InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Follow publication

Privileges Escalation Techniques (Basic to Advanced) in Linux

Ali AK
InfoSec Write-ups
Published in
5 min readJan 17, 2023

--

10. Privilege Escalation: Cron Jobs (Script full/Absolute Path Not Defined)

Theory

Practical

We have got a cronjob’s script (overwrite.sh) set with not full path defined running as ROOT privileges
Our payload (forged) file when run will copy bash binary to a rootbash file & give it execute & root suid bit permission

11. Privilege Escalation: Sudo (version)

Theory

Practical

12. Privilege Escalation: Library hijacking (Python) via Higher Priority Python Library Path with Broken Privileges.

Theory

Practical

Python reverse shell in zipfle library

--

--

Published in InfoSec Write-ups

A collection of write-ups from the best hackers in the world on topics ranging from bug bounties and CTFs to vulnhub machines, hardware challenges and real life encounters. Subscribe to our weekly newsletter for the coolest infosec updates: https://weekly.infosecwriteups.com/

Written by Ali AK

WHOAMI > Security Researcher | Red Teamer | Competitive CTF Player. Learning new things every day & Helping aspiring hackers. twitter.com/LE0_Hak

No responses yet

Write a response