Re: [Full-disclosure] The Dangerous of Fakeroot
@ Jeffrey Walton thx for the references @ Wiliam Steck what OS you tested on ? 'n kernel security feature you use try make program exec /bin/sh 'n setuid it to root On 8/28/12, Wiliam Steck codeinject...@gmail.com wrote: this will only work if the desired user is in sudo and has permissions to execute as root. Otherwise, this post was a huge troll to get traffic to the website this article is hosted on. [20101:20100 - 0:501] 02:31:36 [nethic@nekobus:/dev/pts/9 +1] ~ $ fakeroot [20209:20194 - 0:501] 02:31:39 [root@nekobus:/dev/pts/9 +3] ~ $ ls /root ls: cannot open directory /root: Permission denied [20209:20194 - 0:502] 02:31:47 [root@nekobus:/dev/pts/9 +3] ~ $ python Python 2.7.3 (default, Apr 20 2012, 22:39:59) [GCC 4.6.3] on linux2 Type help, copyright, credits or license for more information. import os os.system(sudo su) ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored. [sudo] password for nethic: Sorry, try again. [sudo] password for nethic: Sorry, try again. [sudo] password for nethic: Sorry, try again. sudo: 3 incorrect password attempts 256 os.system(touch /root/test) touch: cannot touch `/root/test': Permission denied 256 Better luck next time 3 3 3 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] The Dangerous of Fakeroot
ups, my bad I will check more carefully next time should not work on production os i forgot clean the shell while playing the ctf os On 8/28/12, Thor (Hammer of God) t...@hammerofgod.com wrote: Yep, actually had a reply in my drafts. I think he's serious. We've been getting those lately. t On Aug 27, 2012, at 2:37 PM, Wiliam Steck codeinject...@gmail.com wrote: this will only work if the desired user is in sudo and has permissions to execute as root. Otherwise, this post was a huge troll to get traffic to the website this article is hosted on. [20101:20100 - 0:501] 02:31:36 [nethic@nekobus:/dev/pts/9 +1] ~ $ fakeroot [20209:20194 - 0:501] 02:31:39 [root@nekobus:/dev/pts/9 +3] ~ $ ls /root ls: cannot open directory /root: Permission denied [20209:20194 - 0:502] 02:31:47 [root@nekobus:/dev/pts/9 +3] ~ $ python Python 2.7.3 (default, Apr 20 2012, 22:39:59) [GCC 4.6.3] on linux2 Type help, copyright, credits or license for more information. import os os.system(sudo su) ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored. [sudo] password for nethic: Sorry, try again. [sudo] password for nethic: Sorry, try again. [sudo] password for nethic: Sorry, try again. sudo: 3 incorrect password attempts 256 os.system(touch /root/test) touch: cannot touch `/root/test': Permission denied 256 Better luck next time 3 3 3 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
[Full-disclosure] The Dangerous of Fakeroot
Hello full disclosure fakeroot can give you real root http://blog.egeektronic.com/post/30307776836 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] The Dangerous of Fakeroot
On Mon, Aug 27, 2012 at 9:49 AM, Teguh i...@egeektronic.com wrote: Hello full disclosure fakeroot can give you real root http://blog.egeektronic.com/post/30307776836 LD_PRELOAD is not a good idea...: Breaking the links: Exploiting the linker, www.nth-dimension.org.uk/pub/BTL.pdf. ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] The Dangerous of Fakeroot
this will only work if the desired user is in sudo and has permissions to execute as root. Otherwise, this post was a huge troll to get traffic to the website this article is hosted on. [20101:20100 - 0:501] 02:31:36 [nethic@nekobus:/dev/pts/9 +1] ~ $ fakeroot [20209:20194 - 0:501] 02:31:39 [root@nekobus:/dev/pts/9 +3] ~ $ ls /root ls: cannot open directory /root: Permission denied [20209:20194 - 0:502] 02:31:47 [root@nekobus:/dev/pts/9 +3] ~ $ python Python 2.7.3 (default, Apr 20 2012, 22:39:59) [GCC 4.6.3] on linux2 Type help, copyright, credits or license for more information. import os os.system(sudo su) ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored. [sudo] password for nethic: Sorry, try again. [sudo] password for nethic: Sorry, try again. [sudo] password for nethic: Sorry, try again. sudo: 3 incorrect password attempts 256 os.system(touch /root/test) touch: cannot touch `/root/test': Permission denied 256 Better luck next time 3 3 3 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] The Dangerous of Fakeroot
Yep, actually had a reply in my drafts. I think he's serious. We've been getting those lately. t On Aug 27, 2012, at 2:37 PM, Wiliam Steck codeinject...@gmail.com wrote: this will only work if the desired user is in sudo and has permissions to execute as root. Otherwise, this post was a huge troll to get traffic to the website this article is hosted on. [20101:20100 - 0:501] 02:31:36 [nethic@nekobus:/dev/pts/9 +1] ~ $ fakeroot [20209:20194 - 0:501] 02:31:39 [root@nekobus:/dev/pts/9 +3] ~ $ ls /root ls: cannot open directory /root: Permission denied [20209:20194 - 0:502] 02:31:47 [root@nekobus:/dev/pts/9 +3] ~ $ python Python 2.7.3 (default, Apr 20 2012, 22:39:59) [GCC 4.6.3] on linux2 Type help, copyright, credits or license for more information. import os os.system(sudo su) ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored. [sudo] password for nethic: Sorry, try again. [sudo] password for nethic: Sorry, try again. [sudo] password for nethic: Sorry, try again. sudo: 3 incorrect password attempts 256 os.system(touch /root/test) touch: cannot touch `/root/test': Permission denied 256 Better luck next time 3 3 3 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] The Dangerous of Fakeroot
It actually doesn't matter what OS or what kind of kernel security is on going, this 'hole' of yours does not exist. and why would I want to 'try make program exec /bin/sh 'n setuid it to root' that's just moronic. so in closing, and once again this will NOT work on any Linux OS or Linux Kernel Thanks for all the fish. 3 On Mon, Aug 27, 2012 at 6:52 PM, Teguh i...@egeektronic.com wrote: @ Jeffrey Walton thx for the references @ Wiliam Steck what OS you tested on? 'n kernel security feature security you use On 8/28/12, Wiliam Steck codeinject...@gmail.com wrote: this will only work if the desired user is in sudo and has permissions to execute as root. Otherwise, this post was a huge troll to get traffic to the website this article is hosted on. [20101:20100 - 0:501] 02:31:36 [nethic@nekobus:/dev/pts/9 +1] ~ $ fakeroot [20209:20194 - 0:501] 02:31:39 [root@nekobus:/dev/pts/9 +3] ~ $ ls /root ls: cannot open directory /root: Permission denied [20209:20194 - 0:502] 02:31:47 [root@nekobus:/dev/pts/9 +3] ~ $ python Python 2.7.3 (default, Apr 20 2012, 22:39:59) [GCC 4.6.3] on linux2 Type help, copyright, credits or license for more information. import os os.system(sudo su) ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored. [sudo] password for nethic: Sorry, try again. [sudo] password for nethic: Sorry, try again. [sudo] password for nethic: Sorry, try again. sudo: 3 incorrect password attempts 256 os.system(touch /root/test) touch: cannot touch `/root/test': Permission denied 256 Better luck next time 3 3 3 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Re: [Full-disclosure] The Dangerous of Fakeroot
No problem, Even pro's make mistakes. 3 On Mon, Aug 27, 2012 at 8:33 PM, Teguh i...@egeektronic.com wrote: ups, my bad I will check more carefully next time should not work on production os i forgot clean the shell while playing the ctf os On 8/28/12, Thor (Hammer of God) t...@hammerofgod.com wrote: Yep, actually had a reply in my drafts. I think he's serious. We've been getting those lately. t On Aug 27, 2012, at 2:37 PM, Wiliam Steck codeinject...@gmail.com wrote: this will only work if the desired user is in sudo and has permissions to execute as root. Otherwise, this post was a huge troll to get traffic to the website this article is hosted on. [20101:20100 - 0:501] 02:31:36 [nethic@nekobus:/dev/pts/9 +1] ~ $ fakeroot [20209:20194 - 0:501] 02:31:39 [root@nekobus:/dev/pts/9 +3] ~ $ ls /root ls: cannot open directory /root: Permission denied [20209:20194 - 0:502] 02:31:47 [root@nekobus:/dev/pts/9 +3] ~ $ python Python 2.7.3 (default, Apr 20 2012, 22:39:59) [GCC 4.6.3] on linux2 Type help, copyright, credits or license for more information. import os os.system(sudo su) ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be preloaded: ignored. [sudo] password for nethic: Sorry, try again. [sudo] password for nethic: Sorry, try again. [sudo] password for nethic: Sorry, try again. sudo: 3 incorrect password attempts 256 os.system(touch /root/test) touch: cannot touch `/root/test': Permission denied 256 Better luck next time 3 3 3 ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/ ___ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/