description |
---|
Interactive lab for exploiting and remediating Pwnkit (CVE-2021-4034) in the Polkit package |
{% embed url="https://tryhackme.com/room/pwnkit" %} https://tryhackme.com/room/pwnkit {% endembed %}
Room Attributes | Value |
---|---|
Subscription Required | False [Free] |
Type | Walkthrough |
Difficulty | Info |
Tags | Polkit, Pwnkit, Linux, CVE-2021-4034 |
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩Nay
Reveal Flag 🚩
🚩pkexec
Read through the cve-2021-4034-poc.c
file and try to understand how it works. See if you can match this up with the Qualys security advisory and the explanation given in the previous task!
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩THM{CONGRATULATIONS-YOU-EXPLOITED-PWNKIT}
[Bonus Question — Optional] Using the Qualys advisory and the repository linked in the task, try to write your own version of the Pwnkit exploit.
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}