bio.sh
Active Members-
Posts
102 -
Joined
-
Last visited
-
Days Won
13
Everything posted by bio.sh
-
reset to factory?
-
Cat timp forumul nu are activitate, nu vad de ce cineva ar mai intra aici? No content, no people...pretty straight forward
-
O razbunare pe un serviciu online se poate face in multe feluri, ai destule metode
-
https://raw.githubusercontent.com/R00tS3c/DDOS-RootSec/master/Botnets/loader_multi.go
-
POC : https://haxx.in/files/blasty-vs-pkexec.c
-
Summary ======================================================================== We discovered a Local Privilege Escalation (from any user to root) in polkit's pkexec, a SUID-root program that is installed by default on every major Linux distribution: "Polkit (formerly PolicyKit) is a component for controlling system-wide privileges in Unix-like operating systems. It provides an organized way for non-privileged processes to communicate with privileged ones. [...] It is also possible to use polkit to execute commands with elevated privileges using the command pkexec followed by the command intended to be executed (with root permission)." (Wikipedia) This vulnerability is an attacker's dream come true: - pkexec is installed by default on all major Linux distributions (we exploited Ubuntu, Debian, Fedora, CentOS, and other distributions are probably also exploitable); - pkexec is vulnerable since its creation, in May 2009 (commit c8c3d83, "Add a pkexec(1) command"); - any unprivileged local user can exploit this vulnerability to obtain full root privileges; - although this vulnerability is technically a memory corruption, it is exploitable instantly, reliably, in an architecture-independent way; - and it is exploitable even if the polkit daemon itself is not running. Reference link : https://seclists.org/oss-sec/2022/q1/80
-
Does your mother know what you are doing on the internet?
-
I use my personal number because I have nothing to hide , can't advise otherwise
-
Personal zic da pentru ambele
-
Q: "What makes you qualified for this position?" A: "I have no life" ....YOU'RE HIRED
-
Facem o intrevedere prin Centru pe 20(weekendul viitor) despre bere si security (sau poate doar bere) ? Yey or ney?
-
E si multa trolleala...dar daca esti atent gasesti multe lucruri misto
-
Google is one heck of a tool
-
https://raidforums.com/Thread-🔰-Pentester-Academy-All-Courses-🔰
-
Curiozitate sa fie, in rest o sa-ti dai seama singur cu timpul
-
Ai tu o tigara? jk Bine ai venit!
-
SI uite asa mai dispar cateva sute de gb din ssd-uri #Multam
- 2 replies
-
- 1
-
- ethical hacking
- security training
-
(and 1 more)
Tagged with:
-
ma-ta stie ce faci pe net?
-
eu stiu ca tigara era dupa
-
Ai asa multa incredere in oamenii de pe net? wtf....
-
Angajari MApN - Universitatea Nationala de Aparare „Carol I”
bio.sh replied to Karadu's topic in Locuri de munca
salariu maxim 40 de bete, garantez -
vad ca ai .bin acolo, arde-l pe un iso sau il poti monta...have fun