Esc
Setuid and Setgid - T1548.001
(ATT&CK® Technique)
Definition
An adversary may abuse configurations where an application has the setuid or setgid bits set in order to get code running in a different (and possibly more privileged) user’s context. On Linux or macOS, when the setuid or setgid bits are set for an application binary, the application will run with the privileges of the owning user or group respectively. Normally an application is run in the current user’s context, regardless of which user or group owns the application. However, there are instances where programs need to be executed in an elevated context to function properly, but the user running them may not have the specific required privileges.
D3FEND Inferred Relationships
Browse the D3FEND knowledge graph by clicking on the nodes below.