2018-05-21 21:14:41 +02:00
exec-interactive :
label : Interactive
description : It executes interactive commands that may be exploited to break out from restricted shells.
exec-non-interactive :
label : Non-interactive
description : It executes non-interactive commands that may be exploited to break out from restricted shells.
suid-enabled :
label : SUID
description : It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor.
suid-limited :
label : Limited SUID
2018-05-21 23:10:23 +02:00
description : It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor. It only works if the default system shell doesn't drop the SUID privileges, which is usually only valid for Debian Linux systems.
2018-05-21 21:14:41 +02:00
sudo-enabled :
label : Sudo
description : It runs in privileged contexts and may be used to escalate or maintain privileges if enabled on `sudo`.
download :
label : Download
description : It can download remote files.
upload :
label : Upload
description : It can exfiltrate files on the network.
bind-shell :
label : Bind shell
description : It can bind a shell to a local port to allow remote network access.
reverse-shell :
label : Reverse shell
description : It can send back a reverse shell to a listening attacker to open a remote network access.
load-library :
label : Library load
description : It loads shared libraries that may be used to run code in the binary execution context.