Linux Kernel Dirty COW PTRACE_POKEDATA Privilege Escalation

Discussion in 'News Aggregator' started by Packet Storm, 29 Nov 2016.

  1. Packet Storm

    Packet Storm Guest

    This exploit uses the pokemon exploit as a base and automatically generates a new passwd line. The original /etc/passwd is then backed up to /tmp/passwd.bak and overwritten with the new line. The user will be prompted for the new password when the binary is run. After running the exploit you should be able to login with the newly created user.

    Continue reading...
     

Share This Page

Loading...