In Linux, there are many methods to escalate permissions (from ordinary users to root users), most of which are to escalate permissions by exploiting system kernel vulnerability overflow, of course, you can use Trojans like windows to steal the administrator's root password. The next one is a Trojan program disguised as an ssh command, and the other is a Trojan program disguised as a su command to steal the administrator root password. The following is an example of my own ssh and su Trojan programs. Lab environment: Operating system: RHEL5.9 superuser
In Linux, there are many methods to escalate permissions (from ordinary users to root users), most of which are to escalate permissions by exploiting system kernel vulnerability overflow, of course, you can use Trojans like windows to steal the administrator's root password. The next one is a Trojan program disguised as an ssh command, and the other is a Trojan program disguised as a su command to steal the administrator root password. The following is an example of my own ssh and su Trojan programs.
Lab environment: Operating system: RHEL 5.9 Super User: root common User: user0 super user password: redhatIP: 192.168.1.125192.168.168.126
Su steals the root user password:If you use user0 as the root user for the first time, the system prompts "authorization failed" even if you enter the correct logon password ", however, the password entered by the administrator has been recorded in a specified hidden file.