Ravenrx7 Posted July 20, 2015 Share Posted July 20, 2015 (edited) Hey guys, first post here ....I'm trying to exploit my VM which is 2.4 RH and also download a clean install of Centos 2.4, using the Centos, . I'm trying to run a local exploit....using the uselib.c on 2.4. kernel I receive "check_VMA_flags" as the output on the Centos OS https://www.exploit-db.com/exploits/778/ I've reached out to a few other sites but none want to assist due to the content. It's in on my virtual machine, but trying to understand this code. Edited July 27, 2015 by Ravenrx7 Quote Link to comment Share on other sites More sharing options...
Ravenrx7 Posted July 27, 2015 Author Share Posted July 27, 2015 (edited) Any help is appreciated! I've research some information on the error but im not understanding http://seclists.org/fulldisclosure/2005/Jan/304 Edited July 27, 2015 by Ravenrx7 Quote Link to comment Share on other sites More sharing options...
Ravenrx7 Posted July 27, 2015 Author Share Posted July 27, 2015 its actually the mremap.c exploit I found the OS to be vulnerable , OS outputs exploitable " YES" MMA - #65525 0x50bf5000 -0x50bf6000 Quote Link to comment Share on other sites More sharing options...
cooper Posted July 27, 2015 Share Posted July 27, 2015 Congrats I suppose. But the exploit you were trying to get going was posted in 2005, a full ten years ago. What are you going for with this? Improved understanding of how this exploit works, how any exploit works or something else? Quote Link to comment Share on other sites More sharing options...
i8igmac Posted July 27, 2015 Share Posted July 27, 2015 (edited) I have never had success with tbose kinds of exploits... spent weeks uploaded and execute... endless hours lol... There are scripts out there that will upload hundreds of priv exploits to a machine, then compile, lauch all exploits and report a log of fail or success... Wish I had known this years ago... Edited July 27, 2015 by i8igmac Quote Link to comment Share on other sites More sharing options...
cooper Posted July 27, 2015 Share Posted July 27, 2015 Problem with those scripts is that they're *VERY* noisy/detectable and the bulk doesn't work at all. Worse still, most people using those scripts don't know (and, worst of all, don't care) why and put a bit of effort in to make them work. I don't understand how those people can look at their botnet or whatever and mouth off about how awesome they are for achieving this. They ran a fucking script. If I got a cookie each time I did that I'd be larger than Marlon Brando. Quote Link to comment Share on other sites More sharing options...
Ravenrx7 Posted July 31, 2015 Author Share Posted July 31, 2015 It was a lab, the basic under standing and methodology of older code. It's been solved and exploited. Quote Link to comment Share on other sites More sharing options...
Ravenrx7 Posted July 31, 2015 Author Share Posted July 31, 2015 Noisy.. hahaha buddy, the system is comprised. And yes it worked, not out of the box either, maybe you look into it. Quote Link to comment Share on other sites More sharing options...
Recommended Posts
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.