Hack linux with Polkit exploit
A memory corruption vulnerability (CVE-2021-4034) in PolKit, a component used in major Linux distributions and some Unix-like operating systems, can be easily exploited by unprivileged users to gain full root privileges.
By CyberTask ยท Easy level
3
Tasks
1
Sections
20
Points
1 hr
Duration
What You'll Learn
- Understand the Polkit privilege escalation vulnerability (CVE-2021-4034)
- Exploit Polkit to gain root privileges on a Linux system
- Learn how to patch and remediate the vulnerability
Prerequisites
- Basic Linux command line
- Understanding of Linux permissions
Tools & Technologies
SSH
Linux CLI
Polkit Exploit
Ready to Begin?
Sign in or create an account to start this lab and earn points.