Video walkthrough for the new @RealTryHackMe "PwnKit" Room by MuirlandOracle. We'll investigate, exploit and mitigate the recently discovered memory corruption vulnerability (read/write out-of-bounds) in Polkit's pkexec, a SUID-root program that is installed by default on every major Linux distribution. This easily exploited vulnerability (CVE-2021-4034) allows any unprivileged user to gain full root privileges on a vulnerable host by exploiting this vulnerability in its default configuration. Hope you enjoy 🙂 #TryHackMe #PwnKit #Polkit #pkexec #CVE-2021-4034
↢Social Media↣
Twitter: / _cryptocat
GitHub: github.com/Crypto-Cat
HackTheBox: app.hackthebox.eu/profile/11897
LinkedIn: / cryptocat
Reddit: / _cryptocat23
RU-vid: / cryptocat23
Twitch: / cryptocat23
↢TryHackMe↣
tryhackme.com/room/pwnkit
/ realtryhackme
/ discord
↢PwnKit↣
blog.qualys.com/vulnerabiliti...
www.qualys.com/2022/01/25/cve...
ryiron.wordpress.com/2013/12/...
github.com/ly4k/PwnKit
github.com/clubby789/CVE-2021...
↢Resources↣
Ghidra: ghidra-sre.org/CheatSheet.html
Volatility: github.com/volatilityfoundati...
PwnTools: github.com/Gallopsled/pwntool...
CyberChef: gchq.github.io/CyberChef
DCode: www.dcode.fr/en
HackTricks: book.hacktricks.xyz/pentestin...
CTF Tools: github.com/apsdehal/awesome-ctf
Forensics: cugu.github.io/awesome-forensics
Decompile Code: www.decompiler.com
Run Code: tio.run
↢Chapters↣
Start: 0:00
Introduction and Deploy (Info): 0:53
Background (Tutorial): 1:30
Exploitation (Practical): 6:13
Technical Details (Qualys blog): 8:30
Exploit PoC Code Review: 14:20
Remediations (Tutorial): 16:18
Conclusion (Info): 17:37
End: 18:03
19 июл 2024