Linux Kernel Dirty COW PTRACE_POKEDATA Privilege Escalation
Posted by deepcore on November 30, 2016 – 5:30 am
This exploit uses the pokemon exploit as a base and automatically generates a new passwd line. The original /etc/passwd is then backed up to /tmp/passwd.bak and overwritten with the new line. The user will be prompted for the new password when the binary is run. After running the exploit you should be able to login with the newly created user.
Post a reply
You must be logged in to post a comment.