
HTB - Cap Writeup | Liam Geyer
Capabilities can let a binary perform a privileged action without being run as root or having full permissions. Notably we see /usr/bin/python3.8 = cap_setuid,cap_net_bind_service+eip. This …
Is there a way for non-root processes to bind to "privileged" …
CAP_NET_BIND_SERVICE grants trust to the binary but provides no control over per-port access. Authbind grants trust to the user/group and provides control over per-port access, and …
An Interesting Privilege Escalation vector (getcap/setcap)
File Capabilities in Linux systems can be used for privilege escalation, we can find files that have capaibilities set by using getcap.
Bind Non-root Process to “Privileged” Port on Linux - Baeldung
In this case, the capability is CAP_NET_BIND_SERVICE, which is the capability allowing for a process to be bound to a privileged port. The next part of the string is +ep which indicates we …
HackTheBox write-up: Cap - ib4rz
Fortunately, we have cap_setuid available for the python3.8 binary on the target. Then, a quick search on gtfobins lets us the root shell. GTFOBins is a curated list of Unix binaries we can …
Cap Writeup - HackTheBox · DarknessE1
Cap is an easy difficulty Linux machine running an HTTP server that performs administrative functions including performing network captures. Improper controls result in Insecure Direct …
What is the rationale of setting linux capabilities for the gst-ptp ...
The reason for the capabilities is that this helper process has to bind to ports 319/320 for receiving PTP packets, and unfortunately UNIX considers ports < 1024 as privileged. In addition this …
Hack The Box Writeup: Cap - Inzombakura
One interesting line in the enumeration results is: /usr/bin/python3.8 = cap_setuid,cap_net_bind_service+eip It seems that this python binary has the capability to set …
Cap Writeup / Walkthrough Hack the box - Sheeraz ali
Writeup on Cap (Linux HackTheBox), w/o Metasploit, exploiting parameter tampering & set user capabilities for Privilege escalation.
[HTB] Cap writeup | $> ~/qwertty
With this file we are able to find some credentials to login via ssh. Once on the box we find something odd. A specific binary got capabilities to set the UID. So we can gain a root shell …
HackTheBox: Cap - Walkthrough - ch3sh.github.io
Cap is an easy difficulty room on the HackTheBox platform. The box consists of a web application that allows us download pcap files. One of the pcap files contains credentials we can use to …
HTB Writeup - Cap // Verge Programming
In this instance, cap_setuid lets anyone with access to that binary to utilize the ability to set a SUID bit on a process. Attaching this capability to something like a Python interpreter gives it …