Search the Community
Showing results for tags 'ptrace'.
-
This Metasploit module attempts to gain root privileges by blindly injecting into the session user's running shell processes and executing commands by calling system(), in the hope that the process has valid cached sudo tokens with root privileges. The system must have gdb installed and permit ptrace. This module has been tested successfully on Debian 9.8 (x64) and CentOS 7.4.1708 (x64). View the full article
-
On Android, a ptrace hold makes the seccomp filter useless on devices with a kernel with a version lower than 4.8. View the full article