Home
Add more information in the manpage. - sup - small tool for privilege escalation HTML git clone git://bitreich.org/sup git://enlrupgkhuxnvlhsf6lc3fziv5h2hhfrinws65d7roiv6bfj7d652fid.onion/sup DIR Log DIR Files DIR Refs DIR Tags DIR README DIR LICENSE --- DIR commit e50cc7dcf0d0b8f8550a70d2155739c64b024c15 DIR parent a1433c21cfd8539d3c34a0d40cc18022dcbfd0c6 HTML Author: parazyd <parazyd@dyne.org> Date: Mon, 8 Jul 2019 18:05:06 +0200 Add more information in the manpage. Diffstat: M sup.1 | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) --- DIR diff --git a/sup.1 b/sup.1 @@ -1,4 +1,4 @@ -.TH SUP 1 2019-07-02 +.TH SUP 1 2019-07-08 .SH NAME sup \- scale user privileges .SH SYNOPSIS @@ -14,7 +14,9 @@ sup \- scale user privileges sup is a minimal privilege escalation utility that allows normal users to run other programs as different user and group. It is "secured" by hardcoding SHA256 sums of the executables into itself to decide if a -user is actually authorized to run the requested command. +user is actually authorized to run the requested command. The way sup +works is that it is installed as a setuid binary and is statically +linked to avoid any possible LD_PRELOAD trickery. .TP The configuration is done in config.h at compile time. .SH OPTIONS