Re: [Full-disclosure] The Dangerous of Fakeroot

2012-08-28 Thread Teguh
@ Jeffrey Walton
thx for the references

@ Wiliam Steck
what OS you tested on ? 'n kernel security feature you use
try make program exec /bin/sh 'n setuid it to root

On 8/28/12, Wiliam Steck codeinject...@gmail.com wrote:
 this will only work if the desired user is in sudo and has permissions to
 execute as root.
 Otherwise, this post was a huge troll to get traffic to the website this
 article is hosted on.

 [20101:20100 - 0:501] 02:31:36 [nethic@nekobus:/dev/pts/9 +1] ~
 $ fakeroot

 [20209:20194 - 0:501] 02:31:39 [root@nekobus:/dev/pts/9 +3] ~
 $ ls /root
 ls: cannot open directory /root: Permission denied

 [20209:20194 - 0:502] 02:31:47 [root@nekobus:/dev/pts/9 +3] ~
 $ python
 Python 2.7.3 (default, Apr 20 2012, 22:39:59)
 [GCC 4.6.3] on linux2
 Type help, copyright, credits or license for more information.
 import os
 os.system(sudo su)
 ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be
 preloaded: ignored.
 [sudo] password for nethic:
 Sorry, try again.
 [sudo] password for nethic:
 Sorry, try again.
 [sudo] password for nethic:
 Sorry, try again.
 sudo: 3 incorrect password attempts
 256
 os.system(touch /root/test)
 touch: cannot touch `/root/test': Permission denied
 256

 Better luck next time 3 3 3


___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] The Dangerous of Fakeroot

2012-08-28 Thread Teguh
ups, my bad
I will check more carefully next time
should not work on production os
i forgot clean the shell while playing the ctf os


On 8/28/12, Thor (Hammer of God) t...@hammerofgod.com wrote:

 Yep, actually had a reply in my drafts. I think he's serious.  We've been
 getting those lately.

 t

 On Aug 27, 2012, at 2:37 PM, Wiliam Steck codeinject...@gmail.com wrote:

 this will only work if the desired user is in sudo and has permissions to
 execute as root.
 Otherwise, this post was a huge troll to get traffic to the website this
 article is hosted on.

 [20101:20100 - 0:501] 02:31:36 [nethic@nekobus:/dev/pts/9 +1] ~
 $ fakeroot

 [20209:20194 - 0:501] 02:31:39 [root@nekobus:/dev/pts/9 +3] ~
 $ ls /root
 ls: cannot open directory /root: Permission denied

 [20209:20194 - 0:502] 02:31:47 [root@nekobus:/dev/pts/9 +3] ~
 $ python
 Python 2.7.3 (default, Apr 20 2012, 22:39:59)
 [GCC 4.6.3] on linux2
 Type help, copyright, credits or license for more information.
  import os
  os.system(sudo su)
 ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be
 preloaded: ignored.
 [sudo] password for nethic:
 Sorry, try again.
 [sudo] password for nethic:
 Sorry, try again.
 [sudo] password for nethic:
 Sorry, try again.
 sudo: 3 incorrect password attempts
 256
  os.system(touch /root/test)
 touch: cannot touch `/root/test': Permission denied
 256

 Better luck next time 3 3 3
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/



___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[Full-disclosure] The Dangerous of Fakeroot

2012-08-27 Thread Teguh
Hello full disclosure
fakeroot can give you real root
http://blog.egeektronic.com/post/30307776836

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] The Dangerous of Fakeroot

2012-08-27 Thread Jeffrey Walton
On Mon, Aug 27, 2012 at 9:49 AM, Teguh i...@egeektronic.com wrote:
 Hello full disclosure
 fakeroot can give you real root
 http://blog.egeektronic.com/post/30307776836
LD_PRELOAD is not a good idea...: Breaking the links: Exploiting the
linker, www.nth-dimension.org.uk/pub/BTL.pdf.

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] The Dangerous of Fakeroot

2012-08-27 Thread Wiliam Steck
this will only work if the desired user is in sudo and has permissions to
execute as root.
Otherwise, this post was a huge troll to get traffic to the website this
article is hosted on.

[20101:20100 - 0:501] 02:31:36 [nethic@nekobus:/dev/pts/9 +1] ~
$ fakeroot

[20209:20194 - 0:501] 02:31:39 [root@nekobus:/dev/pts/9 +3] ~
$ ls /root
ls: cannot open directory /root: Permission denied

[20209:20194 - 0:502] 02:31:47 [root@nekobus:/dev/pts/9 +3] ~
$ python
Python 2.7.3 (default, Apr 20 2012, 22:39:59)
[GCC 4.6.3] on linux2
Type help, copyright, credits or license for more information.
 import os
 os.system(sudo su)
ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be
preloaded: ignored.
[sudo] password for nethic:
Sorry, try again.
[sudo] password for nethic:
Sorry, try again.
[sudo] password for nethic:
Sorry, try again.
sudo: 3 incorrect password attempts
256
 os.system(touch /root/test)
touch: cannot touch `/root/test': Permission denied
256

Better luck next time 3 3 3
___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] The Dangerous of Fakeroot

2012-08-27 Thread Thor (Hammer of God)

Yep, actually had a reply in my drafts. I think he's serious.  We've been 
getting those lately.

t

On Aug 27, 2012, at 2:37 PM, Wiliam Steck codeinject...@gmail.com wrote:

 this will only work if the desired user is in sudo and has permissions to 
 execute as root. 
 Otherwise, this post was a huge troll to get traffic to the website this 
 article is hosted on. 
 
 [20101:20100 - 0:501] 02:31:36 [nethic@nekobus:/dev/pts/9 +1] ~ 
 $ fakeroot
 
 [20209:20194 - 0:501] 02:31:39 [root@nekobus:/dev/pts/9 +3] ~ 
 $ ls /root
 ls: cannot open directory /root: Permission denied
 
 [20209:20194 - 0:502] 02:31:47 [root@nekobus:/dev/pts/9 +3] ~ 
 $ python
 Python 2.7.3 (default, Apr 20 2012, 22:39:59) 
 [GCC 4.6.3] on linux2
 Type help, copyright, credits or license for more information.
  import os
  os.system(sudo su)
 ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be 
 preloaded: ignored.
 [sudo] password for nethic: 
 Sorry, try again.
 [sudo] password for nethic: 
 Sorry, try again.
 [sudo] password for nethic: 
 Sorry, try again.
 sudo: 3 incorrect password attempts
 256
  os.system(touch /root/test)
 touch: cannot touch `/root/test': Permission denied
 256
 
 Better luck next time 3 3 3  
 ___
 Full-Disclosure - We believe in it.
 Charter: http://lists.grok.org.uk/full-disclosure-charter.html
 Hosted and sponsored by Secunia - http://secunia.com/

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


Re: [Full-disclosure] The Dangerous of Fakeroot

2012-08-27 Thread Wiliam Steck
It actually doesn't matter what OS or what kind of kernel security is on
going, this 'hole' of yours does not exist. and why would I want to 'try
make program exec /bin/sh 'n setuid it to root' that's just moronic.

so in closing, and once again this will NOT work on any Linux OS or Linux
Kernel

Thanks for all the fish.
3


On Mon, Aug 27, 2012 at 6:52 PM, Teguh i...@egeektronic.com wrote:

 @ Jeffrey Walton
  thx for the references

 @ Wiliam Steck
 what OS you tested on? 'n kernel security feature security you use

 On 8/28/12, Wiliam Steck codeinject...@gmail.com wrote:
  this will only work if the desired user is in sudo and has permissions to
  execute as root.
  Otherwise, this post was a huge troll to get traffic to the website this
  article is hosted on.
 
  [20101:20100 - 0:501] 02:31:36 [nethic@nekobus:/dev/pts/9 +1] ~
  $ fakeroot
 
  [20209:20194 - 0:501] 02:31:39 [root@nekobus:/dev/pts/9 +3] ~
  $ ls /root
  ls: cannot open directory /root: Permission denied
 
  [20209:20194 - 0:502] 02:31:47 [root@nekobus:/dev/pts/9 +3] ~
  $ python
  Python 2.7.3 (default, Apr 20 2012, 22:39:59)
  [GCC 4.6.3] on linux2
  Type help, copyright, credits or license for more information.
  import os
  os.system(sudo su)
  ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be
  preloaded: ignored.
  [sudo] password for nethic:
  Sorry, try again.
  [sudo] password for nethic:
  Sorry, try again.
  [sudo] password for nethic:
  Sorry, try again.
  sudo: 3 incorrect password attempts
  256
  os.system(touch /root/test)
  touch: cannot touch `/root/test': Permission denied
  256
 
  Better luck next time 3 3 3
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Re: [Full-disclosure] The Dangerous of Fakeroot

2012-08-27 Thread Wiliam Steck
No problem, Even pro's make mistakes.

3

On Mon, Aug 27, 2012 at 8:33 PM, Teguh i...@egeektronic.com wrote:

 ups, my bad
 I will check more carefully next time
 should not work on production os
 i forgot clean the shell while playing the ctf os


 On 8/28/12, Thor (Hammer of God) t...@hammerofgod.com wrote:
 
  Yep, actually had a reply in my drafts. I think he's serious.  We've been
  getting those lately.
 
  t
 
  On Aug 27, 2012, at 2:37 PM, Wiliam Steck codeinject...@gmail.com
 wrote:
 
  this will only work if the desired user is in sudo and has permissions
 to
  execute as root.
  Otherwise, this post was a huge troll to get traffic to the website this
  article is hosted on.
 
  [20101:20100 - 0:501] 02:31:36 [nethic@nekobus:/dev/pts/9 +1] ~
  $ fakeroot
 
  [20209:20194 - 0:501] 02:31:39 [root@nekobus:/dev/pts/9 +3] ~
  $ ls /root
  ls: cannot open directory /root: Permission denied
 
  [20209:20194 - 0:502] 02:31:47 [root@nekobus:/dev/pts/9 +3] ~
  $ python
  Python 2.7.3 (default, Apr 20 2012, 22:39:59)
  [GCC 4.6.3] on linux2
  Type help, copyright, credits or license for more information.
   import os
   os.system(sudo su)
  ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be
  preloaded: ignored.
  [sudo] password for nethic:
  Sorry, try again.
  [sudo] password for nethic:
  Sorry, try again.
  [sudo] password for nethic:
  Sorry, try again.
  sudo: 3 incorrect password attempts
  256
   os.system(touch /root/test)
  touch: cannot touch `/root/test': Permission denied
  256
 
  Better luck next time 3 3 3
  ___
  Full-Disclosure - We believe in it.
  Charter: http://lists.grok.org.uk/full-disclosure-charter.html
  Hosted and sponsored by Secunia - http://secunia.com/
 
 

___
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/