|
|
config.def.h - sup - small tool for privilege escalation |
|
|
 |
git clone git://bitreich.org/sup git://enlrupgkhuxnvlhsf6lc3fziv5h2hhfrinws65d7roiv6bfj7d652fid.onion/sup (git://bitreich.org) |
|
|
 |
Log |
|
|
 |
Files |
|
|
 |
Refs |
|
|
 |
Tags |
|
|
 |
README |
|
|
 |
LICENSE |
|
|
|
--- |
|
|
|
config.def.h (795B) |
|
|
|
--- |
|
|
|
1 /* See LICENSE file for copyright and license details. */ |
|
|
|
2 |
|
|
|
3 /* User and group to run as */ |
|
|
|
4 #define SETUID 0 |
|
|
|
5 #define SETGID 0 |
|
|
|
6 |
|
|
|
7 /* sup authorizations |
|
|
|
8 * |
|
|
|
9 * The format is as follows: |
|
|
|
10 * - UID allowed to run the command (-1 means anyone) |
|
|
|
11 * - Alias/command used to call the executable |
|
|
|
12 * - Path to the executable to run |
|
|
|
13 * - SHA256 checksum of the executable |
|
|
|
14 */ |
|
|
|
15 static struct rule_t rules[] = { |
|
|
|
16 { 1000, "ls", "/bin/ls", |
|
|
|
17 "87e8fd7d813c135875aca43a4da43d3ced41d325ed2931906444471b4e93e017" }, |
|
|
|
18 |
|
|
|
19 { -1, "grep", "/bin/grep", |
|
|
|
20 "fedeb344d1be24f4a340591cd25ed81f7e46ea12772f563c9c9f43773028e23a" }, |
|
|
|
21 |
|
|
|
22 { 1000, "tar", "/bin/tar", |
|
|
|
23 "fedeb344d1be24f4a340591cd25ed81f7e46ea12772f563c9c9f43773028e23a" }, |
|
|
|
24 |
|
|
|
25 { 1001, "test", "./a.out", |
|
|
|
26 "254260b676a44f1529f7c855f0126a57a3fbd7ec8a74de08835f08e8e6ed21be" }, |
|
|
|
27 }; |
|