🩸
Pentesting Notes
Ctrlk
  • ㊙️r3dcl1ff
    • 🔬Enumeration
    • 🧨Exploitation (deprecated node)
    • 🈲Privesc
      • sudo + GTFObins
        • sudo /bin/bash
        • /bin/rpm
        • /usr/bin/gdb
        • /usr/bin/php7.2
        • sudo -u#-1 /bin/bash
        • jjs
        • /usr/lib/jvm/java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.x86_64/jre/bin/java
        • /usr/bin/vim
        • /usr/bin/tee
        • /usr/bin/nice
        • /usr/bin/dd
        • nmap
        • /usr/bin/zip
        • /usr/bin/date
        • /usr/bin/base32
        • /usr/sbin/hping3
        • /usr/bin/cpulimit
        • /usr/bin/python
        • /etc/passwd
        • echo /bin/bash to executable file
        • /usr/bin/find
        • sudo_inject
        • /bin/systemctl
        • less
        • /bin/ash
        • awk
        • scp
        • man
        • ftp
        • knife
        • /usr/sbin/iftop
        • /usr/bin/nano
        • ed
        • openssl (read file)
        • tar
        • flock
        • expect
        • socat
        • Perl
        • /usr/bin/env
        • strace
      • Docker privilege escalation
      • Kernel Exploits
      • 'Nix manual enumeration
      • File transfers
      • Windows enumeration
      • Wordpress privesc
      • OpenSSL privesc
      • Privesc scripts | resources
      • vi
    • 🖥️CLI-Fu
    • 🎯OSINT
    • 🛠️Tools
    • 🟦Active Directory
    • 🪓Sysadmin
    • 🗒️Pentesting Checklist(s)
    • 🕷️WebApp Pentest
    • 🌩️Cloud
    • 🧠Threat Intel
    • 📟IoT / IIoT
    • 🏭ICS/OT - SCADA
    • 🩻Private Templates
    • 🐞BBP
    • 📱Mobile
  • Daily Syncs
    • Design Standups
  • Weekly Syncs
    • Company Weeklies
  • Other Regulars
    • Company Weeklies
Powered by GitBook
On this page
  1. ㊙️r3dcl1ff
  2. 🈲Privesc

sudo + GTFObins

Different privesc vectors abusing sudo

sudo /bin/bash/bin/rpm/usr/bin/gdb/usr/bin/php7.2sudo -u#-1 /bin/bashjjs/usr/lib/jvm/java-1.8.0-openjdk-1.8.0.242.b08-0.el7_7.x86_64/jre/bin/java/usr/bin/vim/usr/bin/tee/usr/bin/nice/usr/bin/ddnmap/usr/bin/zip/usr/bin/date/usr/bin/base32/usr/sbin/hping3/usr/bin/cpulimit/usr/bin/python/etc/passwdecho /bin/bash to executable file/usr/bin/findsudo_inject/bin/systemctlless/bin/ashawkscpmanftpknife/usr/sbin/iftop/usr/bin/nanoedopenssl (read file)tarflockexpectsocatPerl/usr/bin/envstrace
PreviousPrivescNextsudo /bin/bash

Last updated 3 years ago