Linux Privilege Escalation: Sudo + LD_PRELOAD

Поділитися
Вставка
  • Опубліковано 25 гру 2024

КОМЕНТАРІ •

  • @haroonrehman8156
    @haroonrehman8156 2 роки тому +4

    Seriously I searched for LD Preload explained but nothing found except for some CTF SPeedruns that were just doing it without explaining it. And when I see your video I was pretty sure that you will first explain the whole thing then do the exploitation , and you did it

    • @c0nd4
      @c0nd4  2 роки тому +1

      Thank you for the kind words!

  • @haroonrehman8156
    @haroonrehman8156 2 роки тому +1

    Always Explain the things in a very detailed and Easy manner then perform the exploitation phase is your Best way of teaching ❤.

  • @hatit8074
    @hatit8074 3 роки тому +1

    Superb bro. I thank you from the bottom of my heart for content. They are all very specific.

    • @c0nd4
      @c0nd4  3 роки тому

      No problem! 😃

  • @dasor1052
    @dasor1052 2 роки тому

    Really good video!

  • @krovoatano9453
    @krovoatano9453 3 роки тому +2

    Brother u r a great. Thx for uploading this series 💓
    Love from India

    • @c0nd4
      @c0nd4  3 роки тому +1

      Thank you for the support 😃

    • @krovoatano9453
      @krovoatano9453 3 роки тому

      @@c0nd4 can u make one video on the ways we can get a first shell by logging in a WordPress

  • @Cossaw
    @Cossaw 3 роки тому +2

    In real environments from your experience, which Linux Privilege Escalation techniques tends to be more common? Really enjoy your videos btw. Are you planning on making and hosting new boxes btw?

  • @mohamadfarhat8550
    @mohamadfarhat8550 3 роки тому +2

    awesome thank you for the explanation.

    • @c0nd4
      @c0nd4  3 роки тому

      No problem 😁

  • @thecyberneh
    @thecyberneh 3 роки тому +1

    Great Video and explanations
    Love from india💗💗

    • @c0nd4
      @c0nd4  3 роки тому

      I appreciate it! Thanks!

  • @giahuy2201_
    @giahuy2201_ 3 роки тому +1

    Great explanation. Thank you

    • @c0nd4
      @c0nd4  3 роки тому

      Thank you!

  • @ElliyahuRosha
    @ElliyahuRosha 3 роки тому +1

    Awesome!!

    • @c0nd4
      @c0nd4  3 роки тому +1

      Thanks!

  • @meooow5996
    @meooow5996 7 місяців тому +1

    thank you for detail explanation help to solve Vulnhub machine

  • @davidboyd8751
    @davidboyd8751 6 місяців тому +1

    Great explanation. Try Hack Me didn't have a very good explanation, but your explanation was crystal clear. Definitely subbing.

  • @ThanhVu-tk2en
    @ThanhVu-tk2en 2 роки тому

    Why i can't connect to the link about the article. Pls help me

  • @haroonrehman8156
    @haroonrehman8156 2 роки тому

    Please Also make a serious series on Web hacking and explain all the stuff that why this vulnerability exist what are causes etc. Moreover make that series Always Up to date so it will be relevant in recent era of Web-Hacking. Also in today's era we are facing cloudflare waf and other defense mechanism very often so also teach how to counter them , and you should also explain how the defense mechanism is working and how we can leverage its weaknesses. I am hoping that you will make the series very and detailed and demonstrate how to apply the techniques in real world target instead of using metasploitable or dvwa or anything outdated like them.

  • @usmanshah260
    @usmanshah260 3 роки тому +1

    how do i access the sudoers file when i dont have the privilege to access it ? because to add the LD_PRELOAD env in that, i have to access and edit it. since me being a low privileged user, how do i access it?

    • @c0nd4
      @c0nd4  3 роки тому +2

      I showed the setup for this situation so you could replicate it in a lab. In a real world scenario, you would only be exploiting this if you find the variable is already set in /etc/sudoers

  • @HowToEverything1
    @HowToEverything1 3 роки тому +1

    Okay wow this is genius

    • @c0nd4
      @c0nd4  3 роки тому +1

      Glad you liked it! It's definitely a super cool method

  • @Parrotassassin15TechToker
    @Parrotassassin15TechToker 3 роки тому +1

    This is so cool 😂

  • @ca7986
    @ca7986 3 роки тому +2

    Second ❤️

    • @c0nd4
      @c0nd4  3 роки тому +1

      That was fast! Hope you enjoy the video

    • @ca7986
      @ca7986 3 роки тому +1

      @@c0nd4 you are really good! Just watched the complete video and really enjoyed it! ❤️

    • @c0nd4
      @c0nd4  3 роки тому

      Thank you so much! I really appreciate it.

  • @MrFontaineInc
    @MrFontaineInc 3 роки тому

    Maybe it's an issue with docker but I keep getting an ld.so ignored error when I run the LD_PRELOAD command. I'm gonna try this on 18.04 and see what happens
    **EDIT: had to specify full path of the .so to get it to work*** Great video!

  • @ak-kc2uy
    @ak-kc2uy 3 роки тому +4

    third :)

  • @volodymyrgorbachov
    @volodymyrgorbachov 3 роки тому +1

    Like & subscribe. Great video. Thanks!

    • @c0nd4
      @c0nd4  3 роки тому

      I appreciate it! Thank you!

  • @HowToEverything1
    @HowToEverything1 3 роки тому +1

    FIRST

    • @c0nd4
      @c0nd4  3 роки тому +3

      Wow you were quick to this one! Enjoy the video :)

    • @HowToEverything1
      @HowToEverything1 3 роки тому +2

      @@c0nd4 notifs are ON 😎

  • @Cossaw
    @Cossaw 3 роки тому

    This is quite the toxic technique haha xD Clearly sequence does matter

  • @naumankh4n571
    @naumankh4n571 3 роки тому

    kali ubuntu