Once an attacker has a shell as your sudoer user (or just compromised a local process enough), he/she can use one of the many privilege escalation tool to even automatically put themselves for example as apt
or some other processed called by root
to gain root
access (see also What can an attacker do in this scenario? (unwritable bashrc, profile, etc.)
).
What's the point of sudo
then outside of blocking smaller payloads or making it a bit harder? It seems that the focus should be on SELinux and such.
Edit: There are 2 side of this question (I should have been more specific). First, what I initially meant, for a standard Linux desktop user. A pretty different answer could be given for a machine administered by someone else.
以上就是本文的全部内容,希望对大家的学习有所帮助,也希望大家多多支持 码农网
猜你喜欢:本站部分资源来源于网络,本站转载出于传递更多信息之目的,版权归原作者或者来源机构所有,如转载稿涉及版权问题,请联系我们。