Learning about nss (Linux Name Service Switch) During Sudo Exploitation | Ep. 14

Channel:
Subscribers:
920,000
Published on ● Video Link: https://www.youtube.com/watch?v=0ti-YgB2iR4



Duration: 11:32
35,601 views
1,804


To understand a crash in nss_load_function() better, we have to look at the libc source code. While doing this we find a very interesting exploit strategy using dlopen.

Grab the files: https://github.com/LiveOverflow/pwnedit
Read libc Code: https://elixir.bootlin.com/glibc/glibc-2.31/source

Episode 14:
00:00 - Intro
00:22 - Select Testcases For Crash Analysis
01:19 - Debug Crash in gdb
02:02 - Code Examples from grep.app
02:53 - Reading libc Source Code
04:43 - Learning about nss
05:29 - Reaching nss_lookup
06:00 - The service_user Struct ni
07:55 - nss_lookup_function
08:57 - The Crash Reason
09:58 - Exploit Brainstorming
10:57 - Outro

-=[ ❀️ Support ]=-

β†’ per Video: https://www.patreon.com/join/liveoverflow
β†’ per Month: https://www.youtube.com/channel/UClcE-kVhqyiHCcjYwcpfj9w/join

-=[ πŸ• Social ]=-

β†’ Twitter: https://twitter.com/LiveOverflow/
β†’ Instagram: https://instagram.com/LiveOverflow/
β†’ Blog: https://liveoverflow.com/
β†’ Subreddit: https://www.reddit.com/r/LiveOverflow/
β†’ Facebook: https://www.facebook.com/LiveOverflow/







Tags:
Live Overflow
liveoverflow
hacking tutorial
how to hack
exploit tutorial
sudo
nss
dlopen
bane servuce switch
nssconf
nsswitch.conf
passwd
shadow
group
sudoedit
pwnedit
baron samedit
memory corruption
heap overflow
gdb
binary exploitation
buffer overflow
exploit strategy