Bigphish
privilege escalation in OSX through systemwide root for all PID on sudo
Install / Use
/learn @Psychotrope37/BigphishREADME
NOTICE:
This issue has been resolved by Apple in MacOS Sierra by enabling tty_tickets by default.
NOTE: All other MacOS operation system (El Capitan, Yosemite, Mavericks etc...) still remain vulnerable to this exploit.
Even older Mac operatimng systems still receiving secuirty updates do not offer this secuirty measure by default. For those wanting not wanting to upgrade to Sierra, set tty_tickets to ON for sudo. (http://blog.rongarret.info/2015/08/psa-beware-of-sudo-on-os-x.html) I am exploring other vectors to see if a form of this issue persists, but I doubt anything will come of this outside of finding a critical error allowing talking as another tty.
Bigphish
Easy to use exploit crafter for privilege escalation in OSX through systemwide root for all PID on sudo
For whatever reason OSX hand out root privs to all PID any time sudo is run... This is an example of weaponizing for gaining a reverse root shell in one line of bash on an otherwise unmodified system. Great for a driveby attack with ducky or teensy on power users where simply providing the user with a fake prompt to enter their password won't work.
Why This Matters:
Running any software as root is effectively giving any and all software running on the system root priviledges. Which is bad.
Solution:
Assign passwordless root only to instance of that shell
TODO:
- eliminate false positives of unsuccessful sudo attempts triggering the exploit prematurely
- add more payloads
- tor support for reverse shell??
Changelog:
- V1.1 adds some small extras and a quick PoC of running bigphish on a teensy that will deploy the exploit in around 5 seconds on an unlocked mac
- V1.2 adds an exploit crafter for building process kill loops in OSX, even for processes owned by root or by other users along with an easy option to add custom commands from the interactive shell
- V1.3 adds DNS configuration to allow remote traffic hijacking
- rolled back to V1.2 cause I have no idea what I'm doing when it comes to DNS at the CLI on OSX
- V1.3 WIP; looking to harden the exploit string to make it more reliable, as well as making string run in the background independent of the terminal application being quit
Related Skills
node-connect
342.0kDiagnose OpenClaw node connection and pairing failures for Android, iOS, and macOS companion apps
frontend-design
84.7kCreate distinctive, production-grade frontend interfaces with high design quality. Use this skill when the user asks to build web components, pages, or applications. Generates creative, polished code that avoids generic AI aesthetics.
openai-whisper-api
342.0kTranscribe audio via OpenAI Audio Transcriptions API (Whisper).
commit-push-pr
84.7kCommit, push, and open a PR
