πPython Library Hijacking
π― Overview
π Attack Vectors
1. Wrong Write Permissions
2. Library Path Manipulation
3. PYTHONPATH Environment Variable
π Enumeration & Detection
Check Python Paths
Find SUID Python Scripts
Check Sudo Permissions
π Exploitation Methods
Method 1: Writable Module Hijacking
Method 2: Path Precedence Exploitation
Method 3: PYTHONPATH Environment Variable
π§ Advanced Techniques
Multi-Function Module Creation
Reverse Shell Integration
π Detection Script
π Quick Reference
Immediate Checks
Emergency Exploitation
HTB Academy Lab Example
π§ Common Python Modules to Target
Frequently Imported Modules
Module Discovery in Scripts
Last updated