Date: 13, December, 2020
Author: Dhilip Sanjay S
- Dirty COW (Copy-On-Write) - CVE-2016-5195
- A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings.
- An unprivileged local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.
- Dirty COW - C code
- To get password input using C:
getpass("<Prompt message>")
in<unistd.h>
header.
- To get password input using C:
- Answer: Telnet
- Answer: clauschristmas
- Steps to Reproduce:
telnet <MACHINE_IP> <PORT_FROM_NMAP_SCAN>
- Answer: Ubuntu 12.04
- Steps to Reproduce:
cat /etc/*release
- Answer: grinch
- Steps to Reproduce:
cat cookies_and_milk.txt
- Answer: gcc -pthread dirty.c -o dirty -lcrypt
- Answer: firefart
- Answer: 8b16f00dd3b51efadb02c1df7f8427cc
- Steps to Reproduce:
firefart@christmas:/home/santa# cd /root firefart@christmas:~# touch coal firefart@christmas:~# tree . |-- christmas.sh |-- coal `-- message_from_the_grinch.txt 0 directories, 3 files firefart@christmas:~# tree | md5sum 8b16f00dd3b51efadb02c1df7f8427cc