Exploiting Polkit pkexec LPE Vulnerability (CVE-2021-4034) - TryHackMe "PwnKit" Room
Автор: CryptoCat
Загружено: 2022-01-28
Просмотров: 8325
Описание:
Video walkthrough for the new @RealTryHackMe "PwnKit" Room by MuirlandOracle. We'll investigate, exploit and mitigate the recently discovered memory corruption vulnerability (read/write out-of-bounds) in Polkit's pkexec, a SUID-root program that is installed by default on every major Linux distribution. This easily exploited vulnerability (CVE-2021-4034) allows any unprivileged user to gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration. Hope you enjoy 🙂 #TryHackMe #PwnKit #Polkit #pkexec #CVE-2021-4034
↢TryHackMe↣
https://tryhackme.com/room/pwnkit
/ realtryhackme
/ discord
↢PwnKit↣
https://blog.qualys.com/vulnerabiliti...
https://www.qualys.com/2022/01/25/cve...
https://ryiron.wordpress.com/2013/12/...
https://github.com/ly4k/PwnKit
https://github.com/clubby789/CVE-2021...
👷♂️Resources🛠
https://cryptocat.me/resources
↢Chapters↣
Start: 0:00
Introduction and Deploy (Info): 0:53
Background (Tutorial): 1:30
Exploitation (Practical): 6:13
Technical Details (Qualys blog): 8:30
Exploit PoC Code Review: 14:20
Remediations (Tutorial): 16:18
Conclusion (Info): 17:37
End: 18:03
Повторяем попытку...
Доступные форматы для скачивания:
Скачать видео
-
Информация по загрузке: