Common Linux Privilege Escalation: Exploiting Sudo Access

แชร์
ฝัง
  • เผยแพร่เมื่อ 19 พ.ย. 2024

ความคิดเห็น • 26

  • @talinross
    @talinross ปีที่แล้ว +1

    Simple yet eloquent very well done great explanation thank u for everything

  • @lennartluthi4869
    @lennartluthi4869 4 ปีที่แล้ว +7

    Thanks!! Got my first Root thanks to this on HTB

    • @c0nd4
      @c0nd4  4 ปีที่แล้ว

      Congratulations! Glad to have helped

  • @wolfgang-lj2hp
    @wolfgang-lj2hp 2 ปีที่แล้ว +1

    Man thank you so much.

  • @WarThunderista
    @WarThunderista 7 หลายเดือนก่อน

    Simple and quick

  • @archishmanchoudhury3303
    @archishmanchoudhury3303 3 ปีที่แล้ว +2

    Wow..that's so cool

  • @rafaeldacosta8581
    @rafaeldacosta8581 3 ปีที่แล้ว +2

    nice video mate

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว

      Thank you

  • @glowiever
    @glowiever 2 ปีที่แล้ว

    those ovh clouds are really hardened. no exploit found so far.

  • @renpnal229
    @renpnal229 2 ปีที่แล้ว

    If it allows you to run any text editor, not just vim, as root then you could just edit the sudoers file to give yourself the ability to run anything, right?

    • @snappie4180
      @snappie4180 2 ปีที่แล้ว

      Yes
      Or just add a new root user in /etc/passwd
      Or just change roots password hash in /etc/shadow
      Or just write a new root cronjob in the crontab
      Or just add your public key in /root/.ssh/authorized_keys (and ofc allow root to ssh in in the ssh config file)
      In linux, if you can write as root it's trivial to become root :)

  • @Haxr-dq6wt
    @Haxr-dq6wt 4 ปีที่แล้ว +1

    Will you continue your priv esc series?

    • @c0nd4
      @c0nd4  4 ปีที่แล้ว +2

      I do plan on it! I had to take a break from videos for a little while to get my OSCP 😁

  • @memedaddyz
    @memedaddyz 4 ปีที่แล้ว +1

    thanks

  • @clarb027
    @clarb027 5 ปีที่แล้ว

    Any suggestions if i cant list my available commands as a sudoer?...password prompted every time.

    • @c0nd4
      @c0nd4  5 ปีที่แล้ว

      Are you able to view the /etc/sudoers file? That will show you the same results.

    • @clarb027
      @clarb027 5 ปีที่แล้ว

      @@c0nd4 Yeahhh. No XD its all locked down. I've found the file thats running as sudo. First experience with GTFObins though.

    • @c0nd4
      @c0nd4  5 ปีที่แล้ว

      @@clarb027 Awesome! Let me know if you need any help with it. Good luck using the site. It's extremely helpful.

    • @clarb027
      @clarb027 5 ปีที่แล้ว

      @@c0nd4 I'll keep researching!

  • @Pradeepkumar-fw9nk
    @Pradeepkumar-fw9nk 4 ปีที่แล้ว

    still asking for pass while doing: sudo -l

    • @c0nd4
      @c0nd4  4 ปีที่แล้ว +2

      If that's the case, then you most likely have no sudo access and not limited sudo access. So this method probably isn't what you need.

  • @evilwatermelon99
    @evilwatermelon99 3 ปีที่แล้ว +1

    Time to get written up at my university

    • @c0nd4
      @c0nd4  3 ปีที่แล้ว +1

      Certainly do not attempt this on systems you are not authorized to. This is intended to be educational and exercised in lab environments. Doing it on systems without authorization would be illegal.