How Hackers Gain Root Access | Linux Privilege Escalation

Поделиться
HTML-код
  • Опубликовано: 27 янв 2025

Комментарии • 30

  • @charlie1709
    @charlie1709 6 месяцев назад +15

    aura bro is glowin

  • @Hackazillarex
    @Hackazillarex Месяц назад +1

    Bro this is one of the best explanations I have seen on here! thank you for sharing

  • @Aj-hz4dv
    @Aj-hz4dv 6 месяцев назад +3

    I recently started following you because I love your content and have a growing interest in cybersecurity. Although I'm a beginner, your work has inspired me to dive deeper into the field. Keep up the fantastic work!

    • @pebble1
      @pebble1  6 месяцев назад +1

      Thank you 🙏 and best of luck in your journey

  • @TheRoot2944
    @TheRoot2944 5 месяцев назад +4

    Try hack me has been clutch bro !

  • @yellowcateyes
    @yellowcateyes 6 месяцев назад

    good video recently interested in privilege escalation and this is very informative will use some of these 👍

  • @tpevers1048
    @tpevers1048 6 месяцев назад +1

    Bro you make things seem easy

    • @pebble1
      @pebble1  6 месяцев назад +1

      It takes years of studying/practice

    • @tpevers1048
      @tpevers1048 6 месяцев назад

      Yeah bro but the secret is to enjoy it while doeing it

  • @3.SILENTnearu
    @3.SILENTnearu 6 месяцев назад

    keep on

  • @ashotkostanyan2397
    @ashotkostanyan2397 Месяц назад

    I try to get root permission without root permission and I can't execute the commad 'base64 /etc/shadow | base64 -d'

    • @pebble1
      @pebble1  Месяц назад

      Base64 must have the SUID bit set. This was just an example of a suid attack, different CTFs may require different attacks.

  • @AlexCantor-v4l
    @AlexCantor-v4l 6 месяцев назад +2

    How does seeing the hashes of the passwords in /etc/shadow help us? Do we run it in hopes that it is a weak hash/something similar?

    • @pebble1
      @pebble1  6 месяцев назад

      @@AlexCantor-v4l Yes, it is possible the root hash is supplied or another privileged user. If they are using a weak password, then we can escalate privileges. But the main point is to show off the power of SUIDs, some SUIDs can even give direct root access. But base64 was just the example.

    • @chrisjones2737
      @chrisjones2737 6 месяцев назад +1

      Is this even legal???? That seems like something you could only do for the wrong reasons

    • @pebble1
      @pebble1  6 месяцев назад +3

      @@chrisjones2737 It’s absolutely legal if you have permission. Many companies will hire pentesters or red teamers to test their security

    • @AlexCantor-v4l
      @AlexCantor-v4l 6 месяцев назад +1

      @@pebble1 I was not super familiar with SUIDs before watching this video. That being said, I was just working on a CompTIA Linux+ course, and I got to the part where they discussed SUIDs! I think it is super exciting to be thinking about these sorts of vulnerabilities/exploits WHILE learning about how it is used from an IT perspective!
      This was awesome timing!

  • @retr0.1337
    @retr0.1337 6 месяцев назад +1

    first command was more like sudo whoami

  • @VAbeYoyo
    @VAbeYoyo 4 месяца назад +1

    whene i can learn good hacking skills ? and whne you learn hacking ?

  • @xdddddddddddd9
    @xdddddddddddd9 6 месяцев назад

    this is good

  • @Reyjiraaw
    @Reyjiraaw 29 дней назад

    interesting

  • @hanmaVS
    @hanmaVS 6 месяцев назад +1

    this is ain't working

  • @hanmaVS
    @hanmaVS 6 месяцев назад

    na-huh

  • @hanmaVS
    @hanmaVS 6 месяцев назад

    heall no

  • @hanmaVS
    @hanmaVS 6 месяцев назад

    na root

  • @hanmaVS
    @hanmaVS 6 месяцев назад

    ерфе фштеэе тщ цфн