Sudo Rights Abuse
$ sudo -l
Matching Defaults entries for sysadm on NIX02:
env_reset, mail_badpass, secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
User sysadm may run the following commands on NIX02:
(root) NOPASSWD: /usr/sbin/tcpdump⚠️ Mauvaise configuration courante
Exemple : tcpdump avec NOPASSWD
$ man tcpdump
[...]
-z postrotate-command
Used in conjunction with the -C or -G options, this will make `tcpdump` run " postrotate-command file " where the file is the savefile being closed after each rotation. For example, specifying -z gzip or -z bzip2 will compress each savefile using gzip or bzip2.🧭 Vérification des droits sudo
🛠️ Techniques d'abus courantes
🛡️ Bonnes pratiques pour réduire les risques
Last updated