Golfreeze.packetlove.com: Life style of Golfreeze Canon400D Family kammtan.com Jazz Freebsd Unix Linux System Admin guitar Music

All about unix linux freebsd and FAQ for Packetlove.com Web hosting , Mail hosting , VoIP + IP PBX server => All Security via cyber space relate golfreeze task. => Topic started by: golfreeze on กรกฎาคม 19, 2019, 09:03:13 AM

Title: linux privileges escalation
Post by: golfreeze on กรกฎาคม 19, 2019, 09:03:13 AM
https://www.riccardoancarani.it/exploting-setuid-setgid-binaries/
https://null-byte.wonderhowto.com/how-to/use-misconfigured-suid-bit-escalate-privileges-get-root-0173929/
https://www.hackingarticles.in/linux-privilege-escalation-using-suid-binaries/
https://payatu.com/guide-linux-privilege-escalation/
Title: Re: linux privileges escalation
Post by: golfreeze on กรกฎาคม 19, 2019, 09:29:57 AM
Hence it is clear that the maximum number of bit is used to set permission for each user is 7,
which is a combination of read (4) write (2) and execute (1) operation. For example, if you set chmod 755, then it will look like as rwxr-xr-x.
But when special permission is given to each user it becomes SUID, SGID, and sticky bits. When extra bit “4” is set to user(Owner) it becomes SUID (Set user ID)
and when bit “2” is set to group it becomesSGID (Set Group ID)
and  if other users are allowed to create or delete any file inside a directory then sticky bits “1” is set to that directory.
rws     rws     rwt
{UID} {GID} Sticky
S=4    S=2     t=1