Linux Privilege Escalation Techniques (Part 1)

Linux Privilege Escalation Techniques (Part 1)

• 1. Basics of Linux Permissions • Linux Permission Management • Linux Security Mechanisms • 2. Understanding Various Shells • Interactive Shell and Non-Interactive Shell • Forward Shell and Reverse Shell • Common Reverse Shell Commands • 3. Information Gathering in Linux • Manual Enumeration of Basic Linux Information • Automated Enumeration of Basic Linux … Read more

Linux USB Audio Driver Vulnerability Exploited by Malicious USB Devices in the Wild

Linux USB Audio Driver Vulnerability Exploited by Malicious USB Devices in the Wild

A critical vulnerability exists in the USB audio driver of the Linux kernel that may lead to out-of-bounds memory reads. This vulnerability has been patched by Takashi Iwai from SUSE. If an attacker gains physical access to the system, they can exploit malicious USB devices to achieve privilege escalation, tamper with system memory, or execute … Read more

Linux USB Audio Driver Vulnerability Exploited by Malicious USB Devices in the Wild

Linux USB Audio Driver Vulnerability Exploited by Malicious USB Devices in the Wild

A critical vulnerability exists in the USB audio driver of the Linux kernel that may lead to out-of-bounds memory reads. This vulnerability has been patched by Takashi Iwai from SUSE. If an attacker gains physical access to the system, they can exploit malicious USB devices to escalate privileges, tamper with system memory, or execute arbitrary … Read more

Nimbuspwn: Microsoft Discovers Multiple Privilege Escalation Vulnerabilities in Linux Operating System

Nimbuspwn: Microsoft Discovers Multiple Privilege Escalation Vulnerabilities in Linux Operating System

Microsoft has discovered two privilege escalation vulnerabilities in the Linux operating system that could allow attackers to perform various malicious activities. They are CVE-2022-29799 and CVE-2022-29800, collectively referred to as “Nimbuspwn”. The Microsoft 365 Defender security team released a report stating that these vulnerabilities “can be exploited in combination to gain root privileges on Linux … Read more