Linux Privilege Escalation — Sudo Shell Escape SequencesWhen it comes to managing user privileges on a Unix-based system, sudo is a powerful tool. It allows administrators to delegate specific…Oct 4, 2023Oct 4, 2023
Linux Privilege Escalation — Weak File Permission — /etc/passwd WritableThe /etc/passwd file stores user account information for each user on the system. Each line in the file represents a single user accountfOct 2, 2023Oct 2, 2023
Linux Privilege Escalation — Weak File Permission — /etc/shadow Readable and WritableThe /etc/shadow file plays a critical role in system security as it contains user password hashes, which are essential for verifying user…Sep 20, 2023Sep 20, 2023
Linux Privilege Escalation — MySQL Service UDF ExploitMySQL provides multiple ways to execute shell commands directly on the system. Here we are going to exploit using the user defined…Sep 19, 2023Sep 19, 2023