Dirty Pipe - CVE-2022-0847 - Linux Privilege Escalation

Поделиться
HTML-код
  • Опубликовано: 14 дек 2024

Комментарии • 55

  • @kevinalexander4959
    @kevinalexander4959 2 года назад +16

    when reading the original solution, i was shocked that he found this huge exploit just by automatic log zips that were getting extra bytes changing the CRC of the file. He then goes deep into every part of those functions until he traced exactly what was happening down. Guys like this are great. I aspire to be that good one day!

  • @icenberg5908
    @icenberg5908 2 года назад

    This is my first visit to this channel i must say this is the kind of channel i wish to start. Thank you.

  • @aviano5
    @aviano5 2 года назад +8

    This is so valuable. I can't say how much this video is valuable. Keep it up. Good Luck! And Thank You so much. ❤️ Can you please do a video on patching the vulnerability?

  • @ivanzhao4068
    @ivanzhao4068 2 года назад +2

    Thank you so much for sharing it. Keep up the good work. Best wishes to you. Cheers

  • @dhali74
    @dhali74 2 года назад +1

    Thank you for your great video. I Learning a lot Technical Knowledge. Thanks

  • @eyephpmyadmin6988
    @eyephpmyadmin6988 2 года назад +6

    Keep up this content,the only RUclipsr that teaches the real hacking

    • @kevinalexander4959
      @kevinalexander4959 2 года назад +2

      one of few. John Hammon, LiveOverflow are also other good hack channels.

  • @relaxingsounds4536
    @relaxingsounds4536 2 года назад +1

    Thank you for the amazing content,
    learning a lot

  • @elevatecyber5031
    @elevatecyber5031 2 года назад

    Amazing content. Now I have another tool in my pentesting arsenal. Thanks!

  • @dashrendr
    @dashrendr 2 года назад

    Love the video...only feedback is to have a quick bullet points of data...some graphics or w/e instead of just the console as your doing initial overview of the scope/context

  • @figurxfigur8935
    @figurxfigur8935 Год назад +2

    what to do if GCC is no instaled on target mashine and we dont have permision?

  • @alaaroumeeh2752
    @alaaroumeeh2752 2 года назад

    Your channel is by far the best❤️

  • @perezhezekiah2941
    @perezhezekiah2941 2 года назад +2

    I love your teaching, but is it possible you can talk about or go into spoofing ( like explain everything about spoofing, Ip spoofing, ID caller spoofing, email spoofing etc ) and radio wave penetration ( phone waves etc ). Can you teach and explain them on your channel.
    I don't know why, Linux distro are not responding on my system.

  • @mridiot3828
    @mridiot3828 2 года назад

    Glad to see you back 😊.

  • @elishaukeme3141
    @elishaukeme3141 2 года назад

    Link to Linode not seen too... Please answer me.

  • @maged4087
    @maged4087 2 года назад

    When i use, chmod +x compile.sh --> changing permissions of compile.sh : Operation not permitted . can you help ?

  • @GoaBeach988
    @GoaBeach988 2 года назад

    Wt happened about web penestration testing series

  • @فريقالأبطال-ت2ك
    @فريقالأبطال-ت2ك 2 года назад +2

    I was waiting this video

  • @georgiosroumeliotis4383
    @georgiosroumeliotis4383 2 года назад

    @HackerSploit can you make a video talking about hacking certifications ? And which do you recommend ?

  • @atNguyen-gm6cf
    @atNguyen-gm6cf 2 года назад

    Thật tuyệt vời khi xem video này . Tôi cảm ơn bạn rất nhiều

  • @maged4087
    @maged4087 2 года назад

    I use 5.15.0-52-generic and ubuntu 20.04.5 LTS, the code does not work for an unprivileged users.

  • @jonathanhensley896
    @jonathanhensley896 2 года назад

    How does this affect android kernals between 5.8 and 5.10?

  • @Funnnnboyy
    @Funnnnboyy 2 года назад

    How to track a phone no location and ip location exactly

  • @football-gj5xf
    @football-gj5xf 2 года назад

    Why is hard to remember the codes.

  • @charitharabegedara804
    @charitharabegedara804 2 года назад

    Thank you so much for sharing it 🤩

  • @cataAZU47
    @cataAZU47 2 года назад

    system() function call seems to have failed :( any idea?

    • @kuhnhawah3927
      @kuhnhawah3927 2 года назад

      same here

    • @YesLittleLamb
      @YesLittleLamb 9 месяцев назад

      i hope you have found an answer to this by now, but if you haven't, you can try ensuring the execv argument list is null terminated, this is simply done by adding NULL on line 174 after root",

  • @miguelofre
    @miguelofre 2 года назад

    if im new in hacking, is good take your ethical hackin bootcamp ?

  • @dharanisanjaiy
    @dharanisanjaiy 2 года назад

    Man!!!! this vulnerability is just same to a "Try hack me " room named "wgel".

  • @alexander1361
    @alexander1361 2 года назад +1

    THX for sharing

  • @abudi45
    @abudi45 2 года назад

    Welcome back brodie...

  • @durgaprasadrao3888
    @durgaprasadrao3888 2 года назад

    Nice sir ,could you pls make one video reagarding android keylogger sir at the same time how to exploiting whats app data

  • @EnglishRain
    @EnglishRain 2 года назад

    You are a scholar & a gentleman

  • @8080VB
    @8080VB 2 года назад

    We missed you man :)

  • @nuttyninny9793
    @nuttyninny9793 2 года назад +4

    "Dirty Pipe"

  • @chesser6425
    @chesser6425 2 года назад +2

    ty for this man

  • @HXR-nx7iq
    @HXR-nx7iq 2 года назад

    Thank you so much sir .

  • @siyawy2262
    @siyawy2262 2 года назад

    my machine is vulnerable ... 😢

  • @kumaran88thiru
    @kumaran88thiru 2 года назад

    Perfectly working I tryed

  • @techzon4456
    @techzon4456 2 года назад +1

    Sir, please upload web exploitation series.... Please 🙏🙏🙏

  • @AhmedAhmed-rq8vt
    @AhmedAhmed-rq8vt 2 года назад +2

    ✌✌✌

  • @alwan7777
    @alwan7777 2 года назад

    finally upload again

  • @localhost4356
    @localhost4356 2 года назад

    Nice

  • @rtheelotham1249
    @rtheelotham1249 2 года назад

    Pls help me bro pls

  • @kikokoussi7594
    @kikokoussi7594 Год назад

    This is the print out I got when I run ./expoit-1:
    Backing up /etc/passwd to /tmp/passwd.bak ...
    Setting root password to "piped" ...
    Password: su: Authentication failure
    when I tried sudo ./expoit-1:
    Backing up /etc/passwd to /tmp/passwd.bak ...
    Failed to open /tmp/passwd.bak
    I can vi into the tmp/passwd folder though, anyone advice on how I could fix this?

    • @MetalMaple
      @MetalMaple Год назад

      Can confirm this a problem with versioning. If you're running 5.15.0-x, I would advise installing kernel 5.15.0-051500rc7-generic as any newer version does not work

    • @mysticstardust1109
      @mysticstardust1109 Год назад +1

      @@MetalMaple Thank you for your reply, I've managed to solve this by downgrading the kernel version to 5.8.0. :D

    • @hieuvu-hn7ok
      @hieuvu-hn7ok Год назад +1

      @@mysticstardust1109 how u can downgrading the kernel bro ?

    • @zeinazoz7877
      @zeinazoz7877 Год назад

      @@mysticstardust1109 how did you downgrade the kernel??? pls help :(

    • @zeinazoz7877
      @zeinazoz7877 Год назад

      @@hieuvu-hn7ok Have u figured a way to do it?