mirror of
https://github.com/m0nad/awesome-privilege-escalation.git
synced 2024-12-21 21:34:59 -05:00
Add TTY Input Pushback Privilege Escalation to Linux
This commit is contained in:
parent
3015539be5
commit
25c432a109
@ -51,6 +51,7 @@ A curated list of awesome privilege escalation
|
||||
- [Privilege escalation: Linux](https://vulp3cula.gitbook.io/hackers-grimoire/post-exploitation/privesc-linux)
|
||||
- [Privilege Escalation & Post-Exploitation](https://github.com/rmusser01/Infosec_Reference/blob/master/Draft/PrivescPostEx.md)
|
||||
- [Reach the root! How to gain privileges in Linux?](https://hackmag.com/security/reach-the-root/)
|
||||
- [TTY Input Pushback Privilege Escalation](https://www.halfdog.net/Security/2012/TtyPushbackPrivilegeEscalation/): When user working as root switches to another user with su and happens to execute the pushback program as that user, the tty input data pushed back is executed in the shell and context of user root.
|
||||
- [Understanding Privilege Escalation](http://www.admin-magazine.com/Articles/Understanding-Privilege-Escalation): Some techniques malicious users employ to escalate their privileges on a Linux system.
|
||||
|
||||
### Escape restricted shells
|
||||
|
Loading…
Reference in New Issue
Block a user