David Bombal cover image

#368: Hacking Linux // Linux Privilege escalation // Featuring HackerSploit

David Bombal

00:00

How to Exploit the 30 Pipe Vulnerability

You firstly need to identify an SUID binary. And I've already highlighted how you can do that within the GitHub repository. Then, when it comes down to running it, you just specify exploit two. So, in this case, exploit two user bin pseudo, hit enter,. It'll hijack the SUID binary, drop the SUID shell, restores the original SUID binary that had the actual ELF code injected into it. If I type in ID, you can see we currently root and we can pretty much do whatever we want. Do you want to talk any more about this or can I ask some more questions?

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app