Home page logo
/

fulldisclosure logo Full Disclosure mailing list archives

Re: Local suid files and buffer overflows
From: Eduardo Tongson <propolice () gmail com>
Date: Mon, 10 Oct 2005 06:25:15 +0000

Hi,

first of all apologies for asking such a newbie question but I am trying
to learn how to exploit buffer overflows and therefore wrote a little
program to exploit. This little program has the following permissions:

$ ls -la test1
-rwsr-sr-x  1 root root 17164 Oct  8 01:25 test1

Now I exploited it using Aleph One's shellcode (see
http://shellcode.org/shellcode/linux/null-free/) but I won't get a SUID
shell afterwards (I know the exploit did work but I still have my normal
user privleges). Why? I have tried a different shellcode to write a file
and this file was root:root. Any ideas, hints, rtfm?

Thank you.


Use a setreuid/setuid shellcode <http://shellcode.org/shellcode/linux/setuid/>

-ed
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]