miscmedium

Touch

hackthebox

Task: Privilege escalation from ctf user to root with SUID touch binary. Solution: Exploit ld.so.preload hijacking by creating world-writable /etc/ld.so.preload via SUID touch with umask 0000, then inject malicious shared library to execute code as root.

$ ls tags/ techniques/
suid_exploitationshared_library_injectionld_preload_hijackingumask_manipulation

🔒

Permission denied (requires tier.pro)

Sign in to access full writeups

Create a free account with GitHub, then upgrade to Pro.

$ssh [email protected]