谢谢啦,shell文件编译执行过了,但是最后没看懂什么效果,最后一步的内容也没有出来,可不可以再请教一下你呢[/quote]
I don't know the detail of this security hole. Usually, shellcode is designed to get root privilege. From the screen shot you posted, after running the script, you were granted root permission since your effective group id is 0, which represents the root group.
[/quote]太谢谢啦,那再请问一下我按照这个顺序执行之后却没有获取到root权限,可不可以麻烦你再帮忙看一下呢,cve-2014-4014,或者是可不可以给我你的QQ号啊,谢谢啦[/quote]
if so, then probably your system has been patched or the shellcode doesn't work for you system...
谢谢啦,shell文件编译执行过了,但是最后没看懂什么效果,最后一步的内容也没有出来,可不可以再请教一下你呢[/quote]
I don't know the detail of this security hole. Usually, shellcode is designed to get root privilege. From the screen shot you posted, after running the script, you were granted root permission since your effective group id is 0, which represents the root group.
[/quote]太谢谢啦,那再请问一下我按照这个顺序执行之后却没有获取到root权限,可不可以麻烦你再帮忙看一下呢,cve-2014-4014,或者是可不可以给我你的QQ号啊,谢谢啦
谢谢啦,shell文件编译执行过了,但是最后没看懂什么效果,最后一步的内容也没有出来,可不可以再请教一下你呢[/quote]
I don't know the detail of this security hole. Usually, shellcode is designed to get root privilege. From the screen shot you posted, after running the script, you were granted root permission since your effective group id is 0, which represents the root group.
That is the default shell prompt for root...after shell code injection, the account was switched from vnik to root...
There are missing new lines in between