mirror of
https://github.com/GTFOBins/GTFOBins.github.io
synced 2024-12-27 07:18:48 +01:00
Warn about the -p option for suid* functions
This commit is contained in:
parent
a442b4cf34
commit
2036d0cf90
@ -8,11 +8,11 @@ exec-non-interactive:
|
|||||||
|
|
||||||
suid-enabled:
|
suid-enabled:
|
||||||
label: SUID
|
label: SUID
|
||||||
description: It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor.
|
description: It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor. The `-p` option may be useless or even wrong for certain distributions like Debian that runs in privileged mode by default.
|
||||||
|
|
||||||
suid-limited:
|
suid-limited:
|
||||||
label: Limited SUID
|
label: Limited SUID
|
||||||
description: It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor. This works if the default system shell doesn't drop the SUID privileges, which is usually only valid for Debian Linux systems.
|
description: It runs with the SUID bit set and may be exploited to escalate or maintain the privileges working as a SUID backdoor. This works if the default system shell doesn't drop the SUID privileges, which is usually only valid for Debian Linux systems (if that's the case don't use the `-p` option).
|
||||||
|
|
||||||
sudo-enabled:
|
sudo-enabled:
|
||||||
label: Sudo
|
label: Sudo
|
||||||
|
Loading…
Reference in New Issue
Block a user