Add TTY Input Pushback Privilege Escalation to Linux

This commit is contained in:
Victor Ramos Mello 2021-03-12 23:39:52 +01:00 committed by GitHub
parent 3015539be5
commit 25c432a109
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
1 changed files with 1 additions and 0 deletions

View File

@ -51,6 +51,7 @@ A curated list of awesome privilege escalation
- [Privilege escalation: Linux](https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux)
- [Privilege Escalation & Post-Exploitation](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/PrivescPostEx.md)
- [Reach the root! How to gain privileges in Linux?](https://hackmag.com/security/reach-the-root/)
- [TTY Input Pushback Privilege Escalation](https://www.halfdog.net/Security/2012/TtyPushbackPrivilegeEscalation/): When user working as root switches to another user with su and happens to execute the pushback program as that user, the tty input data pushed back is executed in the shell and context of user root.
- [Understanding Privilege Escalation](http://www.admin-magazine.com/Articles/Understanding-Privilege-Escalation): Some techniques malicious users employ to escalate their privileges on a Linux system.
### Escape restricted shells