Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

How do you see an escalation using one of listed in the article tool (unless a binary has suid bit which you shouldn’t set if worried about security). Many of these tools provide convenient access to /proc - if an attacker needs something there they can read/write directly to /proc. Though in case of eBPF - disabled kernel support would reduce attack surface and if it disabled in the kernel’s user mode tools are useless.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: