Chapter 13: Exploiting SUID Binaries
We will conclude the privilege escalation process on Linux by exploring the process of searching for and exploiting SUID binaries on Linux, which helps elevate the privileges on the target system.
We will start this chapter by looking at how filesystem permissions work on Linux, after which we will look at how SUID permissions work and how they are applied. We will then look at how to search for and identify vulnerable or misconfigured SUID binaries, before exploring the various techniques that can be used to exploit improperly configured SUID binaries to elevate our privileges.
In this chapter, we're going to cover the following main topics:
- Introduction to filesystem permissions on Linux
- Searching for SUID binaries
- Escalation via shared object injection