Posts Tagged ‘root’

Hello to Everyone!

As I told to another Comment of a Post I made, and because a Visitor of this Blog requested it, I will share with you some Methods on How to Root a Server when there isn’t any Local Root Kernel Exploit available!

(more…)

Mempodipper is a great Exploit that uses a Vulnerability found on ALL Linux kernels >=2.6.39 that haven’t been Patched, yet!

Extract from the Official Blog:

Mempodipper is an exploit for CVE-2012-0056. /proc/pid/mem is an interface for reading and writing, directly, process memory by seeking around with the same addresses as the process’s virtual memory space. In 2.6.39, the protections against unauthorized access to /proc/pid/mem were deemed sufficient, and so the prior #ifdef that prevented write support for writing to arbitrary process memory was removed. Anyone with the correct permissions could write to process memory. It turns out, of course, that the permissions checking was done poorly. This means that all Linux kernels >=2.6.39 are vulnerable, up until the fix commit for it a couple days ago. Let’s take the old kernel code step by step and learn what’s the matter with it.

(more…)

There were some Bugs on the script and some other Recommendations from the Members of the Hackforums.

Here is what changed to this version:

– The Defacer now Supports the /home/*/public_html Directory
– The Appropriate Package Manager is now Correctly Detected
– Many other minor Bugs Fixed!
(more…)

There were some minor Bugs on the P0stH4x0r Script…

The Script has been updated!

 

You can use the in-script updater so as to download the Updated version or download the whole zip file from here…!

(more…)

In this guide, we are going to show you how to set up TuneSync on your Android and start syncing with iTunes wirelessly on your Mac or Windows PC.

So….

(more…)