miscmedium
Touch
hackthebox
Task: Privilege escalation from ctf user to root with SUID touch binary. Solution: Exploit ld.so.preload hijacking by creating world-writable /etc/ld.so.preload via SUID touch with umask 0000, then inject malicious shared library to execute code as root.
$ ls tags/ techniques/
suid_exploitationshared_library_injectionld_preload_hijackingumask_manipulation
🔒
Permission denied (requires tier.pro)
Sign in to access full writeups
Create a free account with GitHub, then upgrade to Pro.
$ssh [email protected]