After gaining initial low-privilege access to a Linux system, a penetration tester identifies an interesting binary in a user's home folder titled ''changepass.`
-sr-xr-x 1 root root 6443 Oct 18 2017 /home/user/changepass
Using `strings" to print ASCII printable characters from changepass, the tester notes the following:
$ strings changepass
exit
setuid
strcmp
GLIBC_2.0 -
ENV_PATH -
%s/changepw
malloc
strlen
Given this information, which of the following is the MOST likely path of exploitation to achieve root privileges on the machine?
kloug
2 years, 2 months agomiabe
2 years, 9 months agoversun
3 years, 10 months agodyers
3 years, 12 months agoTestBanger
4 years, 5 months agomr_robot
5 years agomr_robot
4 years, 10 months agoNoImDirtyDan
4 years, 9 months agoTitoChuz
3 years, 2 months agophatboy
5 years, 4 months agoMarshmallow
5 years, 3 months agoTheABC
3 years, 5 months agoEvens_chokoe
5 years, 2 months ago