Results 1 to 3 of 3

Thread: Backtrack 5 R2 priv escalation 0day found in CTF exercise

Threaded View

  1. #1
    Moderated Member
    Join Date
    Dec 2011
    Posts
    1

    Default Backtrack 5 R2 priv escalation 0day found in CTF exercise

    wicd Privilege Escalation 0DayTested against Backtrack 5, 5 R2, Arch distributions Spawns a root shell. Has not been tested for potential remote exploitation vectors. Discovered by a student that wishes to remain anonymous in the course CTF. This 0day exploit for Backtrack 5 R2 was discovered by a student in the InfoSec Institute Ethical Hacking class, during an evening CTF exercise. The student wishes to remain anonymous, he has contributed a python version of the 0day, a patch that can be applied to wicd, as well as a writeup detailing the discovery and exploitation process.
    Last edited by muts; 04-11-2012 at 10:55 AM.

Similar Threads

  1. Non Priv User-Internet Access
    By k3eper in forum Beginners Forum
    Replies: 2
    Last Post: 03-01-2011, 09:52 PM
  2. Little Help with Privilege Escalation Please
    By nmslatte1985 in forum Beginners Forum
    Replies: 20
    Last Post: 01-29-2011, 03:57 AM
  3. AWBO Buffer Overflow Exercise
    By trojanrs in forum OLD Pentesting
    Replies: 16
    Last Post: 10-24-2009, 02:37 AM
  4. Privileges escalation
    By frankibo in forum OLD Pentesting
    Replies: 31
    Last Post: 02-14-2008, 11:07 AM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •