Hacker Newsnew | past | comments | ask | show | jobs | submitlogin

As an attacker, I test for sudo -n. If it succeeds, I have root. In most cases I do not need it however. SSH key trusts, SSH multiplexing and bad posix permissions are more than enough to get me anywhere and grab anything.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: