Hello everyone.
(FYI, I have scoured the Internet and spent two weeks on this before I finally decided to join here and post.)
I have been going through all of the standard "learning to shellcode" papers by Aleph1,etc.etc. (some found at www.l0t3k.org/programming/docs/shellcode/ ) I also have been going trough the Shellcoder's Handbook (wow, what a lot of mistakes in there!) and Hacking: The Art of Exploitation.
Regardless of book or tutorial, I keep running into the same problem:
No matter what the shellcode or method of exploitation, I can never seem to get UID=0 unless the vulnerable program specifically calls setuid(0). Yes, the shellcode contains those instructions also.
I am using SuSe Linux Pro. 9.3 with kernel 2.4.21-99-default.
According to the release notes, as of SuSe 9.1, there is a non-executable stack.
However, when I look in my kernel options, it is disabled (or so it appears).
In addition, there is no exec shield stuff running either.
Also, the correct ownership & permissions are set for the vulnerable program.
Just curious to figure out if I am doing something wrong and if somebody can offer some pointers. Does SuSe or this kernel have protection I have yet to discover?
Thanks.
(FYI, I have scoured the Internet and spent two weeks on this before I finally decided to join here and post.)
I have been going through all of the standard "learning to shellcode" papers by Aleph1,etc.etc. (some found at www.l0t3k.org/programming/docs/shellcode/ ) I also have been going trough the Shellcoder's Handbook (wow, what a lot of mistakes in there!) and Hacking: The Art of Exploitation.
Regardless of book or tutorial, I keep running into the same problem:
No matter what the shellcode or method of exploitation, I can never seem to get UID=0 unless the vulnerable program specifically calls setuid(0). Yes, the shellcode contains those instructions also.
I am using SuSe Linux Pro. 9.3 with kernel 2.4.21-99-default.
According to the release notes, as of SuSe 9.1, there is a non-executable stack.
However, when I look in my kernel options, it is disabled (or so it appears).
In addition, there is no exec shield stuff running either.
Also, the correct ownership & permissions are set for the vulnerable program.
Just curious to figure out if I am doing something wrong and if somebody can offer some pointers. Does SuSe or this kernel have protection I have yet to discover?
Thanks.
Comment