Seriously I searched for LD Preload explained but nothing found except for some CTF SPeedruns that were just doing it without explaining it. And when I see your video I was pretty sure that you will first explain the whole thing then do the exploitation , and you did it
In real environments from your experience, which Linux Privilege Escalation techniques tends to be more common? Really enjoy your videos btw. Are you planning on making and hosting new boxes btw?
Please Also make a serious series on Web hacking and explain all the stuff that why this vulnerability exist what are causes etc. Moreover make that series Always Up to date so it will be relevant in recent era of Web-Hacking. Also in today's era we are facing cloudflare waf and other defense mechanism very often so also teach how to counter them , and you should also explain how the defense mechanism is working and how we can leverage its weaknesses. I am hoping that you will make the series very and detailed and demonstrate how to apply the techniques in real world target instead of using metasploitable or dvwa or anything outdated like them.
how do i access the sudoers file when i dont have the privilege to access it ? because to add the LD_PRELOAD env in that, i have to access and edit it. since me being a low privileged user, how do i access it?
I showed the setup for this situation so you could replicate it in a lab. In a real world scenario, you would only be exploiting this if you find the variable is already set in /etc/sudoers
Maybe it's an issue with docker but I keep getting an ld.so ignored error when I run the LD_PRELOAD command. I'm gonna try this on 18.04 and see what happens **EDIT: had to specify full path of the .so to get it to work*** Great video!
Seriously I searched for LD Preload explained but nothing found except for some CTF SPeedruns that were just doing it without explaining it. And when I see your video I was pretty sure that you will first explain the whole thing then do the exploitation , and you did it
Thank you for the kind words!
Always Explain the things in a very detailed and Easy manner then perform the exploitation phase is your Best way of teaching ❤.
Superb bro. I thank you from the bottom of my heart for content. They are all very specific.
No problem! 😃
Really good video!
Brother u r a great. Thx for uploading this series 💓
Love from India
Thank you for the support 😃
@@c0nd4 can u make one video on the ways we can get a first shell by logging in a WordPress
In real environments from your experience, which Linux Privilege Escalation techniques tends to be more common? Really enjoy your videos btw. Are you planning on making and hosting new boxes btw?
awesome thank you for the explanation.
No problem 😁
Great Video and explanations
Love from india💗💗
I appreciate it! Thanks!
Great explanation. Thank you
Thank you!
Awesome!!
Thanks!
thank you for detail explanation help to solve Vulnhub machine
Great explanation. Try Hack Me didn't have a very good explanation, but your explanation was crystal clear. Definitely subbing.
Why i can't connect to the link about the article. Pls help me
Please Also make a serious series on Web hacking and explain all the stuff that why this vulnerability exist what are causes etc. Moreover make that series Always Up to date so it will be relevant in recent era of Web-Hacking. Also in today's era we are facing cloudflare waf and other defense mechanism very often so also teach how to counter them , and you should also explain how the defense mechanism is working and how we can leverage its weaknesses. I am hoping that you will make the series very and detailed and demonstrate how to apply the techniques in real world target instead of using metasploitable or dvwa or anything outdated like them.
how do i access the sudoers file when i dont have the privilege to access it ? because to add the LD_PRELOAD env in that, i have to access and edit it. since me being a low privileged user, how do i access it?
I showed the setup for this situation so you could replicate it in a lab. In a real world scenario, you would only be exploiting this if you find the variable is already set in /etc/sudoers
Okay wow this is genius
Glad you liked it! It's definitely a super cool method
This is so cool 😂
Right?? Definitely an awesome one
@@c0nd4 oh yeah most definitely
Second ❤️
That was fast! Hope you enjoy the video
@@c0nd4 you are really good! Just watched the complete video and really enjoyed it! ❤️
Thank you so much! I really appreciate it.
Maybe it's an issue with docker but I keep getting an ld.so ignored error when I run the LD_PRELOAD command. I'm gonna try this on 18.04 and see what happens
**EDIT: had to specify full path of the .so to get it to work*** Great video!
third :)
Like & subscribe. Great video. Thanks!
I appreciate it! Thank you!
FIRST
Wow you were quick to this one! Enjoy the video :)
@@c0nd4 notifs are ON 😎
This is quite the toxic technique haha xD Clearly sequence does matter
kali ubuntu