Page 2 of 3 FirstFirst 123 LastLast
Results 11 to 20 of 21

Thread: Little Help with Privilege Escalation Please

  1. #11
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010
    Posts
    2,943

    Default Re: Little Help with Privilege Escalation Please

    Quote Originally Posted by Sys7emR00t View Post
    Can you give an example of this kind of exploit? Thanks!
    Here. And here. Here too.

    Just search exploit DB for local Linux exploits mentioning privilege escalation (or just privilege, like this search).
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

  2. #12
    Junior Member
    Join Date
    Oct 2010
    Posts
    45

    Default Re: Little Help with Privilege Escalation Please

    Quote Originally Posted by lupin View Post
    Here. And here. Here too.
    None of these are shell code...they all look like C Programs that you have to compile and run- you said there was shell codes to launch a root shell. ? Thanks.

  3. #13
    Moderator KMDave's Avatar
    Join Date
    Jan 2010
    Posts
    2,281

    Default Re: Little Help with Privilege Escalation Please

    Not every exploit has to have shellcode, especially a local priv escalation one.
    Tiocfaidh ár lá

  4. #14
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010
    Posts
    2,943

    Default Re: Little Help with Privilege Escalation Please

    Quote Originally Posted by Sys7emR00t View Post
    you said there was shell codes to launch a root shell. ?
    When did I say that? The only place I can find in this thread where I even mentioned shellcode is in post 4 responding to the OP who was talking about seeing mostly shellcode in the local exploits he saw. In that post I only meant that IF the OP was actually looking at privilege escalation exploits that contained shellcode, there should be more to it than JUST shellcode.

    The majority of Linux privilege escalation exploits I have seen have not used shellcode at all...
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

  5. #15
    Junior Member
    Join Date
    Oct 2010
    Posts
    45

    Default Re: Little Help with Privilege Escalation Please

    Quote Originally Posted by lupin View Post
    Most privilege escalation exploits are run from a shell and they then give that shell root privileges. Some work slightly differently, but for the most part thats what happens. So you just need shell access on the system, then you transfer the privilege escalation exploit there and run it, and if it works your shell should end up wth root privilege.
    Sorry, perhaps I misunderstood...I'm looking for this ^.

  6. #16
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010
    Posts
    2,943

    Default Re: Little Help with Privilege Escalation Please

    Quote Originally Posted by Sys7emR00t View Post
    Sorry, perhaps I misunderstood...I'm looking for this ^.
    See post 11.
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

  7. #17
    Junior Member
    Join Date
    Aug 2010
    Posts
    34

    Default Re: Little Help with Privilege Escalation Please

    The exploit is always going to be a program, never just raw shellcode. The shellcode is merely a a string of pure machine code that performs a certain task (usually opens a shell, but can open calc.exe or anything).

    With a privilege escalation exploit, you're going to download the exploit code, compile it, and then just ./exploit, and it'll either work or it won't.

  8. #18
    Junior Member
    Join Date
    Oct 2010
    Posts
    45

    Default Re: Little Help with Privilege Escalation Please

    Quote Originally Posted by falseteeth View Post
    The exploit is always going to be a program, never just raw shellcode. The shellcode is merely a a string of pure machine code that performs a certain task (usually opens a shell, but can open calc.exe or anything).

    With a privilege escalation exploit, you're going to download the exploit code, compile it, and then just ./exploit, and it'll either work or it won't.
    This is what I'm looking for. I figured raw shellcode didn't make sense. Problem is, with a limited account one may not be able to download a compiler. Any easy way to compile C from the command line or something?

  9. #19
    Junior Member wh1t3fang's Avatar
    Join Date
    Nov 2010
    Location
    from the internet
    Posts
    75

    Default Re: Little Help with Privilege Escalation Please

    The exploits listed are like the simplest exploits to run on exploit-db. you just compile and run them. you can use gcc. it takes 2 mins at the most . If the exploits dosent work then you dont have the vulnerable services that the exploit takes advantage of.
    wh1t3 fang

  10. #20
    Super Moderator lupin's Avatar
    Join Date
    Jan 2010
    Posts
    2,943

    Default Re: Little Help with Privilege Escalation Please

    Quote Originally Posted by Sys7emR00t View Post
    This is what I'm looking for. I figured raw shellcode didn't make sense. Problem is, with a limited account one may not be able to download a compiler. Any easy way to compile C from the command line or something?
    If the target system doesn't have a compiler already installed (such as gcc, which is run from the command line btw) you can try compiling the exploit elsewhere and transferring it over in binary form. You need to make sure you compile the binary for the same architecture and platform as the target system though, so its generally better to compile on the target itself if a compiler is available.
    Last edited by lupin; 01-28-2011 at 01:09 PM.
    Capitalisation is important. It's the difference between "Helping your brother Jack off a horse" and "Helping your brother jack off a horse".

    The Forum Rules, Forum FAQ and the BackTrack Wiki... learn them, love them, live them.

Page 2 of 3 FirstFirst 123 LastLast

Similar Threads

  1. Replies: 1
    Last Post: 08-19-2010, 04:42 PM
  2. HELP - Escalate privilege in (well configured) Windows.
    By The Dan in forum OLD Pentesting
    Replies: 22
    Last Post: 10-11-2008, 10:20 PM
  3. Privileges escalation
    By frankibo in forum OLD Pentesting
    Replies: 31
    Last Post: 02-14-2008, 11:07 AM

Tags for this Thread

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •