Jump to content
Nytro

CSAW CTF 2013 Kernel Exploitation Challenge

Recommended Posts

CSAW CTF 2013 Kernel Exploitation Challenge

Table of Contents

Introduction

CSAW CTF 2013 was last weekend, and this year I was lucky enough to be named a judge for the competition. I decided to bring back the Linux kernel exploitation tradition of previous years and submitted the challenge “Brad Oberberg.” Four of the 15 teams successfully solved the challenge.

Each team was presented with unprivileged access to a live VM running 32-bit Ubuntu 12.04.3 LTS. The vulnerable kernel module csaw.ko was loaded on each system, and successful exploitation would allow for local privilege escalation and subsequent reading of the flag. Source code to the kernel module was provided to each team, and may be viewed below (or downloaded here).

Sursa: CSAW CTF 2013 Kernel Exploitation Challenge | Michael Coppola's Blog

E cu rezolvari.

Link to comment
Share on other sites

Cred ca nu toti au inteles cum functioneaza. Csaw este un modul kernel care odata incarcat permite escaladarea privilegiilor. csaw.ko (the fucking kernel module) nu exista default pe linux, el este un "sukit" si face exact ce am spus: permite escaladarea privilegiilor cu ajutorul acelui exploit (adica poti oricand sa obtii drepturi de super user, atata timp cat modulul este incarcat in kernel)

// sidenote:

- modul kernel = LKM (loadable kernel module)

- incarcare / inserare (modprobe/insmod)

- vizualizare module kernel incarcate (lsmod)

Hai ca nu e greu, pe cuvant. NU ne mai invadati cu cerinte, chestia este un proof of concept, nu este destinata celor care dau cu scanul si fac psybnc-uri pe servere sparte.

// offtopic:

@l3tmeb3: cc brain.c -o brain ; de aici:


-o <file> Place the output into <file>

Edited by aelius
Link to comment
Share on other sites

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...