Skip to content

a-github-username/lkmodule

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2 Commits
 
 
 
 
 
 
 
 

Repository files navigation

This program raises the permissions of the process ID though an exploit in linux kernel version
3.4. This program accepts strings to root from either the local terminal, remote terminal, or a C program
then overflows the /dev and /proc folder with devices and processes that have full root (rwx) permission.


1) Open another terminal window:
 	run:
		make
		gcc call_sys.c -o call_sys
		sudo insmod project2.ko (to insert the module)

		Once you're ready to remove the module:
		sudo rmmod project2.ko (to remove the module)

2) Open another terminal window:
   	run:
		tail -f /var/log/kern.log (to see what the kernel outputs)

3) Open another terminal window:
	run: *** NOTE YOU WILL HAVE TO RESTART YOUR SYSTEM AFTER RUNNING
		 THIS C PROGRAM, I SUGGEST STARTING WITH THE echo COMMANDS ***
		./call_sys

	OR:
		echo "let me in" > /dev/kernel_device_9001
		echo "elevate" > /dev/kernel_device_9001
		echo "elevate_current" > /dev/kernel_device_9001
		TWO MORE FUNCTIONALITIES REQUIRE THE C CODE TO RUN.


To check if it worked:

cd /proc
ls -l
cd /dev
ls -l

then try:
sudo rmmod project2.ko
sudo insmod project2.ko
New devices cannot be created because the folder has been filled.

About

Basic linux kernel module

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors