Chapter 13: Exploiting SUID Binaries

We will conclude the privilege escalation process on Linux by exploring the process of searching for and exploiting SUID binaries on Linux, which helps elevate the privileges on the target system.

We will start this chapter by looking at how filesystem permissions work on Linux, after which we will look at how SUID permissions work and how they are applied. We will then look at how to search for and identify vulnerable or misconfigured SUID binaries, before exploring the various techniques that can be used to exploit improperly configured SUID binaries to elevate our privileges.

In this chapter, we're going to cover the following main topics:

  • Introduction to filesystem permissions on Linux
  • Searching for ...

Get Privilege Escalation Techniques now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.