You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+4Lines changed: 4 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,5 +1,7 @@
1
1
# create VMs with priv-esc vulnerabilities
2
2
3
+
We need a benchmark for some priv-esc testing.. so let's utilize somes stuff from [hacktricks](https://book.hacktricks.xyz/linux-hardening/privilege-escalation)
4
+
3
5
## setup instructions
4
6
5
7
This depends upon installed
@@ -49,6 +51,8 @@ my_machine$
49
51
|`root_password_reuse`| user `root` has the same password as `lowpriv`|
50
52
|`root_password_root`| user `root` has password `root`|
51
53
|`root_allows_lowpriv_to_ssh`| user `lowpriv` has SSH keybased access to `root`|
54
+
|`root_allows_lowpriv_to_ssh`| user `lowpriv` can overwrite cron-executed script |
55
+
|`cron_calling_user_wildcard`| backup script running as roots can be exploited using wildcards |
0 commit comments