Linux Privilege Escalation - Tradecraft Security Weekly #22

Поделиться
HTML-код
  • Опубликовано: 25 дек 2024

Комментарии • 39

  • @Queennyla16
    @Queennyla16 5 лет назад +3

    I am a 3rd yr pentester (9 years in IT) in the federal sector and i must say that was the most no bullshit explanation of privesc that i have ever seen. Please continue making videos the way you do (straight to the point)..also you have a new subscriber!

  • @Xianion
    @Xianion 5 лет назад +3

    This is an extremely helpful video! You helped me escape a restricted shell in HTB!

  • @iadesanya
    @iadesanya 7 лет назад +1

    Great episode Beau!

  • @fsacer
    @fsacer 7 лет назад +11

    note that also newer versions of nmap can be exploited (if set as SUID) by including your own script

  • @isaargentina4495
    @isaargentina4495 5 лет назад +1

    Wonderfull! I learnt a lot, while Im trying to recover sudo proviledge in a Oracle instance

  • @ahnospell44
    @ahnospell44 7 лет назад +1

    Thank you man, great Episode!

  • @ByteMasterPro
    @ByteMasterPro 6 лет назад +1

    Thank you! This is excellent!

  • @dombg6313
    @dombg6313 4 года назад

    Thanks for the video. Just a little heads up:
    The command to list other super users will always return "root" since all it does is checking for $3 to be 0 and then print out that line. $3 is the entry for the user id and uid = 0 is always root.

  • @andreys1071
    @andreys1071 4 года назад

    Neat channel, thank you!

  • @nullogs4468
    @nullogs4468 4 года назад

    That was fun and good to learn. Im at the very beginning of my pentesting journey about to start Linux+ in class.

    • @SamOween
      @SamOween 3 года назад

      Where are you 10 months later? What advice would you give to yourself 10 months ago?

  • @majidshahmiri7860
    @majidshahmiri7860 6 лет назад +3

    Liked the video very much, nicely explained, best part is quality of video and audio and the vocal of speaker.. 5 out of 5

  • @浮尘-o4u
    @浮尘-o4u 4 года назад

    Very nice 👍

  • @aabid3677
    @aabid3677 4 года назад

    Very informative ❤️

  • @emre-yaman
    @emre-yaman 3 года назад

    sudo -l only shows /usr/bin/php and couldnt find my way around :/ could you spare any tips about the situation

  • @blcksmith
    @blcksmith 5 лет назад +3

    u deserve a really cold beer man ;)

  • @calmeidazim
    @calmeidazim 7 лет назад +2

    You rock :) thank you, learn a lot

  • @memedaddyz
    @memedaddyz 4 года назад

    Thank you!

  • @GianLello
    @GianLello 4 года назад

    How can i install an older version of nmap correctly? I have huge roblems on doing it

  • @emelbasayar5809
    @emelbasayar5809 5 лет назад

    This video is very usefull thanks . Privelege escalation is extremely hard. Do you have any suggestion more? Or do you upload a lot video about priv escalation :) Thanks

  • @hdphoenix29
    @hdphoenix29 5 лет назад +3

    i find it the most usefull tutorial on youtube
    Thanks a lot !!!

  • @k3nundrum
    @k3nundrum 4 года назад

    Still an awesome video man.... BTBAM FTW!

  • @j.6230
    @j.6230 5 лет назад

    Is there any easy way to determine what SUID files can be exploited, I know a couple from off the top of my head like nmap. But how do you determine if other SUID binaries except nmap/vi/vim etc. can be exploited that way?

    • @nylarnameless1759
      @nylarnameless1759 5 лет назад

      I use linuxprivchecker you can GitHub it. It's a simple python script that you can deliver a number of ways. Once it's on a target system running it gives you just about all the information you could ever dream of.

  • @Nagle11234
    @Nagle11234 5 лет назад

    i chmod my nmap to get it suid, but when i use the !sh command it dosent give me root :( any idea what im doing wrong?

  • @macobadmintoncambodia8118
    @macobadmintoncambodia8118 5 лет назад

    Good job

  • @Ninja5433
    @Ninja5433 4 года назад +1

    I'm so mad i had to come here for this..........
    but thank you for the education lol

  • @shikharjoshi267
    @shikharjoshi267 7 лет назад +1

    awesome

  • @glowiever
    @glowiever 2 года назад

    I can't seem to hack a cloud vps, they removed almost all non essential binaries. even the sudo lol.

  • @Rafael-kr8xb
    @Rafael-kr8xb 6 лет назад +1

    noice video !

  • @Robertlavigne1
    @Robertlavigne1 5 лет назад +3

    Thanks! This video got me my 2nd root on HackTheBox! I'm sure I'll come back to this video a few times moving forward as there are lots of great tips in there!

  • @nicolasdiaz3544
    @nicolasdiaz3544 5 лет назад

    not work nmap --interactive

    • @hamzagondal8217
      @hamzagondal8217 5 лет назад +1

      The version of NMap you are targeting might not have the interactive feature available.

    • @nicolasdiaz3544
      @nicolasdiaz3544 5 лет назад

      @@hamzagondal8217 in the last version?

    • @hamzagondal8217
      @hamzagondal8217 5 лет назад

      @@nicolasdiaz3544 You can check which version of NMap you are targeting. Once you do, you can google if that version has the interactive feature enabled. I'm gonna say it may not as it was disabled a while ago from NMap however, it may exist on a system running older linux version.

  • @mdfrslivinglife3959
    @mdfrslivinglife3959 Год назад +1

    Very basic knowledge about privilege escalation

  • @ghareebelsony5634
    @ghareebelsony5634 6 лет назад +4

    wtf are u a hacking god or something?? it will take me about a hundred year just to think this way -_-! i will just go for sales or marketing, security doesn't suit me anyway :D