Re: [Full-disclosure] Getting root, the hard way

2011-01-06 Thread news
I know a similar exploit, though it is not yet so stable : Windows. The guys took so much fun hacking that they even included some card game in it. On Thu, 6 Jan 2011 13:37:02 +0100, andrew wiggin wrote: > you should try with this one instead, it is more stable: > > /* > * Linux Kernel SUID_

Re: [Full-disclosure] Getting root, the hard way

2011-01-06 Thread andrew wiggin
you should try with this one instead, it is more stable: /* * Linux Kernel SUID_PERM to root exploit * * Usage: * gcc -w suid-to-root.c -o suid-to-root * sudo chown root.root suid-to-root * sudo chmod +s suid-to-root * ./suid-to-root * * This exploit is NOT stable: * It does not w

Re: [Full-disclosure] Getting root, the hard way

2011-01-06 Thread shawn Davison
thanks shawn -Original Message- From: srl Sent: Thursday, January 06, 2011 3:48 AM To: full-disclosure@lists.grok.org.uk Subject: Re: [Full-disclosure] Getting root, the hard way Dear musntlive, I want to say that you should rename your OpenBSD machine to "gaoaza" be

Re: [Full-disclosure] Getting root, the hard way

2011-01-06 Thread srl
Dear musntlive, I want to say that you should rename your OpenBSD machine to "gaoaza" because you already have a Linux machine named "pizda" and OpenBSD is more like a gaoaza than pizda. 2011/1/5 Григорий Братислава > Is code no work: > > # uname -a > OpenBSD cyka.etopizdets.ru 4.7 WRIGHTKERNEL

Re: [Full-disclosure] Getting root, the hard way

2011-01-05 Thread Григорий Братислава
>  * Usage: >  * gcc -w caps-to-root.c -o caps-to-root >  * sudo setcap cap_sys_admin+ep caps-to-root >  * ./caps-to-root Is further you fail because why see above: > * sudo setcap cap_sys_admin+ep caps-to-root Is I had sudo for why I has to run this code when I can sudo su. Is you must change

Re: [Full-disclosure] Getting root, the hard way

2011-01-05 Thread Григорий Братислава
Is code no work: # uname -a OpenBSD cyka.etopizdets.ru 4.7 WRIGHTKERNEL#1337 i386 # md5 danposerberg.c MD5 (danposerberg.c) = 26b1dd146a3b96c63539f551a8741f18 # gcc danposerberg.c -o hakaruski danposerberg.c:53:30: linux/capability.h: No such file or directory danposerberg.c: In function `main': d

[Full-disclosure] Getting root, the hard way

2011-01-05 Thread Dan Rosenberg
/* * Linux Kernel CAP_SYS_ADMIN to root exploit * by Dan Rosenberg * @djrbliss on twitter * * Usage: * gcc -w caps-to-root.c -o caps-to-root * sudo setcap cap_sys_admin+ep caps-to-root * ./caps-to-root * * This exploit is NOT stable: * * * It only works on 32-bit x86 machines * * *