Understand how Linux capabilities work and how they can be exploited

This is subseries of the Linux Privilege Escalation series. I have published two posts on the topic

https://tbhaxor.com/understanding-linux-capabilities/

https://tbhaxor.com/exploiting-linux-capabilities-part-1/

Your suggestions and reviews are warmly welcomed. Contact me - [tbhaxor@pm.me](mailto:tbhaxor@pm.me)

submitted by /u/tbhaxor
[link] [comments]

from hacking: security in practice https://ift.tt/3sTX9M1

Comments