An adversary may abuse configurations where an application has the setuid or setgid bits set in order to get code running in a different (and possibly more privileged) user’s context.
Sub-technique of
T1548
See: MITRE ATT&CK
An adversary may abuse configurations where an application has the setuid or setgid bits set in order to get code running in a different (and possibly more privileged) user’s context.
Sub-technique of
T1548
See: MITRE ATT&CK