lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date: Mon, 27 Aug 2012 20:37:03 -0400
From: Wiliam Steck <codeinjection@...il.com>
To: Teguh <info@...ektronic.com>
Cc: full-disclosure@...ts.grok.org.uk
Subject: Re: The Dangerous of Fakeroot

No problem, Even pro's make mistakes.

<3

On Mon, Aug 27, 2012 at 8:33 PM, Teguh <info@...ektronic.com> wrote:

> ups, my bad
> I will check more carefully next time
> should not work on production os
> i forgot clean the shell while playing the ctf os
>
>
> On 8/28/12, Thor (Hammer of God) <thor@...merofgod.com> wrote:
> >
> > Yep, actually had a reply in my drafts. I think he's serious.  We've been
> > getting those lately.
> >
> > t
> >
> > On Aug 27, 2012, at 2:37 PM, Wiliam Steck <codeinjection@...il.com>
> wrote:
> >
> >> this will only work if the desired user is in sudo and has permissions
> to
> >> execute as root.
> >> Otherwise, this post was a huge troll to get traffic to the website this
> >> article is hosted on.
> >>
> >> [20101:20100 - 0:501] 02:31:36 [nethic@...obus:/dev/pts/9 +1] ~
> >> $ fakeroot
> >>
> >> [20209:20194 - 0:501] 02:31:39 [root@...obus:/dev/pts/9 +3] ~
> >> $ ls /root
> >> ls: cannot open directory /root: Permission denied
> >>
> >> [20209:20194 - 0:502] 02:31:47 [root@...obus:/dev/pts/9 +3] ~
> >> $ python
> >> Python 2.7.3 (default, Apr 20 2012, 22:39:59)
> >> [GCC 4.6.3] on linux2
> >> Type "help", "copyright", "credits" or "license" for more information.
> >> >>> import os
> >> >>> os.system("sudo su")
> >> ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be
> >> preloaded: ignored.
> >> [sudo] password for nethic:
> >> Sorry, try again.
> >> [sudo] password for nethic:
> >> Sorry, try again.
> >> [sudo] password for nethic:
> >> Sorry, try again.
> >> sudo: 3 incorrect password attempts
> >> 256
> >> >>> os.system("touch /root/test")
> >> touch: cannot touch `/root/test': Permission denied
> >> 256
> >>
> >> Better luck next time <3 <3 <3
> >> _______________________________________________
> >> Full-Disclosure - We believe in it.
> >> Charter: http://lists.grok.org.uk/full-disclosure-charter.html
> >> Hosted and sponsored by Secunia - http://secunia.com/
> >
> >
>

Content of type "text/html" skipped

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ