I am studying privilege escalation techniques on Linux and want to understand how attackers exploit misconfigured SUID binaries. My questions are:
- What are the common SUID misconfigurations that lead to privilege escalation?
- How can an attacker use existing binaries (e.g., find, awk, vim) to gain root access?
- What are the best ways to detect and mitigate these misconfigurations?
A real-world example of an SUID exploit, along with its remediation, would be useful.