GTFOBins
https://gtfobins.org/* You have a restricted shell or other way to execute a restricted set of commands or binaries, often with arbitrary parameters. You can use GTFOBins in interesting ways to read files, write files, or even execute commands and ultimately break out of your restricted context into a shell.
* Someone allowed sudo access or set the SUID bit on a GTFOBin. Using these tricks, you may be able to read or write sensitive files or execute privileged commands in a way the person configuring sudo did not know about.
Well, now I feel a little vindicated tinkering so that my backup wouldn't run as root. Instead it runs as a regular user with read-all-files capabilities [0] and no login shell.
Of course, that's still probably overkill on my desktop, and any attacker that got that far would still be able to read basically every file on the computer and sneak backdoors into the backup...
[0] https://man7.org/linux/man-pages/man7/capabilities.7.html
Or is it saying that `base64 /path/to/input-file | base64 --decode` can bypass read file permission flags?
Systems with capability-based security, such as seL4[0], do not suffer from this category of problem.
Question from security newbie. Why it is not used to hack all sort of servers all the time then?
LOLBAS (https://lolbas-project.github.io/)