|
Full Disclosure
mailing list archives
RHEL Linux Kernel Exploit
From: Greg Whynott <gwhynott () gmail com>
Date: Wed, 15 Dec 2010 12:34:34 -0500
funny...
1. you were root when you ran the code! epic elite.
2. he said "red hat" NOT redhat based. Redhat has no control over what
others do to "redhat based" efforts.
you need more coffee! 8)
-g
musnt live spewed:
[musntlive () pizda ~]# awk '/rel/' /etc/issue
Scientific Linux SL release 5.5 (Boron)
[musntlive () pizda ~]# uname -a
Linux allotropos 2.6.18-194.3.1.el5 #1 SMP Fri May 7 01:52:57 EDT 2010
i686 athlon i386 GNU/Linux
[musntlive () pizda ~]# md5sum fullnullson.c
b16e2a647bc8de1f72f25ab29aa916da fullnullson.c
[musntlive () pizda ~]# gcc -o hakaruski fullnullson.c && ./hakaruski
[*] Failed to open file descriptors.
[musntlive () pizda ~]# id
uid=0(root) gid=0(root)
groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel),1337(hakaruskis)
[musntlive () pizda ~]# whoami
musntlive
Is this exploit work and is my Linux is RedHat based. Thank you Dan
and Ryan Seacrest!
--
--
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
- RHEL Linux Kernel Exploit Greg Whynott (Dec 15)
|