Common Linux Privilege Escalation: Writable Root PATH

Поделиться
HTML-код
  • Опубликовано: 29 янв 2025

Комментарии • 23

  • @arimiarts9233
    @arimiarts9233 2 года назад +5

    One of the best and simplest tutorials out there. Thank bro!

  • @yusufbashir5039
    @yusufbashir5039 4 года назад +3

    The only video that really helped me understand the concept. Thanks!

    • @c0nd4
      @c0nd4  4 года назад

      Glad it helped!

  • @meta7738
    @meta7738 3 года назад +1

    Dude you have good skills at teaching 👏

    • @c0nd4
      @c0nd4  3 года назад

      Thank you!

  • @tirtheshpawar1020
    @tirtheshpawar1020 4 года назад +1

    Awesome vid man!!! Hope you reach to more people soon!! god bless you
    P.S. Reading your website is beneficial too!! I would highly recommend that

    • @c0nd4
      @c0nd4  4 года назад

      Thank you!

  • @SB-rf2ye
    @SB-rf2ye 3 года назад +1

    Thanks for the video. Though I'm not sure if this was the best example. Instead of overwriting /bin/cat, wouldn't it be better to show that if you could put a malicious cat executable in any other directory that would be searched before /bin/ , then the malicious cat executable would be run?

  • @FastCodeDeveloper
    @FastCodeDeveloper 2 года назад

    but if the chrontab changes the PATH to not include a directory you can change then this basically won't work

  • @patejoni
    @patejoni 4 года назад +1

    Thanks for this clear explanation. This video was just what I was looking for and more. Have my sub sir!

    • @c0nd4
      @c0nd4  4 года назад

      No problem! Glad I could help. Thanks for the support!

  • @evalexp
    @evalexp 3 года назад +1

    I have a doubt there, is cron-task also run by root? Or it can be run by other users? If it could be run by other users, how can we know that which user is running the cron-task?

    • @c0nd4
      @c0nd4  3 года назад

      Cron jobs can also be run by users other than root. If you'd like to try and identify cron jobs running on a system and who they are running as, take a look at this tool github.com/DominicBreuker/pspy

  • @aabid3677
    @aabid3677 5 лет назад +1

    Awesome! Man! ❤️

    • @c0nd4
      @c0nd4  5 лет назад

      Thank you!

  • @zidanetribal2343
    @zidanetribal2343 2 года назад

    You can also use this command to check directories with write permission (other): find / -type d -perm -o+w -exec ls -lad {} ';' 2>/dev/null

  • @meta7738
    @meta7738 3 года назад +2

    I'm 30 yrs old and I've had my share of networking studies and basic IT but now I've found some things that's so enjoyable to and that ethical hacking im currently obsessed with advancing in advanced infrastructure on Linux im pretty good at using Linux but I want friends and colleagues im literally alone ..im looking make friends and points of contact

    • @meta7738
      @meta7738 3 года назад

      I love to work with you

    • @c0nd4
      @c0nd4  3 года назад

      Feel free to join the Discord and meet people there! We've got a little over 300 people interested in security.
      discord.gg/9CvTtHqWCX

    • @JustinBarfitt
      @JustinBarfitt 3 года назад

      bro... sell your account to Meta (formerly facebook) for a million dollars. :)

  • @confusionofdahighestorda668
    @confusionofdahighestorda668 4 года назад +1

    (Good content && good explanation) == auto subscribed

    • @c0nd4
      @c0nd4  4 года назад

      Thank you! Glad that you enjoyed it!

  • @victy2294
    @victy2294 2 года назад

    touch: cannot touch '/bin/a' : Permission denied how sad...