Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Need local root exploit filter_list
Author
Message
RE: Need local root exploit #11
Why do you guys have to be assholes because I, apparently, said something that wasn't acceptable to you (Referring to: 'I do agree that it's a pretty up-to-date kernel.'). You either help me or shut the fuck up, not ruin the goddamn thread.

Fucking pricks.
Coding/Scripting knowledge: Advanced in PAWN and TI-Basic. Normal in Javascript, HTML & CSS. Basics of Python & Ruby.
Hacking knowledge: SQLi, XSS, RFI, LFI.

Reply

RE: Need local root exploit #12
(07-27-2013, 08:01 PM)AnonGen Wrote: Why do you guys have to be assholes because I, apparently, said something that wasn't acceptable to you (Referring to: 'I do agree that it's a pretty up-to-date kernel.'). You either help me or shut the fuck up, not ruin the goddamn thread.

Fucking pricks.

Do you need help getting that potato out of your ass?

Reply

RE: Need local root exploit #13
(07-27-2013, 08:01 PM)AnonGen Wrote: Why do you guys have to be assholes because I, apparently, said something that wasn't acceptable to you (Referring to: 'I do agree that it's a pretty up-to-date kernel.'). You either help me or shut the fuck up, not ruin the goddamn thread.

Fucking pricks.

There are always rude people on forums, however telling people to "shut the fuck up" Won't help.

Reply

RE: Need local root exploit #14
(07-27-2013, 08:01 PM)AnonGen Wrote: Why do you guys have to be assholes because I, apparently, said something that wasn't acceptable to you (Referring to: 'I do agree that it's a pretty up-to-date kernel.'). You either help me or shut the fuck up, not ruin the goddamn thread.

Fucking pricks.

Excuse me, were you dropped on your head as a baby, apparently what I said was not useful? I educated you dumbass, and I gave you perfect advice to pop that box

"Go read up on format string exploitation, and unfuck the death-star.c exploit (assuming the output of sudo -V is 1.8.3 or lower?). Also check if pkexec version = under 102 or not. You can also try to fuck with mtab if fusermount is set uid. I'm going to say your best bet is to check for vuln crons and or grep for credentials that may have been reused. "

I'm sorry I can't spoonfeed you anymore, but I'd rather you learn..

Reply







Users browsing this thread: 1 Guest(s)