Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DAMPCROWD #27

Open
NoahGWood opened this issue Apr 11, 2017 · 5 comments
Open

DAMPCROWD #27

NoahGWood opened this issue Apr 11, 2017 · 5 comments

Comments

@NoahGWood
Copy link

NoahGWood commented Apr 11, 2017

Dampcrowd appears to my untrained eyes to be a priv-esc attempt.
It creates a shell with setuid and guid set to 0 (root).
13: 080484fc 0 FUNC WEAK DEFAULT UND setuid
14: 080484ac 0 FUNC WEAK DEFAULT UND setgid
The exploit did not work on Linux Mint Serena; it just opened up a new /bin/sh shell.

@Tbone-grady
Copy link

Tbone-grady commented Apr 14, 2017

Listen @JohnnyHobo if you don't know what the fuck your doing dont mess with the binaries

@Ekultek
Copy link

Ekultek commented Apr 14, 2017 via email

@Tbone-grady
Copy link

@Ekultek lol

@NoahGWood
Copy link
Author

Hey, if you can show me where it's installing backdoors I'm all ears. All I found was it tries to open a root shell.

Never take my word for anything though, if the NSA handed me enough money I'd just as soon turn around and tell you it's necessary to run all these scripts on every *nix based device you own :P
Now why's there a van parked outside my house?

@Atavic
Copy link

Atavic commented May 12, 2017

What a joke! VT hash search results for D01502934C089EA1316F659B5DBC80AE891DCA11
and 3A4BE0A37F98276B427F0EC2985475232B549B28 give detection ratios of 2/55

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

4 participants