Understanding sudo and possible exploit

The name of the pictureThe name of the pictureThe name of the pictureClash Royale CLAN TAG#URR8PPP











up vote
0
down vote

favorite












I'm doing some hands on pen testing and following some guides to get an understanding of the tools of the trade. I'm following along with the guide here and I understand everything except for the last page.



I need assistance understanding sudo -l below. I know that it details what the current user can do. However, what does the output below mean?



enter image description here



And how about the command below (excluding touch)? It kind of confuses me because after running that command (exploit?), I was able to get root.



enter image description here



From my understanding, the line is saying to run the command as root or elevate to root, zip the file called exploit, and place it in tmp/exploit. I believe I'm wrong but that's where my understanding of that line stops.



I'm confused as to how I got root with that command and what that line is doing. Any help laymansing it for me would be appreciated in understanding these commands.









share





















  • Please do not post pictures of text; just paste the relevant text.
    – DopeGhoti
    1 min ago














up vote
0
down vote

favorite












I'm doing some hands on pen testing and following some guides to get an understanding of the tools of the trade. I'm following along with the guide here and I understand everything except for the last page.



I need assistance understanding sudo -l below. I know that it details what the current user can do. However, what does the output below mean?



enter image description here



And how about the command below (excluding touch)? It kind of confuses me because after running that command (exploit?), I was able to get root.



enter image description here



From my understanding, the line is saying to run the command as root or elevate to root, zip the file called exploit, and place it in tmp/exploit. I believe I'm wrong but that's where my understanding of that line stops.



I'm confused as to how I got root with that command and what that line is doing. Any help laymansing it for me would be appreciated in understanding these commands.









share





















  • Please do not post pictures of text; just paste the relevant text.
    – DopeGhoti
    1 min ago












up vote
0
down vote

favorite









up vote
0
down vote

favorite











I'm doing some hands on pen testing and following some guides to get an understanding of the tools of the trade. I'm following along with the guide here and I understand everything except for the last page.



I need assistance understanding sudo -l below. I know that it details what the current user can do. However, what does the output below mean?



enter image description here



And how about the command below (excluding touch)? It kind of confuses me because after running that command (exploit?), I was able to get root.



enter image description here



From my understanding, the line is saying to run the command as root or elevate to root, zip the file called exploit, and place it in tmp/exploit. I believe I'm wrong but that's where my understanding of that line stops.



I'm confused as to how I got root with that command and what that line is doing. Any help laymansing it for me would be appreciated in understanding these commands.









share













I'm doing some hands on pen testing and following some guides to get an understanding of the tools of the trade. I'm following along with the guide here and I understand everything except for the last page.



I need assistance understanding sudo -l below. I know that it details what the current user can do. However, what does the output below mean?



enter image description here



And how about the command below (excluding touch)? It kind of confuses me because after running that command (exploit?), I was able to get root.



enter image description here



From my understanding, the line is saying to run the command as root or elevate to root, zip the file called exploit, and place it in tmp/exploit. I believe I'm wrong but that's where my understanding of that line stops.



I'm confused as to how I got root with that command and what that line is doing. Any help laymansing it for me would be appreciated in understanding these commands.







linux command-line output





share












share










share



share










asked 4 mins ago









Aspire27

170119




170119











  • Please do not post pictures of text; just paste the relevant text.
    – DopeGhoti
    1 min ago
















  • Please do not post pictures of text; just paste the relevant text.
    – DopeGhoti
    1 min ago















Please do not post pictures of text; just paste the relevant text.
– DopeGhoti
1 min ago




Please do not post pictures of text; just paste the relevant text.
– DopeGhoti
1 min ago















active

oldest

votes











Your Answer








StackExchange.ready(function()
var channelOptions =
tags: "".split(" "),
id: "106"
;
initTagRenderer("".split(" "), "".split(" "), channelOptions);

StackExchange.using("externalEditor", function()
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled)
StackExchange.using("snippets", function()
createEditor();
);

else
createEditor();

);

function createEditor()
StackExchange.prepareEditor(
heartbeatType: 'answer',
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader:
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
,
onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
);



);













 

draft saved


draft discarded


















StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f480651%2funderstanding-sudo-and-possible-exploit%23new-answer', 'question_page');

);

Post as a guest



































active

oldest

votes













active

oldest

votes









active

oldest

votes






active

oldest

votes















 

draft saved


draft discarded















































 


draft saved


draft discarded














StackExchange.ready(
function ()
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2funix.stackexchange.com%2fquestions%2f480651%2funderstanding-sudo-and-possible-exploit%23new-answer', 'question_page');

);

Post as a guest













































































Popular posts from this blog

How to check contact read email or not when send email to Individual?

Displaying single band from multi-band raster using QGIS

How many registers does an x86_64 CPU actually have?