Subscribe via feed.

Diamorphine Rootkit Signal Privilege Escalation

Posted by deepcore on February 21, 2020 – 6:58 am

This Metasploit module uses Diamorphine rootkit’s privesc feature using signal 64 to elevate the privileges of arbitrary processes to UID 0 (root). This module has been tested successfully with Diamorphine from master branch (2019-10-04) on Linux Mint 19 kernel 4.15.0-20-generic (x64).


This post is under “exploit” and has no respond so far.
If you enjoy this article, make sure you subscribe to my RSS Feed.

Post a reply

You must be logged in to post a comment.