Disk Group Privilege Escalation is a complex attack method that targets vulnerabilities or misconfigurations within the disk group management system of Linux environments. Specifically, attackers
Max Kellerman discovered the privilege escalation vulnerability DirtyPipe CVE 2022-0847, which is present in the Linux Kernel itself in post versions 5.8 and allows overwriting
Team Qualys discovered a local privilege escalation vulnerability in PolicyKit’s (polkit) setuid tool pkexec, known as PwnKit (CVE 2021-4034), which allows low-level users to run
According to Red Hat, “Polkit stands for PolicyKit which is a framework that provides an authorization API used by privileged programs.” Pkexec is a tool
In this article, we will demonstrate another method of Escalating Privileges on Linux-based Devices by exploiting the Python Libraries and scripts. Table of Content Introduction
In this article, we will shed light on some of the Linux Privilege Escalation automated scripts that can be used to perform Post Exploitation and
In this article, we will discuss the mechanism of “capability” and Privilege escalation by abusing it. As we know when the system creates a work
Here we are again, coming back with one of the very essential commands, i.e., “Perl”. As we know, Perl has its significance in the era
After the detection of a major security vulnerability, Official released an immediate security fix to the ‘ sudo ‘ kit in the Ubuntu repositories. If