TH3xACE / SUDO_KILLER

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
MIT License
2.22k stars 254 forks source link

Checking sudo without password #9

Closed b0x-Protector closed 4 years ago

b0x-Protector commented 4 years ago

I suppose the line 331 should be started with "sudonopassuser=" not "sudonopassuser=="

P.S. Why are you using the GREP at the end? Maybe one is enough?

TH3xACE commented 4 years ago

Hi b0x-Protector,

I think it was a mistype but the result is the same, "=" is like equal and '==' is like match.

Thanks for your issue, despite not being a bug, I will change it to "="... to keep some sort of consistency and easy reading.

regards, TH3xACE.

TH3xACE commented 4 years ago

for the grep... I think you are right. I forget why, I included the second one... will comment it for now..

b0x-Protector commented 4 years ago

Hi b0x-Protector,

I think it was a mistype but the result is the same, "=" is like equal and '==' is like match.

Thanks for your issue, despite not being a bug, I will change it to "="... to keep some sort of consistency and easy reading.

regards, TH3xACE.

Unfortunately, my bash does not understand "==" :(

Thanks you for SUDO_KILLER

TH3xACE commented 4 years ago

Hi b0x-Protector, I think it was a mistype but the result is the same, "=" is like equal and '==' is like match. Thanks for your issue, despite not being a bug, I will change it to "="... to keep some sort of consistency and easy reading. regards, TH3xACE.

Unfortunately, my bash does not understand "==" :(

Thanks you for SUDO_KILLER

I see, too bad :( in the docker and on my host it went fine, I just tested it but I just made the modification.. should be fine now :).

You are welcome, feel free if you find any other issue, want to contribute or else...

regards, TH3xACE.