From fd84ff880d7a6059953ce9d530dd763958bfe49c Mon Sep 17 00:00:00 2001 From: witchdocsec <107813117+witchdocsec@users.noreply.github.com> Date: Sun, 11 Jun 2023 23:53:00 +0100 Subject: [PATCH] Update README.md --- README.md | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/README.md b/README.md index 342ec55..4bba103 100644 --- a/README.md +++ b/README.md @@ -1,8 +1,8 @@ # SUnami - Struggling with linux priveledge escelation? well then its time to cheese it with SUnami. - 0 interaction privesc is always recommended but not always achievable. For this reason we have created a tool for the most trivial priv esc in history (with a few drawbacks). - This is not an exploit just a cheap but effective trick. The usecase is when you have a shell on a sudoers account but no sudo cred. - It works by manipulating sudo via aliasing in their .bashrc file to prepend a malicious attacker specified command first in the background. - This does mean you will need to wait for sudo to be executed. + Struggling with linux priveledge escelation? well then its time to cheese it with SUnami. + 0 interaction privesc is always recommended but not always achievable. For this reason we have created a tool for the most trivial priv esc in history (with a few drawbacks). + This is not an exploit just a cheap but effective trick. The usecase is when you have a shell on a sudoers account but no sudo cred. + It works by manipulating sudo via aliasing in their .bashrc file to prepend a malicious attacker specified command first in the background. + This does mean you will need to wait for sudo to be executed.