Advertisement
Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Map section is intended for quick orientation on this forum thread.
- Rules for posting blog entries about the increase privileges (https://rdot.org/forum/showthread.php?t=2097)
- Questions to improve the privilege strictly subject. (Https://rdot.org/forum/showthread.php?t=712)
- FREEBSD:
- CVE-2013-2171 - Published: 2013-06-18 - FreeBSD 9.0-9.1 mmap / ptrace Privilege Esclation Exploit (http://www.exploit-db.com/exploits/26368/)
- CVE-2013-2171 - Published: 2013-06-18 - on rdot.org (https://rdot.org/forum/showthread.php?t=2775)
- ================================================== ==================================================
- CVE-2012-0217 - Published: 2012-07-03 - FreeBSD 8.3 - 9.0 amd64 privesc @ Intel CPUs (by overxor (c) Rdot.org) (https://rdot.org/forum/showthread.php?p= 26841 # post26841)
- CVE-2012-0217 - Published: 2012-07-08 - FreeBSD 8.3 - 9.0 amd64 privesc @ Intel CPUs (by iZsh) (https://rdot.org/forum/showpost.php?p=26917&postcount=17)
- ================================================== ==================================================
- CVE-2011-4862 - Published: 2011-12-26 - FreeBSD remote root in telnetd (http://www.exploit-db.com/exploits/18280/)
- CVE-2011-4862 - Published: 2011-12-26 - on rdot.org (https://rdot.org/forum/showthread.php?t=1907)
- $ Ps ax | grep telnetd | grep -v grep
- $ Grep telnetd /etc/inetd.conf | grep -vE '^ #')
- If any output is produced, your system may be vulnerable
- ================================================== ==================================================
- CVE-2011-4062 - Published: 2011-12-20 - FreeBSD UIPC local root exploit (by overxor (c) Rdot.org) (https://rdot.org/forum/showthread.php?t=1895)
- ================================================== ==================================================
- CVE-2011-4122 - Published: 2011-12-23 - FreeBsd OpenPAM 'pam_start ()' Local Privilege Escalation Vulnerability (https://rdot.org/forum/showthread.php?t=1920)
- ls -la / usr / local / kde4 / lib / kde4 / libexec / kcheckpass
- locate kcheckpass
- which kcheckpass
- whereis kcheckpass
- ================================================== ==================================================
- CVE-2010-4210 - Published: 2010-10-04 - FreeBSD 'pseudofs' NULL Pointer Dereference Local Privilege Escalation Vulnerability (FreeBSD 7.0 - 7.2) (http://www.exploit-db.com/exploits/15206/)
- CVE-2010-2693 - Published: 2010-08-19 - FreeBSD mbufs () sendfile Cache Poisoning Privilege Escalation (http://www.exploit-db.com/exploits/14688/)
- CVE-2010-2693 - Published: 2010-08-19 - FreeBSD Kernel 7.x / 8.x mbuf M_RDONLY Privilege Escalation (http://jon.oberheide.org/files/cve-2010-2693.c)
- CVE-2010-2693 - Published: 2010-08-19 - on RDOT.ORG (https://rdot.org/forum/showthread.php?t=1413)
- CVE-2009-4146 - Published: 2009-11-30 - FreeBSD Run-Time Link-Editor Local r00t Zeroday (http://www.exploit-db.com/exploits/10255/)<===
- CVE-2009-3527 - Published: 2009-10-08 - FreeBSD 6.4 pipeclose () / knlist_cleardel () race condition exploit (http://www.exploit-db.com/exploits/9859/)
- Published: 2008-12-28 - FreeBSD 6x / 7 protosw kernel Local Privledge Escalation Exploit (http://www.exploit-db.com/exploits/7581/)
- CVE-2008-5736 - Published: 2008-12-23 - FreeBSD <= 6.4 Netgraph Local Privledge Escalation Exploit (http://www.exploit-db.com/exploits/16951/)
- LINUX:
- System.map for servers (https://rdot.org/forum/showthread.php?t=3029)
- A note about the task_struct in the kernel Linux <=== !!! (Https://rdot.org/forum/showthread.php?t=1451)
- Starting from a Web exploits the example of "Linux Kernel 2.6.23 - 2.6.24 vmsplice" (https://rdot.org/forum/showthread.php?t=57)
- CVE-2015-1328, Published: 2015-06-15
- ofs.c - overlayfs local root in ubuntu (12.04, 14.04, 14.10, 15.04) (https://rdot.org/forum/showthread.php?t=3459)
- CVE-2015-3202 - Published: 2015-05-21
- CVE-2015-3202 Linux fusermount privilege escalation via LIBMOUNT_MTAB env (https://rdot.org/forum/showthread.php?t=3440)
- CVE-2015-1318 & CVE-2015-1862 - Published: 2015-04-14
- CVE-2015-1318 & CVE-2015-1862: The crash reporting feature in Apport 2.13 through 2.17.x before 2.17.1 allows local users to gain privileges via a crafted usr / share / apport / apport file in a namespace (container) (https://www.exploit-db.com/exploits/36746/)
- CVE: 2015-1815 - Published: 2015-03-30
- CVE: 2015-1815: The get_rpm_nvr_by_file_path_temporary function in util.py in setroubleshoot before 3.2.22 allows remote attackers to execute arbitrary commands via shell metacharacters in a file name - Fedora21 setroubleshootd local root PoC (C) 2015 Sebastian Krahmer (https: // www.exploit-db.com/exploits/36564/)
- - Requires polkit authorization to add / mod VPN connections to NetworkManager (default on desktop user)
- CVE-2014-3153 - Published: 2014-06-05
- CVE-2014-3153: The futex_requeue function in kernel / futex.c in the Linux kernel from 3.0 to 3.14.5 does not ensure that calls have two different futex addresses, which allows local users to gain privileges via a crafted FUTEX_REQUEUE command that facilitates unsafe waiter modification. (Https://rdot.org/forum/showthread.php?t=3153)
- CVE-2014-3153 exploit for RHEL / CentOS 7.0.1406 (https://www.exploit-db.com/exploits/35370/)
- CVE-2014-0476 - Published: 2014-06-04
- CVE-2014-0476 chkrootkit => local root privilege escalation with exploit (https://rdot.org/forum/showthread.php?t=3152)
- Restrictions: chkrootkit running from root (for example from CRON) and / tmp not mounted noexec
- CVE-2014-0038 - Published: 2014-31-01
- CVE-2014-0038 Local root> = 3.4 CONFIG_X86_X32 (x86_64) (https://rdot.org/forum/showthread.php?t=3015)
- $ Zgrep CONFIG_X86_X32 /proc/config.gz
- $ Zcat /proc/config.gz | grep CONFIG_X86_X32
- $ Cat / boot / config-`uname -r` | grep CONFIG_X86_X32
- Exim with Dovecot RCE (OSVDB-ID: 93004) - Published: 2013-06-05
- Exim sender_address Parameter - RCE Exploit (http://www.exploit-db.com/exploits/25970/)
- Forum topic (https://rdot.org/forum/showthread.php?t=3056)
- CVE-2013-2094 - Published: 2013-05-14
- CVE-2013-2094 Linux 2.6.32 / 2.6.37 - 3.8.10 PERF_EVENTS local root (https://rdot.org/forum/showthread.php?t=2720)
- exploit -> CVE-2013-2094 Linux 2.6.32 / 2.6.37 - 3.8.10 PERF_EVENTS local root - enlightenment (http://grsecurity.net/~spender/exploits/enlightenment.tgz)
- exploit1 -> CVE-2013-2094 Linux 2.6.32 / 2.6.37 - 3.8.10 PERF_EVENTS local root - enlightenment without backconnect (c) Pashkela rdot.org (https://rdot.org/forum/showpost.php?p = 31974 & postcount = 51)
- $ Grep -i PERF_EVENTS / boot / config - $ (uname -r)
- $ Zgrep -i PERF_EVENTS /proc/config.gz
- CONFIG_HAVE_PERF_EVENTS = y
- CONFIG_PERF_EVENTS = y
- CONFIG_HAVE_PERF_EVENTS_NMI = y
- CVE-2013-1763 - Published: 2013-02-24
- CVE-2013-1763 Archlinux x86-64 3.3.x-3.7.x x86-64 sock_diag_handlers [] Local Root (c) sd (http://www.exploit-db.com/exploits/24555/)
- CVE-2013-1763 SOCK_DIAG netlink Linux kernel 3.3-3.8 exploit x86 (c) SynQ rdot.org (https://rdot.org/forum/showthread.php?t=2634)
- Ubuntu 12.10 x86 | Fedora 18 x86 - in the subject line.
- CVE-2013-0871 - Published: 2013-02-18
- CVE-2013-0871 linux kernel race condition with PTRACE_SETREGS exploit (http://lwn.net/Articles/538904/)
- forum topic (https://rdot.org/forum/showthread.php?p=30724)
- CVE-2012 -.........- Published: 2012-08-02
- CVE-2012 -.........- Published: 2012-08-02 - Nvidia Linux Driver Privilege Escalation (by Anonymous) (http://www.exploit-db.com/exploits/20201/)
- CVE-2012-3524 - Published: 2012-07-17
- libdbus 'DBUS_SYSTEM_BUS_ADDRESS' Local Privilege Escalation (http://www.exploit-db.com/exploits/21323/)
- Forum topic (https://rdot.org/forum/showthread.php?t=2417)
- su auto vector (c) Pashkela (https://rdot.org/forum/showthread.php?p=30443#post30443#post30442)
- CVE-2012-2982 - Published: 2012-07-10
- RCE with root rights in Webmin <= 1.590 (https://rdot.org/forum/showthread.php?t=2428)
- CVE-2012-0056 - Published: 2012-01-21
- Mempodipper - Linux Local Root for> = 2.6.39, 32-bit and 64-bit / proc / pid / mem (https://rdot.org/forum/showthread.php?t=1951)
- CVE-2011-4124 - Published: 2011-11-02
- CVE-2011-4124 - Calibre E-Book Reader Local Root Exploit (calibre-mount-helper) # 1 (http://www.exploit-db.com/exploits/18064/)
- CVE-2011-4124 - Calibre E-Book Reader Local Root Exploit (calibre-mount-helper) # 2 (http://www.exploit-db.com/exploits/18086/)
- CVE-2011-4124 - http://crazycoders.com/2011/11/calibre-e-book-reader-local-root-exploitz/ (http://crazycoders.com/2011/11/calibre-e-book -reader-local-root-exploitz /)
- CVE-2011-1485 - Published: 2011-04-01 - Vulnerability PolicyKit:
- Discussion at the forum + exploit by SynQ (c) Rdot.org (https://rdot.org/forum/showthread.php?t=1478)
- Exploit polkit-pwnage.c by zx2c4 (https://rdot.org/forum/showpost.php?p=20384&postcount=3)
- Exploit proven in combat conditions (https://rdot.org/forum/showpost.php?p=26961&postcount=9)<===
- http://www.exploit-db.com/exploits/17942/
- http://www.securityfocus.com/bid/47496/exploit
- Published: 2011-01-05 - Methods of raising rights through CAPS:
- Linux Kernel CAP_SYS_ADMIN to Root Exploit 2 (32 and 64-bit) - Published: 2011-01-08 (http://www.exploit-db.com/exploits/15944//)
- Linux Kernel CAP_SYS_ADMIN to root Exploit (It only works on 32-bit x86 machines, by Dan Rosenberg) (http://www.exploit-db.com/exploits/15916/)
- https://rdot.org/forum/showthread.php?t=1093
- Exploit caps-to-root.c (https://rdot.org/forum/showpost.php?p=12081&postcount=2)
- CVE-2010-3847 - Published: 2010-10-15 - Vulnerability Glibc:
- The theme is fully (https://rdot.org/forum/showthread.php?t=817)
- Symbolic links (https://rdot.org/forum/showpost.php?p=8233&postcount=1) (operation (https://rdot.org/forum/showpost.php?p=8239&postcount=2))
- using libpcprofile.so (https://rdot.org/forum/showpost.php?p=8449&postcount=8)
- using libmemusage.so (https://rdot.org/forum/showpost.php?p=19265&postcount=21)
- three in one at Bache without bekkonekta (https://rdot.org/forum/showpost.php?p=20173&postcount=30)<===
- and all this only works if glibc> = 2.4
- Details here (https://rdot.org/forum/showpost.php?p=23147&postcount=47)
- CVE-2010-4344 - Published: 2010-12-11 - Exim
- CVE-2010-4344 - Exim <= 4.70 Remote Root Exploit (hoagie_exim_string_vformat.c) (http://void.at/exploits/hoagie_exim_string_vformat.c)
- CVE-2010-4344 - Exim 4.63 Remote Root Exploit (http://www.exploit-db.com/exploits/15725/)
- Forum topic (operation example in version 4.69) (https://rdot.org/forum/showthread.php?t=2315)
- CVE-2010-4221 - Published: 2010-10-29 - ProFTPD before 1.3.3c
- CVE-2010-4221 - proftpd IAC remote r00t exploit by kingcope (stack-based buffer overflows in ProFTPD before 1.3.3c) (http://downloads.securityfocus.com/vulnerabilities/exploits/44562.pl)
- Forum topic / Rdot.org (https://rdot.org/forum/showthread.php?t=865)
- CVE-2010-4170 - Published: 2010-11-26 - Vulnerability staprun:
- $ Ls -lha / usr / bin / staprun
- --- S - x - x 1 root root 63012 Mar 23, 2010 / usr / bin / staprun
- party Comment Forum (https://rdot.org/forum/showpost.php?p=18637&postcount=82)
- http://www.exploit-db.com/exploits/15620/
- CVE-2010-3904 - Published: 2010-10-19 - Linux RDS Protocol Local Privilege Escalation (> = 2.6.30-2.6.36rc8 19.10.2010):
- CVE-2010-3904 - Linux RDS Protocol Local Privilege Escalation (by Dan Rosenberg) (http://www.exploit-db.com/exploits/15285/)
- Forum topic (https://rdot.org/forum/showthread.php?t=820)
- #define AF_RDS 21
- #define PF_RDS AF_RDS
- CVE-2010-3081 - Published: 2010-09-16 (> = 2.6.26 x86_64)
- Ac1dB1tCh3z original (http://www.exploit-db.com/exploits/15024/)
- 5 Ac1dB1tCh3z for Debian lenny (by SynQ (c) Rdot.org) (https://rdot.org/forum/showthread.php?t=1597)
- CVE-2010-4347 - Published: 2010-12-18 - / sys / kernel / debug / acpi / custom_method
- CVE-2010-4347 - Linux Kernel 2.6.33 <= x <2.6.37-rc2 x86_64 ACPI custom_method Privilege Escalation (american-sign-language) (http://www.exploit-db.com/exploits/15774/)
- CVE-2010-4347 - Linux Kernel 2.6.33 <= x <2.6.37-rc2 32-bit ACPI custom_method Privilege Escalation (by SynQ (c) Rdot.org) (https://rdot.org/forum/showthread. php? p = 16933 # post16933)
- CVE-2010-4347 - OpenSUSE 11.3 x86 (by SynQ (c) Rdot.org) (https://rdot.org/forum/showpost.php?p=16930&postcount=9)
- CVE-2010-4258 - Published: 2010-12-07
- CVE-2010-4258 - Linux Kernel <= 2.6.37 Local Privilege Escalation (full-nelson, by Dan Rosenberg) 2.6.29 - 2.6.36.2
- (Http://www.exploit-db.com/exploits/15704/)
- CVE-2010-3301 - Published: 2010-09-16
- CVE-2010-3301 - Linux Kernel x86_64 ia32syscall Emulation Privilege Escalation (robert_you_suck) kernel> = 2.6.29 (http://www.exploit-db.com/exploits/15023/)
- CVE-2010-4073 - Published: 2011-09-05
- CVE-2010-4073 - Linux Kerne x86_64 Econet Privilege Escalation Exploit (half-nelson) kernel 2.6.29 - 2.6.36.2 (http://www.exploit-db.com/exploits/17787/)
- CVE-2010-2959 - Published: 2010-08-27
- CVE-2010-2959 - Linux Kernel <2.6.36-rc1 CAN BCM Privilege Escalation Exploit (i-can-haz-modharden) kernel> = 2.6.29 (http://www.exploit-db.com/exploits/14814 /)
- CVE-2010-0832 - Published: 2010-07-12
- CVE-2010-0832 - Ubuntu PAM MOTD Local Root Exploit (http://www.exploit-db.com/exploits/14339/)
- CVE-2010-2961 - Published: 2010-09-08
- CVE-2010-2961 - Ubuntu Linux 'mountall' Local Privilege Escalation Vulnerability (http://downloads.securityfocus.com/vulnerabilities/exploits/43084.txt)
- CVE-2009-3547 - Published: 2009-11-05
- CVE-2009-3547 - Linux 2.6.x fs / pipe.c local kernel root exploit (x86) (http://crazycoders.com/2012/01/local-x86-fasync-struct-local-pipe-buffer-exploit -nonot-fasync_helper-thts-still-not-patched-this-is-fasync_structmagikal /)
- CVE-2009-2698 - Published: 2009-09-02
- CVE-2009-2698 - Linux Kernel 2.6 <2.6.19 (32bit) ip_append_data () ring0 Root Exploit (http://www.exploit-db.com/exploits/9542/)<===
- CVE-2009-1895 - Published: 2009-07-13 (before 2.6.31-rc3)
- CVE-2009-1895 - Linux kernel PER_CLEAR_ON_SETID Personality Bypass (CTRL + F "babcia padlina") (http://www.win.tue.nl/~aeb/linux/hh/hh-12.html)
- http://xorl.wordpress.com/2009/07/16/cve-2009-1895-linux-kernel-per_clear_on_setid-personality-bypass/
- http://blog.cr0.org/2009/06/bypassing-linux-null-pointer.html
- CVE-2009-1185 - Published: 2009-04-30
- CVE-2009-1185 - Linux Kernel 2.6 UDEV <141 Local Privilege Escalation Exploit (http://www.exploit-db.com/exploits/8572/)
- $ Ls -la /etc/udev/rules.d/95-udev-late.rules 2> & 1
- $ Ls -la /lib/udev/rules.d/95-udev-late.rules 2> & 1
- CVE-2009-2692 - Published: 2009-08-24
- Linux Kernel 2.4 / 2.6 sock_sendpage () ring0 Root Exploit (simple ver) (http://www.exploit-db.com/exploits/9479/)
- Linux Kernel 2.4> = 2007 RHEL 3 (by SynQ (c) Rdot.org) (https://rdot.org/forum/showpost.php?p=26327&postcount=441)
- [OLD-UPDATED]: NULL pointer deref x86_64 / x86 / x64 / PPC Linux sock_sendpage () and PPC64 (MMAP redone v2) + READ About using vmap () (http://crazycoders.com/2011/11/old-linux -sock_sendpage-null-pointer-deref-x86_64x86x64ppc-and-ppc64-mmap-redone /)
- linux-sendpage2 - Published: 2009-09-09
- linux-sendpage2 (http://www.exploit-db.com/sploits/2009-linux-sendpage2.tar.gz)
- linux-sendpage3 - Published: 2009-08-31
- linux-sendpage3 (http://www.exploit-db.com/exploits/9545/)
- CVE: 2009-1337 - Published: 2009-04-08 <2.6.29 exit_notify ()
- http://www.exploit-db.com/exploits/8369/
- CVE-2008-568 - Published: 2011-01-10
- CVE-2008-568 - LOCAL SOLARIS KERNEL ROOT EXPLOIT (<5.10 138888-01) (http://www.exploit-db.com/exploits/15962/)
- CVE-2008-0009 - Published: 2008-02-09
- CVE-2008-0009 - Linux Kernel 2.6.17 - 2.6.24.1 vmsplice Local Root Exploit (http://www.exploit-db.com/exploits/5092/)
- Tools:
- Automating the collection of information on the server.
- https://rdot.org/forum/showthread.php?t=2014
- https://rdot.org/forum/attachment.php?attachmentid=280&d=1343389768
- Enlightenment - Linux Null PTR Dereference Exploit Framework
- Choose your exploit:
- [0] Cheddar Bay: Linux 2.6.30 / 2.6.30.1 / dev / net / tun local root
- [1] MooseCox: Linux <= 2.6.31.5 pipe local root
- [2] Paokara: Linux 2.6.19-> 2.6.31.1 eCryptfs local root
- [3] Powerglove: Linux 2.6.31 perf_counter local root
- [4] The Rebel: Linux <2.6.19 udp_sendmsg () local root
- [5] CVE-2009-2267: VMWare vm86 guest local root
- [6] Wunderbar Emporium: Linux 2.X sendpage () local root
- Forum topic (https://rdot.org/forum/showthread.php?t=153)
- http://grsecurity.net/~spender/exploits/enlightenment.tgz
- Terms: cat / proc / sys / vm / mmap_min_addr = 0 or is missing
- CLEANING Lair:
- WhiteCat logcleaner version 1.0 [edition] (https://rdot.org/forum/showthread.php?t=1179)
- Log-Wipers (https://rdot.org/forum/showthread.php?t=213)
- Fastening system:
- Discussion keyloggers (https://rdot.org/forum/showthread.php?t=1088)
- The wrapper for su (https://rdot.org/forum/showthread.php?t=788)
- LD_PRELOAD magic. (Https://rdot.org/forum/showthread.php?t=1305)
- Ping Backdoor (https://rdot.org/forum/showthread.php?p=21738)
- dropbear backdoor (https://rdot.org/forum/showthread.php?t=1955)
- More useful links:
- http://www.win.tue.nl/~aeb/linux/hh/hh.html
- http://www.exploit-db.com/local/
- http://www.securityfocus.com/vulnerabilities
- https://bugzilla.redhat.com/query.cgi
- http://xorl.wordpress.com/
- http://th3-0utl4ws.com/localroot/
- http://pool-27-1.na.tl:90/Local_Root_Exploits/
- http://poc-hack.blogspot.ru/2012/08/kioptrix-hacking-challenge-level-1-part.html <== Video
- http://g0tmi1k.blogspot.ru/2012/09/video-21ltr-scene-1.html <== advanced person writes video, a lot of them out there
- Scanned the network to locate the target [Net Discover]
- Port scanned the target to discover services
- Banner grabbed the services running on the open port (s) [NMap]
- Interacted with the web server by testing the default page, then brute forced to discover folders & files in the web root [Firefox & DirB]
- Cloned the FTP root folder with credentials learned from the web service [ftp]
- Analysed the 'loot' collected from the FTP service, in which to locate an additional file positioned on the web server [grep & cURL]
- Impersonated 'Dev Server Backup', and waited for the target to communicate to the attacker using the information collected from the FTP & Web services [Unicorn Scan & IPTables & NetCat]
- Injected a PHP payload into the backup logs, creating a backdoor into the system [Netcat & WebHandler]
- Discovered unprotected SSH credentials, which, as it turns out are for a 'privileged' account
- [U] Used a kernel exploit to modify a restricted file to view what additional functions the wheel group can execute [UDEV]
- Downloaded the user credentials for the operating system and brute forced the passwords [John The Ripper]
- Remote logged back into the system via SSH and logged in with valid credentials for the super user
- Discovered the flag in a different user's home folder, which has been deleted but not yet, removed from the operating system
- Explored the 'backup service' which was also triggered at the same time as the log port.
- Other methods of increasing privileges:
- nginx.conf writable (https://rdot.org/forum/showthread.php?p=29581)
- suid IPTABLES (example how to be pro) (https://rdot.org/forum/showthread.php?t=3342)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement