man man !/bin/sh
@AmazingJayB51
@AmazingJayB51 3 жыл бұрын
can you block someone from using zsh?
@BETTER_WAY_FORWARD_60
@BETTER_WAY_FORWARD_60 10 ай бұрын
What if u are not in sudoers group
@firsfnamelastname8490
@firsfnamelastname8490 2 жыл бұрын
It’s not a vulnerability but a functionality
@creed404
@creed404 Жыл бұрын
A functionality that leads to vulnerabilities like any functionality
@rafa_br34
@rafa_br34 5 ай бұрын
@@creed404 Just like TCP...
Encryption Demonstration using OpenSSL on CentOS 7
20:33
Brian Green
Рет қаралды 1,6 М.
C++ vs Rust: which is faster?
21:15
fasterthanlime
Рет қаралды 404 М.
СКОЛЬКО ПАЛЬЦЕВ ТУТ?
00:16
Masomka
Рет қаралды 3,6 МЛН
Миллионер | 3 - серия
36:09
Million Show
Рет қаралды 2,1 МЛН
Linux systemd Lecture & Tutorial
54:22
Brian Green
Рет қаралды 3,7 М.
The STICKY BITs of Linux
13:56
Shawn Powers
Рет қаралды 17 М.
What Everyone Missed About The Linux Hack
20:24
Theo - t3․gg
Рет қаралды 288 М.
Brief Discussion of SUID & SGID
9:57
Jason Wertz
Рет қаралды 84 М.
Hacking Linux // Linux Privilege escalation // Featuring HackerSploit
1:07:08
Linux Privilege Escalation: Understanding LinEnum
21:04
Conda
Рет қаралды 12 М.
Mastering Privilege Escalation: A Comprehensive Guide on GTFOBins
12:16
OSCP - Linux Privilege Escalation Methodology
19:25
Conda
Рет қаралды 48 М.