SUDO Security Policy Bypass Vulnerability - CVE-2019-14287

Поделиться
HTML-код
  • Опубликовано: 15 дек 2024

Комментарии • 90

  • @derekgoodwine7509
    @derekgoodwine7509 4 года назад

    Excellent explanation!!! One of best videos on RUclips on this subject! Keep it up!!

  • @TonyJ_KO
    @TonyJ_KO 5 лет назад

    That's really awesome, I got the alert just now, the first thing i checked for is your explanation on it... You are awesome 💓

  • @V12-y5b
    @V12-y5b 5 лет назад +4

    Thanks a lot for teaching something new
    I want to get in the field of cyber security can you suggest where I should start from .

  • @Anthony-kj3xw
    @Anthony-kj3xw 5 лет назад

    Great video man, no other video I saw on this cve was anywhere near as clear and helpful as this 👍

  • @Spartan_767
    @Spartan_767 5 лет назад

    This was very amazing how quickly a system could be compromised by this security flaw. And how easy to replicate once you see it performed

  • @alasgar_alakbarov
    @alasgar_alakbarov 5 лет назад

    I would say it was an ideal explanation. Just perfect.

  • @Nulledx
    @Nulledx 5 лет назад

    Once again, amazing video bro, keep up the good work !

  • @Relics
    @Relics 5 лет назад +1

    HOLY ShIt Your new intro is amazing

  • @TriciaWilliams
    @TriciaWilliams 5 лет назад +2

    Thanks! My students were worried, I can always count on you to see things through.

  • @bertvanlokeren1677
    @bertvanlokeren1677 5 лет назад

    Learning a LOT from your video's ! Thanks !!

  • @alexan2250
    @alexan2250 5 лет назад +1

    Thank you for the explanation.
    I going to Experiment with my own environment.

  • @Pr4547h
    @Pr4547h 5 лет назад +3

    Thank you brother I am your big fan....

  • @umerhasan699
    @umerhasan699 5 лет назад +3

    Thanks I really appreciate you... From Pakistan 🇵🇰🇵🇰🇵🇰

  • @hewfrebie2597
    @hewfrebie2597 5 лет назад +3

    Video editor suggestion:
    Don't use kdenlive.
    I recommend you use Davinci Resolve the free version but it is proprietary.
    Their is another open source video editor called *olive video editor,* this is still in alpha and more features is being updated, but while I edit my videos I got a small unusual chance for the program crashed. Although it is actually a great software that let's me do what I want to do it without limits.

    • @HackerSploit
      @HackerSploit  5 лет назад +2

      I have been testing out Olive, not yet ready though. I will have to stick to Kdenlive

  • @tedman8587
    @tedman8587 5 лет назад

    Hello sir did you post the video about the obfuscation of apk payloads because i can't find it.

  • @SpookyGamerVideos
    @SpookyGamerVideos 5 лет назад

    Awesome video! I saw this and clicked very click. Enjoying the face cam to, pleasant to look at. Thank you for the great guides! Whenever I search a video for pentesting, if I see your name I click instantly.

  • @lorisleveque2370
    @lorisleveque2370 5 лет назад +1

    isn't this thing patched on version 1.18.28 ?

  • @securitypoint8280
    @securitypoint8280 5 лет назад

    Wawoo amazing. So easy to explain.
    Perfect :)

  • @n.w.aicecube5713
    @n.w.aicecube5713 5 лет назад

    Does this apply to IOT deices?

  • @davidmalumba1177
    @davidmalumba1177 5 лет назад

    I this applicable to Kali Linux?

  • @andretorresbr
    @andretorresbr 5 лет назад

    great video, direct to the point

  • @lonnybulldozer8426
    @lonnybulldozer8426 5 лет назад

    Great stuff. I have a silly, somewhat unrelated question. Let's say I fill up my hard drive completely. Obviously, this is going to slow down and affect performance on my computer. Then let's say, I free up space on my drive and the speed and performance is improved. My question is if this complete fill-up of my hard drive will have had a lasting affect on the performance and speed of my PC, due to those writes to disk (on an SSD)? Or to put it more clearly, can you fill up your hard drive, delete everything, repeat, and expect performance not be affected? I have too many VM's, bro.

  • @DHIRAL2908
    @DHIRAL2908 5 лет назад +2

    What was the unsigned no.?

  • @supportcentigon6775
    @supportcentigon6775 5 лет назад

    thanks ! need more video like this !
    another about bluekeep or ms17010 ?

  • @crucial9018
    @crucial9018 5 лет назад

    Which OS do you use ?

  • @mainakray6452
    @mainakray6452 4 года назад

    One of the best video

  • @robot67799
    @robot67799 2 года назад

    Ah finally I get it, thanks mate!

  • @williamwang1089
    @williamwang1089 5 лет назад

    wow! your Linux is beautiful and cool, would you mind if I ask that which Linux distribution or theme do you use?

  • @allenvena5073
    @allenvena5073 4 года назад

    My Sudo version in 1.8.28 so I want to recover to old Sudo version

  • @xav0123
    @xav0123 4 года назад

    Have you analyse the source code to know where is the problem ?

  • @XaviruvP
    @XaviruvP 5 лет назад +5

    To use this vulnerability you need to edit the sudoer file from /etc file
    To edit this you need sudo passwd
    If you have sudo passwd why would you do this
    Can anyone explain me this !
    Btw Informative video Cheers mate

    • @mohinparamasivam5189
      @mohinparamasivam5189 5 лет назад +5

      when a hacker or pentester gets into a machine. and if the owner of the machine has given ALL priv to the users. it can be exploited into becoming root. lets say there's a special binary made by the team that can be executed by all users in a team . n the binary is owned by root. the user can use this vulnerability to escalate priv to root.

    • @XaviruvP
      @XaviruvP 5 лет назад

      @@mohinparamasivam5189 oh thanks a lot got it !!

  • @aaronbanks3673
    @aaronbanks3673 5 лет назад

    Fantastic video! Thank you.

  • @k1ngjulien_
    @k1ngjulien_ 5 лет назад +1

    But isn't the point of using "sudo" to execute commands as root?
    If root gave me root permissions anyway then there's no problemy right?
    Can someone explain why someone would need sudo without root privileges?

    • @cyber1377
      @cyber1377 5 лет назад

      I think the vulnerability lets you execute commands that you weren't previously allowed to execute. Although im not sure if this exploit is really that useful, as it only works if you have been allowed to execute all commands.

  • @mustaphachakiri3407
    @mustaphachakiri3407 5 лет назад

    Yes thank uu so so for this video Good job

  • @ritiknair192
    @ritiknair192 5 лет назад

    bro can u please help me with installing mitmf in kali i am having lot of errors and tried every solution over the internet

  • @ThomasMooreNetworkingGuy
    @ThomasMooreNetworkingGuy 5 лет назад

    Excellent video. 👍

  • @darkshadow2628
    @darkshadow2628 5 лет назад +1

    Dear hackersploit
    you had the advance phising method in your channel but i don't see it Any more . i need the video pls

  • @dimitrisanogiatis7079
    @dimitrisanogiatis7079 4 года назад

    Great Demo of the bug... but it should also be mentioned that Different distributions have different versions of the sudo package and it's not specific to this version. in Debian this vulnerability was patched 2 days before the release of this video (Oct 14 2019) and the sudo package version is not 1.8.28 it's slightly different. I'm also certain that for older versions of Ubuntu and its derivatives the package versions vary slightly. This needs to be clarified and users need to go to their distribution's security announcement site or mailing list so they can verify the version of the patched sudo package and install it asap. I know that for Debian users the DSA regarding this bug is here: lists.debian.org/debian-security-announce/2019/msg00194.html
    Otherwise great job with the demo. Keep up the good work.

  • @spartan22550
    @spartan22550 5 лет назад

    fantastic video ! thanks a lot !

  • @zezxgames2425
    @zezxgames2425 5 лет назад +4

    the best of all

  • @Jawlaya
    @Jawlaya 5 лет назад

    Hackerssploit ,, 👍👍👍

  • @VictorBCred
    @VictorBCred 5 лет назад

    Great video Alexis!
    Clarify one thing for me, please. The user HAS to be listed in the sudoera file correct?

    • @HackerSploit
      @HackerSploit  5 лет назад +1

      Yes, the user needs sudo permissions

  • @TheLifeInvader
    @TheLifeInvader 5 лет назад

    Can you make a video on the new RCE vulnerability found in WhatsApp, by sending the victim a malicious gif and get access to the storage and even WhatsApp chats. Thankyou

  • @fernandoblazin
    @fernandoblazin 5 лет назад

    hi bro are you the shadow brokers guy?

  • @saurrav3801
    @saurrav3801 5 лет назад

    Bro I'm waiting for u r video....u r videos are upgrading. ...

  • @shivamtaras1720
    @shivamtaras1720 5 лет назад +1

    Hey hackesploit i recently bought a gaming laptop, the problem is while using linux it heats up a lot
    Is there any way to control fanspeed

    • @DHIRAL2908
      @DHIRAL2908 5 лет назад +1

      You should check your BIOS. Maybe its locking the fan speed to max.

    • @drewfus5037
      @drewfus5037 5 лет назад +1

      @@DHIRAL2908 seems more like their fan ISN'T running fast enough, hence the high heats under load. Bios is good place to start to UP the fan speeds, info would be helpful (laptop model, linux distro) then I could suggest fan management software. Also, laptops use notoriously bad thermal paste badly applied. Re-pasting the CPU and GPU can drop temps 10 degrees easily. Does OP have same issue with whatever other OS they use on the laptop under heavy load? Yes, probably fixable in BIOS. No, fan control software in the linux install should fix.

  • @noushikhsanju8721
    @noushikhsanju8721 5 лет назад +1

    CVE-2019-3568 exploitation vdo ?

  • @shellbr3ak443
    @shellbr3ak443 5 лет назад +1

    it keeps asking me for password even after editing the sudoers file :\

  • @andrewkimery7056
    @andrewkimery7056 5 лет назад

    is there any chance of a windows form of this exploit?great video very interesting concept.

    • @DeadlyDragon_
      @DeadlyDragon_ 5 лет назад

      Lol no

    • @ChillerDragon
      @ChillerDragon 5 лет назад +1

      Windows handles permissions quite differently. But probably the same issue exists on macOS

    • @DeadlyDragon_
      @DeadlyDragon_ 5 лет назад

      ChillerDragon depends on if debian is impacted.

  • @ovanthanarangoda1258
    @ovanthanarangoda1258 4 года назад

    Please,can anyone give me a help to find affected versions of linux to try this on my own ? 🙏🙏

  • @Error_404_-
    @Error_404_- 5 лет назад +1

    My Mint and raspbian were patched yesterday

  • @ClinicalDepression420
    @ClinicalDepression420 5 лет назад +2

    Love from India

  • @aaroojali2085
    @aaroojali2085 5 лет назад

    ধন্যবাদ দেখার জন্য
    add it as well
    translated from English to Bangla
    love from Bangladesh :D

  • @hyperxalloyfpspelinappaimi8447
    @hyperxalloyfpspelinappaimi8447 5 лет назад

    SSH Tehty suomessa!

  • @saurrav3801
    @saurrav3801 5 лет назад

    Bro pls make a video on simjacker

  • @Codename1Alice8
    @Codename1Alice8 5 лет назад

    Wurd gefixt, bevor es puplikt wurde. 🤙🏼

    • @privateger
      @privateger 5 лет назад

      Und nicht annähernd alle haben geupdated.

  • @chaitanyakhairnar6352
    @chaitanyakhairnar6352 5 лет назад

    Thnx man ur the best ❤️

  • @ligeskityler
    @ligeskityler 5 лет назад

    Use ssh keys :)

  • @alexh8818
    @alexh8818 5 лет назад +1

    Rolling release ftw

  • @ChillerDragon
    @ChillerDragon 5 лет назад

    10:31 did you leak your hashed root password? :/

    • @MrBrooksJr87
      @MrBrooksJr87 5 лет назад

      Yes, but its sha2. If his password isn't easy to dictionary/bruteforce and has tons of of entropy then good look cracking it.

    • @HackerSploit
      @HackerSploit  5 лет назад +1

      SHA-512

    • @ChillerDragon
      @ChillerDragon 5 лет назад +1

      Kelvin Brooks Yes that’s my point. If his password is not strong enough there is a possible security risk. It’s just an attack vector. Just wanted to point that out. Could be mentioned in the video that people with bad/short passwords should not share their hashes.

  • @akashjadav3374
    @akashjadav3374 5 лет назад

    Pretty cool

  • @JSmith-wc1dz
    @JSmith-wc1dz 5 лет назад +3

    “I just leave it in the description section.”
    4294967295

  • @MauricioAlvarado2fast4u
    @MauricioAlvarado2fast4u 5 лет назад

    please don't say the news, you're a better than that

  • @rfaisal139
    @rfaisal139 5 лет назад

    use SUDO to run LIBRE OFFICE as root, make me looks like hacker

  • @MrGFYne1337357
    @MrGFYne1337357 5 лет назад

    #NerdLife

  • @dibyabehera1323
    @dibyabehera1323 5 лет назад

    Bro how to hack Pubg game android mobile without ban

  • @exsyiotech7987
    @exsyiotech7987 5 лет назад +1

    Num 2 comment

  • @AKA5H.S
    @AKA5H.S 5 лет назад

    Bro please tell me that how can we realy hack any game?

  • @ashrafulalim1272
    @ashrafulalim1272 5 лет назад

    Sir, Will you please check your Facebook inbox? I have written a problem to you. :)

  • @ayandas8146
    @ayandas8146 5 лет назад

    Like and OMG!

  • @Aali4500
    @Aali4500 5 лет назад

    You're talking too bro ...
    Try to make short one ...