This paper explains the exploitation of the authentication bypass vulnerability found in polkit, which allows an unprivileged user to call privileged methods by taking root access using dbus.

Key Pointers:

  • Understanding the vulnerability and the key terms used throughout the paper
  • Understanding how the exploit works
  • Taking a look at the severity and scope of impact of this vulnerability
  • Setting up the lab for exploitation
  • Exploiting the vulnerability and learning how to mitigate it