when reading the original solution, i was shocked that he found this huge exploit just by automatic log zips that were getting extra bytes changing the CRC of the file. He then goes deep into every part of those functions until he traced exactly what was happening down. Guys like this are great. I aspire to be that good one day!
This is so valuable. I can't say how much this video is valuable. Keep it up. Good Luck! And Thank You so much. ❤️ Can you please do a video on patching the vulnerability?
Love the video...only feedback is to have a quick bullet points of data...some graphics or w/e instead of just the console as your doing initial overview of the scope/context
I love your teaching, but is it possible you can talk about or go into spoofing ( like explain everything about spoofing, Ip spoofing, ID caller spoofing, email spoofing etc ) and radio wave penetration ( phone waves etc ). Can you teach and explain them on your channel. I don't know why, Linux distro are not responding on my system.
i hope you have found an answer to this by now, but if you haven't, you can try ensuring the execv argument list is null terminated, this is simply done by adding NULL on line 174 after root",
This is the print out I got when I run ./expoit-1: Backing up /etc/passwd to /tmp/passwd.bak ... Setting root password to "piped" ... Password: su: Authentication failure when I tried sudo ./expoit-1: Backing up /etc/passwd to /tmp/passwd.bak ... Failed to open /tmp/passwd.bak I can vi into the tmp/passwd folder though, anyone advice on how I could fix this?
Can confirm this a problem with versioning. If you're running 5.15.0-x, I would advise installing kernel 5.15.0-051500rc7-generic as any newer version does not work
when reading the original solution, i was shocked that he found this huge exploit just by automatic log zips that were getting extra bytes changing the CRC of the file. He then goes deep into every part of those functions until he traced exactly what was happening down. Guys like this are great. I aspire to be that good one day!
This is my first visit to this channel i must say this is the kind of channel i wish to start. Thank you.
This is so valuable. I can't say how much this video is valuable. Keep it up. Good Luck! And Thank You so much. ❤️ Can you please do a video on patching the vulnerability?
Thank you so much for sharing it. Keep up the good work. Best wishes to you. Cheers
Thank you for your great video. I Learning a lot Technical Knowledge. Thanks
Keep up this content,the only RUclipsr that teaches the real hacking
one of few. John Hammon, LiveOverflow are also other good hack channels.
Thank you for the amazing content,
learning a lot
Amazing content. Now I have another tool in my pentesting arsenal. Thanks!
Love the video...only feedback is to have a quick bullet points of data...some graphics or w/e instead of just the console as your doing initial overview of the scope/context
what to do if GCC is no instaled on target mashine and we dont have permision?
Use docker you melon
Did you find a solution?
Your channel is by far the best❤️
I love your teaching, but is it possible you can talk about or go into spoofing ( like explain everything about spoofing, Ip spoofing, ID caller spoofing, email spoofing etc ) and radio wave penetration ( phone waves etc ). Can you teach and explain them on your channel.
I don't know why, Linux distro are not responding on my system.
Glad to see you back 😊.
Link to Linode not seen too... Please answer me.
When i use, chmod +x compile.sh --> changing permissions of compile.sh : Operation not permitted . can you help ?
Wt happened about web penestration testing series
I was waiting this video
@HackerSploit can you make a video talking about hacking certifications ? And which do you recommend ?
Thật tuyệt vời khi xem video này . Tôi cảm ơn bạn rất nhiều
I use 5.15.0-52-generic and ubuntu 20.04.5 LTS, the code does not work for an unprivileged users.
How does this affect android kernals between 5.8 and 5.10?
How to track a phone no location and ip location exactly
Why is hard to remember the codes.
Thank you so much for sharing it 🤩
system() function call seems to have failed :( any idea?
same here
i hope you have found an answer to this by now, but if you haven't, you can try ensuring the execv argument list is null terminated, this is simply done by adding NULL on line 174 after root",
if im new in hacking, is good take your ethical hackin bootcamp ?
Man!!!! this vulnerability is just same to a "Try hack me " room named "wgel".
THX for sharing
Welcome back brodie...
Nice sir ,could you pls make one video reagarding android keylogger sir at the same time how to exploiting whats app data
You are a scholar & a gentleman
We missed you man :)
"Dirty Pipe"
ty for this man
Very welcome.
Thank you so much sir .
my machine is vulnerable ... 😢
Perfectly working I tryed
Sir, please upload web exploitation series.... Please 🙏🙏🙏
✌✌✌
finally upload again
Nice
Pls help me bro pls
My fb account is hacked pls help me
This is the print out I got when I run ./expoit-1:
Backing up /etc/passwd to /tmp/passwd.bak ...
Setting root password to "piped" ...
Password: su: Authentication failure
when I tried sudo ./expoit-1:
Backing up /etc/passwd to /tmp/passwd.bak ...
Failed to open /tmp/passwd.bak
I can vi into the tmp/passwd folder though, anyone advice on how I could fix this?
Can confirm this a problem with versioning. If you're running 5.15.0-x, I would advise installing kernel 5.15.0-051500rc7-generic as any newer version does not work
@@MetalMaple Thank you for your reply, I've managed to solve this by downgrading the kernel version to 5.8.0. :D
@@mysticstardust1109 how u can downgrading the kernel bro ?
@@mysticstardust1109 how did you downgrade the kernel??? pls help :(
@@hieuvu-hn7ok Have u figured a way to do it?