-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathreadme
More file actions
41 lines (31 loc) · 1.16 KB
/
readme
File metadata and controls
41 lines (31 loc) · 1.16 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
This program raises the permissions of the process ID though an exploit in linux kernel version
3.4. This program accepts strings to root from either the local terminal, remote terminal, or a C program
then overflows the /dev and /proc folder with devices and processes that have full root (rwx) permission.
1) Open another terminal window:
run:
make
gcc call_sys.c -o call_sys
sudo insmod project2.ko (to insert the module)
Once you're ready to remove the module:
sudo rmmod project2.ko (to remove the module)
2) Open another terminal window:
run:
tail -f /var/log/kern.log (to see what the kernel outputs)
3) Open another terminal window:
run: *** NOTE YOU WILL HAVE TO RESTART YOUR SYSTEM AFTER RUNNING
THIS C PROGRAM, I SUGGEST STARTING WITH THE echo COMMANDS ***
./call_sys
OR:
echo "let me in" > /dev/kernel_device_9001
echo "elevate" > /dev/kernel_device_9001
echo "elevate_current" > /dev/kernel_device_9001
TWO MORE FUNCTIONALITIES REQUIRE THE C CODE TO RUN.
To check if it worked:
cd /proc
ls -l
cd /dev
ls -l
then try:
sudo rmmod project2.ko
sudo insmod project2.ko
New devices cannot be created because the folder has been filled.