[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <AANLkTi=fRPDmWZs17YRPZRBUcmUf570tB96Fgr3vLoxF@mail.gmail.com>
Date: Wed, 15 Dec 2010 12:34:34 -0500
From: Greg Whynott <gwhynott@...il.com>
To: musnt live <musntlive@...il.com>, full-disclosure@...ts.grok.org.uk
Subject: RHEL Linux Kernel Exploit
funny...
1. you were root when you ran the code! epic elite.
2. he said "red hat" NOT redhat based. Redhat has no control over what
others do to "redhat based" efforts.
you need more coffee! 8)
-g
musnt live spewed:
[musntlive@...da ~]# awk '/rel/' /etc/issue
Scientific Linux SL release 5.5 (Boron)
[musntlive@...da ~]# uname -a
Linux allotropos 2.6.18-194.3.1.el5 #1 SMP Fri May 7 01:52:57 EDT 2010
i686 athlon i386 GNU/Linux
[musntlive@...da ~]# md5sum fullnullson.c
b16e2a647bc8de1f72f25ab29aa916da fullnullson.c
[musntlive@...da ~]# gcc -o hakaruski fullnullson.c && ./hakaruski
[*] Failed to open file descriptors.
[musntlive@...da ~]# id
uid=0(root) gid=0(root)
groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel),1337(hakaruskis)
[musntlive@...da ~]# whoami
musntlive
Is this exploit work and is my Linux is RedHat based. Thank you Dan
and Ryan Seacrest!
--
--
Content of type "text/html" skipped
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists