Hacker News new | past | comments | ask | show | jobs | submit login

It's a cool idea and I like the execution but if I'm at the point where I've uploaded the binary over and executed it I've already run `sudo -l` and checked my permissions (and I could be wrong but from my brief scan of the source code I don't think it attempts to exploit SUID but just sudo permissions). Probably would save a little bit of time with docker escalation but again pretty standard enumeration would've revealed that vector by then.



Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: