Quickly check for potential root-exploitable programs and backdoors.
One potential way for a user to escalate her privileges on a system is to exploit a vulnerability in an SUID or SGID program. SUID and SGID are legitimately used when programs need special permissions above and beyond those that are available to the user who is running them. Unfortunately, a poorly written SUID or SGID binary can be used to quickly and easily escalate a user’s privileges. This leads us to the need for scanning systems for SUID and SGID binaries. This is a simple process.
|
|
Full Story |
This topic does not have any threads posted yet!
You cannot post until you login.