Linux SUID Vulnerability Demonstration

Поділитися
Вставка
  • Опубліковано 1 лис 2024

КОМЕНТАРІ • 14

  • @rafa_br34
    @rafa_br34 4 місяці тому

    Helped me a bit to understand how the SUID bit works, but what would even be the reason to add the SUID bit to some executable?

  • @tbone907
    @tbone907 4 роки тому +1

    Great video! Thanks for sharing.

  • @zuberkariye2299
    @zuberkariye2299 Рік тому +1

    Amazing Demo!

  • @janb.9425
    @janb.9425 4 місяці тому +1

    Breaking news:
    Allowing users to execute a shell as root allows them to get a root shell

  • @ahmedamr1124
    @ahmedamr1124 5 місяців тому

    Nice observation

  • @AmazingJayB51
    @AmazingJayB51 3 роки тому

    can you block someone from using zsh?

  • @adebolama2686
    @adebolama2686 2 роки тому

    At 8:54 when you typed zsh you were login as root that's why you have the # in your prompt and I guess that was why it didn't ask for permission you are running in root context not as an ordinary user

    • @hetsonii
      @hetsonii 2 роки тому +3

      He got the root zsh because SUID bit was set for zsh.
      If it wasn't the case, he would have got the non-root zsh. that's the whole point of SUID Vulnerabilities!

    • @creed404
      @creed404 Рік тому

      That’s the point he was trying to explain!

    • @Michael_Jackson187
      @Michael_Jackson187 9 місяців тому

      ​@@hetsoniiWhat admin in there right fucking mind would set the SUID on a fucking shell, there are some things that need to be run as root and you can use something like gtfobin to escape then and get a sh. i remember using man to privesc during the eJPTv2 exam, this would be a more practical way of privesc like finding out what is already allowed on the system to run as root for the user by typing sudo -l and heading over to gtfobins for example "man"
      sudo man man
      !/bin/sh

  • @AintLoose_60
    @AintLoose_60 9 місяців тому

    What if u are not in sudoers group

  • @firsfnamelastname8490
    @firsfnamelastname8490 2 роки тому

    It’s not a vulnerability but a functionality

    • @creed404
      @creed404 Рік тому +1

      A functionality that leads to vulnerabilities like any functionality

    • @rafa_br34
      @rafa_br34 4 місяці тому

      @@creed404 Just like TCP...