LD_PRELOAD (ine)

In this lab, when we check the sudo configuration for the student user, we find that they can run apache2 as root and they can set the environment variable LD_PRELOAD ld is a common linker found on linux systems. A linker takes different object files and links them into a final executable binary. The LD_PRELOAD environment variable lets us set a path to an object file which will be loaded by ld before anything else. From an attacker's point of view, this opens an opportunity to perform malicious acts on the compromised machine. In this example, we can exploit this to gain elevated privileges. We first of all need to create a malicious c file which will open a bash session using the uid and gid of the root user - on linux this is the number 0 In the example above, I have used the echo command with the -e flag so I can use escape characters. I have done this as I wanted to include newlines using \n The c code looks as follows: #include <stdio.h> #include <sys/types.h> #...