|
Full Disclosure
mailing list archives
Re: RHEL Linux Kernel Exploit
From: rancor <therancor () gmail com>
Date: Wed, 15 Dec 2010 20:44:16 +0100
-g.... "musnt live" is a parody of "must live"... humor this =)
// rancor
2010/12/15 Greg Whynott <gwhynott () gmail com>
funny...
1. you were root when you ran the code! epic elite.
2. he said "red hat" NOT redhat based. Redhat has no control over what
others do to "redhat based" efforts.
you need more coffee! 8)
-g
musnt live spewed:
[musntlive () pizda ~]# awk '/rel/' /etc/issue
Scientific Linux SL release 5.5 (Boron)
[musntlive () pizda ~]# uname -a
Linux allotropos 2.6.18-194.3.1.el5 #1 SMP Fri May 7 01:52:57 EDT 2010
i686 athlon i386 GNU/Linux
[musntlive () pizda ~]# md5sum fullnullson.c
b16e2a647bc8de1f72f25ab29aa916da fullnullson.c
[musntlive () pizda ~]# gcc -o hakaruski fullnullson.c && ./hakaruski
[*] Failed to open file descriptors.
[musntlive () pizda ~]# id
uid=0(root) gid=0(root)
groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel),1337(hakaruskis)
[musntlive () pizda ~]# whoami
musntlive
Is this exploit work and is my Linux is RedHat based. Thank you Dan
and Ryan Seacrest!
--
--
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
By Date
By Thread
Current thread:
|