[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <27099.1128813459@www3.gmx.net>
Date: Sun Oct 9 16:01:16 2005
From: werner_schalk at gmx.de (Werner Schalk)
Subject: Local suid files and buffer overflows
Hi,
first of all apologies for asking such a newbie question but I am trying
to learn how to exploit buffer overflows and therefore wrote a little
program to exploit. This little program has the following permissions:
$ ls -la test1
-rwsr-sr-x 1 root root 17164 Oct 8 01:25 test1
Now I exploited it using Aleph One's shellcode (see
http://shellcode.org/shellcode/linux/null-free/) but I won't get a SUID
shell afterwards (I know the exploit did work but I still have my normal
user privleges). Why? I have tried a different shellcode to write a file
and this file was root:root. Any ideas, hints, rtfm?
Thank you.
Best regards,
Werner.
--
Lust, ein paar Euro nebenbei zu verdienen? Ohne Kosten, ohne Risiko!
Satte Provisionen für GMX Partner: http://www.gmx.net/de/go/partner
Powered by blists - more mailing lists