Recently a new exploit was introduced by engineer Max Kellermann to escalate the privileges by exploiting the page cache to ultimately override and manipulate the system files (even write-protected) to pop a shell or change the root password. This is because the unmanaged or processes with no special rights can actually inject the malicious code into the root processes.
Credits -
DirtyPipe checker - [ Ссылка ]
Note - All credits for this exploit goes to Max Kellermann. For the complete exploit information, please go through the link below:
[ Ссылка ]
Disclaimer - This video is for educational and red-team purposes.
#dirtypipe #Linux #Privilege #Escalation #exploit #cve2022-0847 #RedTeam
Ещё видео!