sup

small tool for privilege escalation
git clone https://git.parazyd.org/sup
Log | Files | Refs | README | LICENSE

commit e50cc7dcf0d0b8f8550a70d2155739c64b024c15
parent a1433c21cfd8539d3c34a0d40cc18022dcbfd0c6
Author: parazyd <parazyd@dyne.org>
Date:   Mon,  8 Jul 2019 18:05:06 +0200

Add more information in the manpage.

Diffstat:
Msup.1 | 6++++--
1 file changed, 4 insertions(+), 2 deletions(-)

diff --git a/sup.1 b/sup.1 @@ -1,4 +1,4 @@ -.TH SUP 1 2019-07-02 +.TH SUP 1 2019-07-08 .SH NAME sup \- scale user privileges .SH SYNOPSIS @@ -14,7 +14,9 @@ sup \- scale user privileges sup is a minimal privilege escalation utility that allows normal users to run other programs as different user and group. It is "secured" by hardcoding SHA256 sums of the executables into itself to decide if a -user is actually authorized to run the requested command. +user is actually authorized to run the requested command. The way sup +works is that it is installed as a setuid binary and is statically +linked to avoid any possible LD_PRELOAD trickery. .TP The configuration is done in config.h at compile time. .SH OPTIONS