SkillAgentSearch skills...

Bigphish

privilege escalation in OSX through systemwide root for all PID on sudo

Install / Use

/learn @Psychotrope37/Bigphish
About this skill

Quality Score

0/100

Supported Platforms

Universal

README

NOTICE:

This issue has been resolved by Apple in MacOS Sierra by enabling tty_tickets by default.

NOTE: All other MacOS operation system (El Capitan, Yosemite, Mavericks etc...) still remain vulnerable to this exploit.

Even older Mac operatimng systems still receiving secuirty updates do not offer this secuirty measure by default. For those wanting not wanting to upgrade to Sierra, set tty_tickets to ON for sudo. (http://blog.rongarret.info/2015/08/psa-beware-of-sudo-on-os-x.html) I am exploring other vectors to see if a form of this issue persists, but I doubt anything will come of this outside of finding a critical error allowing talking as another tty.

Bigphish

Easy to use exploit crafter for privilege escalation in OSX through systemwide root for all PID on sudo

For whatever reason OSX hand out root privs to all PID any time sudo is run... This is an example of weaponizing for gaining a reverse root shell in one line of bash on an otherwise unmodified system. Great for a driveby attack with ducky or teensy on power users where simply providing the user with a fake prompt to enter their password won't work.

Why This Matters:

Running any software as root is effectively giving any and all software running on the system root priviledges. Which is bad.

Solution:

Assign passwordless root only to instance of that shell

TODO:

  • eliminate false positives of unsuccessful sudo attempts triggering the exploit prematurely
  • add more payloads
  • tor support for reverse shell??

Changelog:

  • V1.1 adds some small extras and a quick PoC of running bigphish on a teensy that will deploy the exploit in around 5 seconds on an unlocked mac
  • V1.2 adds an exploit crafter for building process kill loops in OSX, even for processes owned by root or by other users along with an easy option to add custom commands from the interactive shell
  • V1.3 adds DNS configuration to allow remote traffic hijacking
  • rolled back to V1.2 cause I have no idea what I'm doing when it comes to DNS at the CLI on OSX
  • V1.3 WIP; looking to harden the exploit string to make it more reliable, as well as making string run in the background independent of the terminal application being quit

Related Skills

View on GitHub
GitHub Stars6
CategoryDevelopment
Updated1mo ago
Forks2

Languages

Shell

Security Score

85/100

Audited on Feb 4, 2026

No findings