Files
nuclei-templates/code/privilege-escalation/linux/binary/privesc-ltrace.yaml

49 lines
1.2 KiB
YAML
Raw Normal View History

2024-01-22 18:59:57 +05:30
id: privesc-ltrace
2023-12-13 22:07:24 +07:00
info:
name: ltrace - Privilege Escalation
author: daffainfo
severity: high
2024-01-22 18:59:57 +05:30
description: |
ltrace is a debugging utility in Linux that is used to intercept and record dynamic library calls made by a process. It can be used to trace the library calls made by a program, which is helpful for debugging and understanding its behavior.
reference:
- https://gtfobins.github.io/gtfobins/ltrace/
2023-12-13 22:07:24 +07:00
metadata:
verified: true
max-request: 3
tags: code,linux,ltrace,privesc,local
2023-12-13 22:07:24 +07:00
self-contained: true
code:
- engine:
- sh
- bash
source: |
2024-01-22 18:59:57 +05:30
whoami
2023-12-13 22:07:24 +07:00
- engine:
- sh
- bash
source: |
2024-01-22 18:59:57 +05:30
ltrace -b -L whoami
2023-12-13 22:07:24 +07:00
- engine:
- sh
- bash
source: |
2024-01-22 18:59:57 +05:30
sudo ltrace -b -L whoami
2023-12-13 22:07:24 +07:00
matchers-condition: and
matchers:
2024-01-22 18:59:57 +05:30
- type: word
part: code_1_response
words:
- "root"
negative: true
2023-12-13 22:07:24 +07:00
- type: dsl
dsl:
- 'contains(code_2_response, "root")'
- 'contains(code_3_response, "root")'
condition: or
2024-12-01 13:57:55 +00:00
# digest: 4a0a00473045022077922ad21616e3942ba716a7c2bd2c9f3c6f483be29af7f0b76110b3955dd7e7022100b599bf979ea509d5ac2ad3fe5f7c42da158fbd094da97ff1a9c532ad116aefd6:922c64590222798bb761d5b6d8e72950