Login Register






The stories and information posted here are artistic works of fiction and falsehood. Only a fool would take anything posted here as fact.
Thread Rating:
  • 0 Vote(s) - 0 Average


Need local root exploit filter_list
Author
Message
Need local root exploit #1
Hey guys,

Been a long time I've post something. So here I am again asking you guys for a favor.

I need a local root exploit for: Linux 3.2.0-49-generic #75-Ubuntu SMP Tue Jun 18 17:39:32 UTC 2013 x86_64 

I've googled around but couldn't find a good one. Can anyone help me out here?
Thanks in advance!
Coding/Scripting knowledge: Advanced in PAWN and TI-Basic. Normal in Javascript, HTML & CSS. Basics of Python & Ruby.
Hacking knowledge: SQLi, XSS, RFI, LFI.

Reply

RE: Need local root exploit #2
Hey, that kernel seems pretty up-to-date so I think there aren't any public local root for that kernel. You could try escalating privileges with cron jobs or suid bins(I don't know how to it with suid bins.)

Good luck Smile
[Image: bAMEI93.jpg]


Jabber: charon@exploit.im

Reply

RE: Need local root exploit #3
Pretty sure that kernel is safe from the current exploits.
[Image: fSEZXPs.png]

Reply

RE: Need local root exploit #4
https://raw.github.com/realtalk/cve-2013...r/semtex.c

Reply

RE: Need local root exploit #5
(07-19-2013, 11:07 PM)w00t Wrote: https://raw.github.com/realtalk/cve-2013...r/semtex.c

Wasn't that fixed on 05/14/2013?

CVE 2013-2094
[Image: bAMEI93.jpg]


Jabber: charon@exploit.im

Reply

RE: Need local root exploit #6
Thanks for the replies, I'll try out the exploit that w00t mentioned tomorrow. I do agree that it's a pretty up-to-date kernel.
Coding/Scripting knowledge: Advanced in PAWN and TI-Basic. Normal in Javascript, HTML & CSS. Basics of Python & Ruby.
Hacking knowledge: SQLi, XSS, RFI, LFI.

Reply

RE: Need local root exploit #7
3.2.xx < 3.8.10( the first kernel with the update built-in ).

There are patches to be had to resolve that exploit, but servers aren't notorious for updating regularly.

Reply

RE: Need local root exploit #8
(07-21-2013, 05:30 PM)w00t Wrote: 3.2.xx < 3.8.10( the first kernel with the update built-in ).

There are patches to be had to resolve that exploit, but servers aren't notorious for updating regularly.

You a high nigga, that colonel is June 2013, aka immune; if he got lucky and that date is just from the build (doubt it), semtex won't pop it; you can try sorbo's exploit or brad's (grab the symbols and either hardcode them into the exploits or w/e - it's easy but good luck lmao). @OP, "I do agree that it's a pretty up-to-date kernel" - please don't talk when you have no idea what you're saying.

Go read up on format string exploitation, and unfuck the death-star.c exploit (assuming the output of sudo -V is 1.8.3 or lower?). Also check if pkexec version = under 102 or not. You can also try to fuck with mtab if fusermount is set uid. I'm going to say your best bet is to check for vuln crons and or grep for credentials that may have been reused.

Reply

RE: Need local root exploit #9
(07-22-2013, 01:27 AM)yokai Wrote: You a high nigga, that colonel is June 2013, aka immune;

No, I'm just apparently too lazy/stupid to read the entire kernel version.


There is a high probability he tried to google over 90% of the terms used in your actually helpful answer( my bad ).

"what is cron how to grep"

Reply

RE: Need local root exploit #10
(07-22-2013, 01:59 AM)w00t Wrote: No, I'm just apparently too lazy/stupid to read the entire kernel version.


There is a high probability he tried to google over 90% of the terms used in your actually helpful answer( my bad ).

"what is cron how to grep"

lolololololol; I forgot my xmpp; add me on ac1db1tch3z@exploit.im nigga

Reply







Users browsing this thread: 1 Guest(s)