Abusing SUID Binaries and Capabilities

When a user or a system-automated script launches a process, it inherits the UID/GID of its initiating script: this is known as the real UID/GID. User passwords are stored as hashes within /etc/shadow which is owned and writable only by root (UID=0). How can non-privileged users access this file to change their own password?

This is where the effective UID/GID was introduced, which represents the actual value being checked when performing sensitive operations.

Find SUID binaries

Find binaries with capabilities

Last updated