-
Notifications
You must be signed in to change notification settings - Fork 237
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
more targets #2
Comments
Finding target can't be trivially explained in a comment. I suggest reading this excellent writeup https://www.kalmarunionen.dk/writeups/sudo/ as it covers the same exploitation strategy as this exploit. As far as setting environment variables in gdb goes, you can use |
I have been using (I have been pondering the libnss overwrite for a while now, the writeup is exactly what I was looking for thx:) |
Not so easy...especially if tcache is not supported by the glibc version in use. Introduce fastbins abuse will be valuable and appreciated. Thanks in advance |
Do you mind sharing your approach to find the target? Or let me know how do you set the env with all the multiple backslashes before calling sudoedit? I understand the exploit, but I don't know how to set the env for multiple
\
(I mean from C yes, but for manual gdb invocation not really). Thank you.The text was updated successfully, but these errors were encountered: