itp Global Film

Films from everywhere and every era. (Formerly The Case for Global Film)

Unlike sudo , there’s no PAM, no plugin system, no logging madness — just permission rules. which doas command -v doas doas -V If installed, check the config:

In this post, we’ll break down how doas works, where to find it, and how to abuse it for privilege escalation during a pentest. doas was originally from OpenBSD. It allows users to execute commands as another user (usually root) with a minimal configuration file: /etc/doas.conf

doas -s # or doas /bin/sh If the config allows a wildcard path, you might inject arguments.

— HackTricks Want more? Check out the HackTricks Linux Privilege Escalation guide for deeper dives.

permit nopass user1 as root cmd /usr/bin/* Try:

gcc -shared -fPIC evil.c -o evil.so LD_PRELOAD=./evil.so doas -n id If doas is called with unsanitized user input in a script.