Quickly check for potential root-exploitable programs and backdoors.

Posted by Sander_Marechal on Oct 31, 2007 10:40 AM EDT
Linux Haxor
Mail this story
Print this story

One potential way for a user to escalate her privileges on a system is to exploit a vulnerability in an SUID or SGID program. SUID and SGID are legitimately used when programs need special permissions above and beyond those that are available to the user who is running them. Unfortunately, a poorly written SUID or SGID binary can be used to quickly and easily escalate a user’s privileges. This leads us to the need for scanning systems for SUID and SGID binaries. This is a simple process.

Full Story

  Nav
» Read more about: Story Type: Tutorial; Groups: Linux

« Return to the newswire homepage

This topic does not have any threads posted yet!

You cannot post until you login.