Bypassing Security Protections by Backdooring libc presented at REcon 2008

by Anthony Lopes,

URL : http://www.recon.cx/2008/a/anthony_de_almeida_lopes/recon-2008-slides.zip

Summary : In this short talk, I will describe several methods obtaining root after obtaining a normal user account without actually exploiting anyhting except the inherent flaws in the typical UNIX security model. This is proof of concept talk to stimulate discussion and motivation for implementing better security models in UNIX.