Skip to content

Making exploit PoC to privilege escalation and RBX Checking

Notifications You must be signed in to change notification settings

TcherB31/sudo_exploit

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

14 Commits
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

The freecon function frees up security-related resources that may be associated with SELinux or another access control system. If rbx points to a non-existent or already released resource, this can lead to security failures. The vulnerability could be that an attacker could try to manipulate the security context, which could lead to privilege escalation. To run this code, you can compile binary and run in shell:

g++ sudo_explit.cpp -o sudo_exploit

./sudo_exploit

photo_2024-10-25_19-14-42

P.S if you have a different path to the sudo x86 ELF binary, change args to your own version

About

Making exploit PoC to privilege escalation and RBX Checking

Topics

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages