• Penetration Test


    Privilege Escalation(Linux)

    Linux user ID is 'root'.

    LINUX-SPECIFIC PRIVILEGE ESCALATION
    • SUID/SGID programs
      • Permission to execute a program as executable's owner/group
      • ls shows 's' in executable bit of permissions
        • -r-sr-sr-x(SUID and SGID set)
    • Unsecure SUDO
      • Authorized users execute commands as if logged in a root
    • Ret2libc
      • Stack overflow attack
      • Replaces current stack return address with attacker-chosen address of another subroutine
      • Libc includes useful calls, such as 'system'
    • Sticky bits
      • Directory permission
      • Multiple users can create, read, and write files, but only the owner can delete
      • ls shows 't' in the last bit of permissions
        • drwxrwxrwt
    QUICK REVIEW
    • SUID/SGID and sudo make systems easier to use, but can make them easier to compromise
    • Ret2libc is a potential attack vector for hijacking processes
    • Sticky bit directories can allow attackers to write files and executables
    相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。
  • 相关阅读:
    day03--变量与基本数据类型
    day02--编程语言的分类与Python开发环境的搭建
    day01--编程与计算机组成原理
    基本数据类型操作
    python格式化字符串
    Python垃圾回收机制
    day04作业
    day03作业
    Pycharm2018安装与激活
    Python入门-python浅谈
  • 原文地址:https://www.cnblogs.com/keepmoving1113/p/13906862.html
Copyright © 2020-2023  润新知