Full Disclosure mailing list archives

Re: RHEL Linux Kernel Exploit


From: rancor <therancor () gmail com>
Date: Wed, 15 Dec 2010 20:44:16 +0100

-g.... "musnt live" is a parody of "must live"... humor this =)

// rancor

2010/12/15 Greg Whynott <gwhynott () gmail com>

funny...
1. you were root when you ran the code!  epic elite.
2. he said "red hat"  NOT redhat based.   Redhat has no control over what
others do to "redhat based" efforts.
you need more coffee!  8)

-g




musnt live spewed:

[musntlive@pizda ~]# awk '/rel/' /etc/issue
Scientific Linux SL release 5.5 (Boron)
[musntlive@pizda ~]# uname -a
Linux allotropos 2.6.18-194.3.1.el5 #1 SMP Fri May 7 01:52:57 EDT 2010
i686 athlon i386 GNU/Linux
[musntlive@pizda ~]# md5sum fullnullson.c
b16e2a647bc8de1f72f25ab29aa916da  fullnullson.c
[musntlive@pizda ~]# gcc -o hakaruski fullnullson.c && ./hakaruski
[*] Failed to open file descriptors.
[musntlive@pizda ~]# id
uid=0(root) gid=0(root)

groups=0(root),1(bin),2(daemon),3(sys),4(adm),6(disk),10(wheel),1337(hakaruskis)
[musntlive@pizda ~]# whoami
musntlive

Is this exploit work and is my Linux is RedHat based. Thank you Dan
and Ryan Seacrest!



--
--

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/

Current thread: