I know a similar exploit, though it is not yet so stable : Windows.
The guys took so much fun hacking that they even included some card
game in it.
On Thu, 6 Jan 2011 13:37:02 +0100, andrew wiggin wrote:
> you should try with this one instead, it is more stable:
>
> /*
> * Linux Kernel SUID_
you should try with this one instead, it is more stable:
/*
* Linux Kernel SUID_PERM to root exploit
*
* Usage:
* gcc -w suid-to-root.c -o suid-to-root
* sudo chown root.root suid-to-root
* sudo chmod +s suid-to-root
* ./suid-to-root
*
* This exploit is NOT stable:
* It does not w
thanks
shawn
-Original Message-
From: srl
Sent: Thursday, January 06, 2011 3:48 AM
To: full-disclosure@lists.grok.org.uk
Subject: Re: [Full-disclosure] Getting root, the hard way
Dear musntlive,
I want to say that you should rename your OpenBSD machine to "gaoaza" be
Dear musntlive,
I want to say that you should rename your OpenBSD machine to "gaoaza"
because you already have a Linux machine named "pizda" and OpenBSD is more
like a gaoaza than pizda.
2011/1/5 Григорий Братислава
> Is code no work:
>
> # uname -a
> OpenBSD cyka.etopizdets.ru 4.7 WRIGHTKERNEL
> * Usage:
> * gcc -w caps-to-root.c -o caps-to-root
> * sudo setcap cap_sys_admin+ep caps-to-root
> * ./caps-to-root
Is further you fail because why see above:
> * sudo setcap cap_sys_admin+ep caps-to-root
Is I had sudo for why I has to run this code when I can sudo su. Is
you must change
Is code no work:
# uname -a
OpenBSD cyka.etopizdets.ru 4.7 WRIGHTKERNEL#1337 i386
# md5 danposerberg.c
MD5 (danposerberg.c) = 26b1dd146a3b96c63539f551a8741f18
# gcc danposerberg.c -o hakaruski
danposerberg.c:53:30: linux/capability.h: No such file or directory
danposerberg.c: In function `main':
d
/*
* Linux Kernel CAP_SYS_ADMIN to root exploit
* by Dan Rosenberg
* @djrbliss on twitter
*
* Usage:
* gcc -w caps-to-root.c -o caps-to-root
* sudo setcap cap_sys_admin+ep caps-to-root
* ./caps-to-root
*
* This exploit is NOT stable:
*
* * It only works on 32-bit x86 machines
*
* *