-
Notifications
You must be signed in to change notification settings - Fork 168
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Exploitation on Debian 10 cloud image #2
Comments
You were running an exploit from user that can sudo without password. |
From your log, a race is almost success ("Failed to create 2nd symbolic" message). Do you assign only 1 CPU to VM? Note: to rerun the exploit after "out of dir name", you have to remove tmp directories with "rf -rf /tmp/gogogo*" with root user |
Adding another core worked! Is it fair to say this exploit requires more than one CPU for success, or is it possible to make it work with only one? |
I expect at least 2 cores when writing an exploit but forgot adding it in requirement. |
Hi,
I was wondering if you have looked into exploitation strategies for systems based on Debian 10 cloud images, such as OpenStack. Many cloud providers use these images to deploy Debian instead of the standard downloads.
On these systems, the
nscd
service is running by default, so I'm unable to use any of the nss-based exploits. However,exploit_timestamp_race
doesn't seem to work either; the exploit fails with this message, and the gg user is nonexistent:The version of glibc seems new enough that it's not tcache related, but I could be wrong. Here is some information about the system in question. I also created a VirtualBox VM here if you ever want to play around with the cloud image I'm testing on.
The text was updated successfully, but these errors were encountered: