Have an account?
It looks like you're new here. If you want to get involved, click one of these buttons!
Apply for Membership
Who's Online (1)
Looking to introduce yourself? Look no further, and click here! We also have IRC! [irc.evilzone.org #iexploit]
Need a bit of help .
Please someone cane give me a working exploit for this kernel . Have tried allot of exploits but could not get root.. All publix exploits are bad or i am dooing something wrong
(Unix) mod_ssl/2.0.63 OpenSSL/0.9.8e-fips-rhel5 DAV/2
mod_auth_passthrough/2.1 mod_bwlimited/1.4 FrontPage/18.104.22.16835
Kernel: Linux 2.6.18-238.el5PAE
SMP Thu Jan 13 17:10:20 EST 2011 i686
What exploits have you tried?
all 2.6.18 kernel exploits .or i got permission denied with 777 mod or the exploits failure .
-Gabber, I can't speak for the failure of the other exploits, but a permission denied error can be remedied by doing a, "chmod("/somedir/somefile", 777);" from your webshell (assuming you have one up). Also, take note that the chmod I'm talking about is the php chmod function. I've never ran into problems when doing it this way. As for your exploits, make sure they are utilizing resources from the same OS as your target's. A lot of those privilege escalation exploits will have a generic title, and use libraries/calls from a different OS. For example, you use an exploit that has SUSE libraries in it, and then you try and use it on a Debian OS and it doesn't work.
while( !(succeed = try() ) );
Well happy hunting !!, a lot of public exploits are a pain to begin with, if you know the vuln then try to code one on the fly
Invincibility lies in the defense; the possibility of victory in the attack.
Add a Comment