Penetration Testing mailing list archives
Re: Mac symlink attack techniques?
From: "Paul Melson" <pmelson () gmail com>
Date: Sat, 12 Apr 2008 12:35:49 -0400
On Fri, Apr 11, 2008 at 3:52 AM, Jon Hart <jhart () spoofed org> wrote:
I'm curious if anyone has some input on this. I am in a situation where I am able to perform a symlink attack against a process that runs as root on a Mac. The catch is that I can create files that don't exist and get them be created mode 666 for world writable goodness, but if the symlink points to a file that already exists all I can do is clobber its content with garbage. Clearly, havoc can be made by trashing important files, but I'm looking for an elegant and quick method for privilege escalation. Is /etc/ld.so.conf my only option?
You can create /etc/rc.installer_cleanup which typically doesn't usually exist, but if it does is run by init to complete software installs after reboot. If you are able to also force a reboot (or even count on one occurring at a certain time), it's pretty much game over. PaulM ------------------------------------------------------------------------ This list is sponsored by: Cenzic Need to secure your web apps NOW? Cenzic finds more, "real" vulnerabilities fast. Click to try it, buy it or download a solution FREE today! http://www.cenzic.com/downloads ------------------------------------------------------------------------
Current thread:
- Mac symlink attack techniques? Jon Hart (Apr 11)
- Re: Mac symlink attack techniques? don bailey (Apr 12)
- Re: Mac symlink attack techniques? Paul Melson (Apr 12)
- Re: Mac symlink attack techniques? Jon Hart (Apr 14)
- Re: Mac symlink attack techniques? Marco Ivaldi (Apr 14)
- Re: Mac symlink attack techniques? Jon Hart (Apr 16)