[Info] How OS X 10.11.6 - ROOT Exploit Works (Explained)
In today's video I will show you a great OS X Exploit for ROOT Privileges Escalation and we're going to analyze how it works, what is the vulnerability behind it and how the exploit is being implemented. 
This powerful exploit spawns a root shell console even if the user from where the exploit is being started is either Administrator, or a limited account.

This video is intended for those who want to get to know OS X better, or for aspiring security researchers. The vulnerability behind this resides in dyld (Dynamic Linker on OS X). The exploit opens the sudoers file which holds the information about each permission for every user account on OS X. The sudoers file normally is owned by root so it can't be edited normally by you. This exploit is pretty interesting, as it only takes two lines of code to be implemented. 


Forum Jump:

Users browsing this thread: 1 Guest(s)

About Us
    Welcome to F.C.E. 365 Forum! This forum is a place where you can discuss technology at its finest. We provide you a place to ask questions or to read / watch various tech-related tutorials.