Home » Post Exploit » Privilege Escalation
Introduction SUID (Set User ID) binaries are executables that run with the privileges of the file owner rather than the user who executed the file. This capability can be advantageous in certain scenarios but can also pose significant security risks, particularly when weak file permissions or improper configurations are present.…
Privilege Escalation from an LD_PRELOAD environment variable. Before exploit let’s read something about LD_PRELOAD environment Variable. Index What is LD_PRELOAD? Detection. Exploit LD_PRELOAD. What is LD_PRELOAD? LD_PRELOAD is an optional environmental variable containing one or more paths to shared libraries, or shared objects, that the loader will load before any other…
If you have a Low privilege Shell on any machine and you found that a machine has an NFS share you might be able to use that to escalate privileges. Depending on how it is configured. Let’s take a tour to understand Weak permission on NFS server. Index What is NFS?…
If you have a limited shell that has access to some programs using the commandsudo you might be able to escalate your privileges. here I show some of the binary which helps you to escalate privilege using the sudo command. But before Privilege Escalation let’s understand some sudoer file syntax…