Skip to content

Commit

Permalink
GitBook: No commit message
Browse files Browse the repository at this point in the history
  • Loading branch information
carlospolop authored and gitbook-bot committed Oct 10, 2021
1 parent b50804b commit e1f7939
Show file tree
Hide file tree
Showing 2 changed files with 4 additions and 2 deletions.
2 changes: 1 addition & 1 deletion linux-unix/privilege-escalation/apparmor.md
Original file line number Diff line number Diff line change
Expand Up @@ -224,7 +224,7 @@ Note that you can **add/remove** **capabilities** to the docker container (this

* `--cap-add=SYS_ADMIN`_ _give_ _`SYS_ADMIN` cap
* `--cap-add=ALL`_ _give_ _all caps
* `--cap-drop=ALL --cap-add=SYS_PTRACE` drop all caps and only give
* `--cap-drop=ALL --cap-add=SYS_PTRACE` drop all caps and only give `SYS_PTRACE`

{% hint style="info" %}
Usually, when you **find** that you have a **privileged capability** available **inside** a **docker** container **but** some part of the **exploit isn't working**, this will be because docker **apparmor will be preventing it**.
Expand Down
4 changes: 3 additions & 1 deletion linux-unix/privilege-escalation/linux-capabilities.md
Original file line number Diff line number Diff line change
Expand Up @@ -322,7 +322,9 @@ User=bob
AmbientCapabilities=CAP_NET_BIND_SERVICE
```

## Malicious Use
##

## CapabilitMalicious Use

Capabilities are useful when you **want to restrict your own processes after performing privileged operations** (e.g. after setting up chroot and binding to a socket). However, they can be exploited by passing them malicious commands or arguments which are then run as root.

Expand Down

0 comments on commit e1f7939

Please sign in to comment.