Jump to content

bio.sh

Active Members
  • Posts

    102
  • Joined

  • Last visited

  • Days Won

    13

Everything posted by bio.sh

  1. Cat timp forumul nu are activitate, nu vad de ce cineva ar mai intra aici? No content, no people...pretty straight forward
  2. O razbunare pe un serviciu online se poate face in multe feluri, ai destule metode
  3. https://raw.githubusercontent.com/R00tS3c/DDOS-RootSec/master/Botnets/loader_multi.go
  4. bio.sh

    Cve-2021-4034

    POC : https://haxx.in/files/blasty-vs-pkexec.c
  5. Summary ======================================================================== We discovered a Local Privilege Escalation (from any user to root) in polkit's pkexec, a SUID-root program that is installed by default on every major Linux distribution: "Polkit (formerly PolicyKit) is a component for controlling system-wide privileges in Unix-like operating systems. It provides an organized way for non-privileged processes to communicate with privileged ones. [...] It is also possible to use polkit to execute commands with elevated privileges using the command pkexec followed by the command intended to be executed (with root permission)." (Wikipedia) This vulnerability is an attacker's dream come true: - pkexec is installed by default on all major Linux distributions (we exploited Ubuntu, Debian, Fedora, CentOS, and other distributions are probably also exploitable); - pkexec is vulnerable since its creation, in May 2009 (commit c8c3d83, "Add a pkexec(1) command"); - any unprivileged local user can exploit this vulnerability to obtain full root privileges; - although this vulnerability is technically a memory corruption, it is exploitable instantly, reliably, in an architecture-independent way; - and it is exploitable even if the polkit daemon itself is not running. Reference link : https://seclists.org/oss-sec/2022/q1/80
  6. Does your mother know what you are doing on the internet?
  7. I use my personal number because I have nothing to hide , can't advise otherwise
  8. bio.sh

    Rst Beer time?

    Personal zic da pentru ambele
  9. Q: "What makes you qualified for this position?" A: "I have no life" ....YOU'RE HIRED
  10. Facem o intrevedere prin Centru pe 20(weekendul viitor) despre bere si security (sau poate doar bere) ? Yey or ney?
  11. E si multa trolleala...dar daca esti atent gasesti multe lucruri misto
  12. https://raidforums.com/Thread-🔰-Pentester-Academy-All-Courses-🔰
  13. Curiozitate sa fie, in rest o sa-ti dai seama singur cu timpul
  14. Ai tu o tigara? jk Bine ai venit!
  15. SI uite asa mai dispar cateva sute de gb din ssd-uri #Multam
  16. eu stiu ca tigara era dupa
  17. Ai asa multa incredere in oamenii de pe net? wtf....
  18. vad ca ai .bin acolo, arde-l pe un iso sau il poti monta...have fun
×
×
  • Create New...