亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频

? 歡迎來到蟲蟲下載站! | ?? 資源下載 ?? 資源專輯 ?? 關于我們
? 蟲蟲下載站

?? telnet hole.txt

?? 當今
?? TXT
字號:
發信人: biff (大可), 信區: Security 

標  題: telnet hole 

發信站: 武漢白云黃鶴站 (Sun Jun 13 14:56:27 1999), 站內信件 

  

  

INTRODUCTION: 

Gday. This tar file contains a number of files that will allow you 

to get root access to between 40% to 70% of all Unix machines. 

  

  

  

telnetd_exploit.tar.gz 

  

  

  

  

It does this by exploiting a hole/feature in telnetd where environment 

variables are passed from the calling telnet client, to the recieving telnet 

daemon. These are normal env variables, such as TERM and TZ. However, there 

are a few which affect the runtime linker/loader (ld.so). These variables 

affect how ld.so finds and uses shared libraries. 

  

EXPLANATION: 

Most programs are written and compiled and only contain code the author has 

written. Standard functions such as printf and strncpy are stored in runtime 

libraries. When the program is initiated, a runtime linker adds in these 

little bits of code. The main benefit is that lots of work is saved. An 

author doesn't need to re-write printf every program he writes. These 

libraries of pre-written functions are called shared object libraries. When 

a program is written to use these, that program is called a dynamically 

linked program. That is it will dynamically load functions as and when it 

need them. 

  

We can exploit this hole in ld.so by specifying our own library functions. 

In fact, this code replaces two standard C library functions, openlog and 

getpass. 

  

getpass is used when a program wants a password to be entered, without 

echoing to the display. openlog was added because some systems have a 

different way of initiating logins. 

  

The main crux is that both of these functions are executed when login (which 

is called when telnetd finds an incoming connection) is running as root. Any 

code which is executed then will be executed as root. My two trojan 

functions simply execute /bin/sh as uid 0. 

  

getpass is used in a normal /bin/login and is called after you enter your 

login name. Some systems that use shadow passwording will find (if you 

examine the source) that getpass isn't used. To circumvent this, we add 

openlog which, if a site is shadowed is probably going to be compiled in. 

This is the default with the shadow setups I've seen. 

  

METHOD: 

  

Method One (If you have an account on the machine you want root on. Try this 

            first.) 

  

(1) gunzip and untar the source into a directory, eg /home/squidge/lib_hack 

(2) compile the programs by typing make all 

(3) wait 

(4) you will have a file /tmp/.libroot.so 

(5) type telnet 

(6) at the telnet> prompt, type env def LD_PRELOAD /tmp/.libroot.so 

    This tells telnet to pass the environment variable LD_PRELOAD to the 

    target machine. LD_PRELOAD points to our trojan library. 

(7) type open localhost 

(8) If you don't get a prompt bash#, but get login: type something like test 

    You should now be greeted with bash#. Type id and see you are root. 

    Note that telnetd will time you out, so make some attempt at a backdoor. 

  

Method Two (If you have no account on the target machine) 

  

(1) as above 

(2) as above, if you are running the same hardware as the target. If you are 

    on different processors, try compiling on a different machine. If you 

    know what you are doing, try changing the target architecture used by 

    gcc and ld. it is the -m flag with ld. 

(3) assuming you have the correct binary, open an ftp connection to the 

    target 

(4) using bin mode, upload your trojan library to the targets incoming 

    directory. 

(5) switch back to your machine, start telnet and specify the path of the 

    targets ftp directory as your LD_PRELOAD. On linux this is normally 

    /home/ftp/incoming. On others generally /var/ftp/incoming or 

    /etc/ftp/incoming. 

(6) as number 8 above. 

  

If you opt for method 2, you will need a pretty good idea of what is going 



on. It is not for the fainthearted. If demand is high, I may release a new 

set of .o files for different architectures. There should be no need. I can 

compile for Sun(SPARC), M68 and x86 on my linux box. So can you. 

  

HOW TO PROTECT: 

There are a few ways. If you have a statically linked login, then you are 

safe. setuid programs ignore LD_PRELOAD so one you have logged in, you 

cannot subvert the system. 

  

You can patch telnetd to wipe all but a few env variables. There are many 

widely pieces of available code to demonstrate this. 

  

FINALLY: 

  

Thats all I can think of. If you have any questions, email 

                         squidge@onyx.infonexus.com 

                            (The Guild homesite) 

  

  

-- 

?? 快捷鍵說明

復制代碼 Ctrl + C
搜索代碼 Ctrl + F
全屏模式 F11
切換主題 Ctrl + Shift + D
顯示快捷鍵 ?
增大字號 Ctrl + =
減小字號 Ctrl + -
亚洲欧美第一页_禁久久精品乱码_粉嫩av一区二区三区免费野_久草精品视频
日韩电影一区二区三区四区| 国产91精品一区二区麻豆亚洲| bt7086福利一区国产| 久久综合色一综合色88| 天堂va蜜桃一区二区三区漫画版| 色婷婷精品久久二区二区蜜臂av| 国产精品久久精品日日| 激情小说欧美图片| 日韩精品一区二区三区四区视频 | 国产成人在线电影| 日韩欧美二区三区| 久久99热狠狠色一区二区| 日韩精品专区在线影院观看| 久久精品噜噜噜成人88aⅴ| 日韩亚洲欧美综合| 国产在线精品视频| 日本一区二区综合亚洲| www.成人网.com| 伊人婷婷欧美激情| 日韩一区二区精品在线观看| 国产91综合一区在线观看| 亚洲蜜臀av乱码久久精品| 欧美一区二区三区视频在线观看| 九一九一国产精品| 日韩码欧中文字| 欧美一区二区精美| 成人av在线观| 日精品一区二区| 国产欧美一区二区精品忘忧草| 99国产精品久久久| 麻豆精品国产传媒mv男同| 国产精品女同互慰在线看| 欧美日韩国产一二三| 国产精品12区| 日本午夜精品视频在线观看| 国产精品久久久久久久岛一牛影视| 欧美色图在线观看| 国产成人丝袜美腿| 日本网站在线观看一区二区三区| 国产精品色噜噜| 欧美一级精品大片| 欧美在线观看视频一区二区| 国产专区综合网| 亚洲五码中文字幕| 国产精品国产自产拍高清av| 欧美变态tickle挠乳网站| 在线免费不卡视频| 成人午夜免费电影| 精油按摩中文字幕久久| 亚洲成av人片一区二区| 国产精品久久久久影院| 日韩精品自拍偷拍| 欧美一区二区视频在线观看| 在线中文字幕一区二区| 国产馆精品极品| 久久aⅴ国产欧美74aaa| 亚洲不卡av一区二区三区| 国产精品盗摄一区二区三区| 日韩三级高清在线| 9191精品国产综合久久久久久 | 美女视频网站黄色亚洲| 亚洲永久精品大片| 亚洲精选视频在线| 亚洲欧洲综合另类在线| 中文欧美字幕免费| 欧美国产丝袜视频| 欧美激情一区二区三区全黄| 久久嫩草精品久久久精品一| 日韩欧美一二三区| 日韩亚洲欧美综合| 欧美肥妇bbw| 9191国产精品| 日韩一区二区不卡| 欧美成人欧美edvon| 欧美不卡123| 国产午夜精品一区二区| 国产亚洲精品资源在线26u| 久久伊人中文字幕| 国产亚洲欧美日韩俺去了| 国产亚洲精品aa午夜观看| 国产日产欧美一区| 国产欧美精品一区二区色综合朱莉| 国产亚洲精品福利| 国产精品久久久久影院| 亚洲欧美另类小说视频| 亚洲一区二区偷拍精品| 亚洲成人www| 美女视频黄免费的久久| 精品一区二区三区视频| 国产成人在线色| 99re这里都是精品| 欧美影院精品一区| 欧美一区午夜精品| 久久精品人人做人人爽人人 | 国产精品久久二区二区| 亚洲欧美综合另类在线卡通| 一区二区三区在线免费视频| 午夜久久久久久久久久一区二区| 五月天一区二区三区| 奇米一区二区三区av| 国产精品自拍网站| 91蜜桃免费观看视频| 91麻豆精品国产91久久久久 | 亚洲国产成人午夜在线一区| 国产精品区一区二区三区| 亚洲男人天堂一区| 日韩黄色片在线观看| 国产精品99久久久久久宅男| 91在线观看免费视频| 欧美狂野另类xxxxoooo| 久久综合久久鬼色中文字| 中文字幕一区二区三区av| 香蕉成人伊视频在线观看| 国内国产精品久久| 在线精品观看国产| 2020国产精品自拍| 亚洲一区精品在线| 激情文学综合网| 91福利在线导航| 久久九九99视频| 亚洲国产精品一区二区久久恐怖片| 韩国一区二区在线观看| 色嗨嗨av一区二区三区| 欧美变态tickling挠脚心| 亚洲狼人国产精品| 国产一区二区三区四区五区入口| 在线观看网站黄不卡| 久久蜜桃一区二区| 天天综合天天综合色| 成人av免费在线观看| 欧美电视剧免费观看| 一区二区在线观看视频| 国产91精品在线观看| 日韩一级片在线播放| 亚洲免费观看视频| 粉嫩在线一区二区三区视频| 欧美一区国产二区| 一区二区三区 在线观看视频| 国产伦精品一区二区三区免费迷 | 亚洲一区在线观看免费| 国产成人午夜高潮毛片| 日韩欧美亚洲另类制服综合在线| 亚洲男女毛片无遮挡| 成人免费视频视频在线观看免费| 日韩视频永久免费| 午夜精品福利视频网站| 一本一本大道香蕉久在线精品| 久久久不卡网国产精品二区| 男男gaygay亚洲| 精品视频色一区| 亚洲黄色免费电影| 91麻豆精品一区二区三区| 国产欧美一区二区三区在线老狼| 蜜桃精品在线观看| 欧美夫妻性生活| 亚洲国产成人精品视频| 在线观看免费一区| 亚洲欧美日韩在线不卡| 99久久国产综合精品女不卡| 国产精品免费视频观看| 国产成人av资源| 久久久久久日产精品| 国产精品一区在线观看你懂的| 日韩女优av电影在线观看| 日本不卡在线视频| 欧美一区二区精品在线| 久久成人麻豆午夜电影| 日韩一区二区三区四区五区六区| 青青草成人在线观看| 8x8x8国产精品| 青青草国产成人av片免费| 日韩西西人体444www| 久久99热这里只有精品| www激情久久| 成人影视亚洲图片在线| 中文字幕在线不卡一区| 91国产成人在线| 日韩国产欧美在线观看| 日韩欧美国产综合在线一区二区三区| 不卡欧美aaaaa| 亚洲欧美另类在线| 欧美日韩午夜在线| 久久er精品视频| 日本一区二区三区免费乱视频| 国产大片一区二区| 一区二区三区四区不卡在线 | 欧美一区二区免费| 麻豆国产一区二区| 国产亚洲一区二区三区在线观看| av资源站一区| 一区二区三区.www| 日韩欧美一级二级| 欧美亚洲国产一区二区三区va| 午夜欧美电影在线观看| 精品成人佐山爱一区二区| 成人一区在线观看| 亚洲香蕉伊在人在线观| 精品福利在线导航| 色综合天天做天天爱| 视频一区二区三区中文字幕|