Possible exploit?
Something interesting happened to me today. I log onto a Fedora8 terminal remotely to do the majority of my work using VNC. While I was working the contents of a flash drive opened to me randomly. I found out later that a person who was physically at the terminal had plugged in their thumb drive and some how this triggers every one logged onto the terminal to see the contents of the drive.
Here's the interesting part… I noticed that I had full permissions of the drive and everything in it (including execute).
Consider…
Would it be possible to make a thumb drive containing an autorun.sh with the following contents
cp /etc/shadow /home/ME/
chown ME /home/ME/shadow
It works on my old suse box but I'm not sure if gnome has been updated to stop this from happening. I'm assuming that this is happening because of a gnome script but I don't have access to these folders.
Any knowledge is greatly appreciated.
-Scobe
EDIT: Will JTR work on shadow? I've never messed with linux passwords.
scobe wrote: Something interesting happened to me today. I log onto a Fedora8 terminal remotely to do the majority of my work using VNC. While I was working the contents of a flash drive opened to me randomly. I found out later that a person who was physically at the terminal had plugged in their thumb drive and some how this triggers every one logged onto the terminal to see the contents of the drive.
Here's the interesting part… I noticed that I had full permissions of the drive and everything in it (including execute).
Consider…
Would it be possible to make a thumb drive containing an autorun.sh with the following contents
cp /etc/shadow /home/ME/
chown ME /home/ME/shadow
It works on my old suse box but I'm not sure if gnome has been updated to stop this from happening. I'm assuming that this is happening because of a gnome script but I don't have access to these folders.
Any knowledge is greatly appreciated.
-Scobe
EDIT: Will JTR work on shadow? I've never messed with linux passwords.
Yes you can use JTR to crack the passwd hashes. Problem is that now in most of distros you have shadowed passwords, and shadow file can be only accessed by root. So the user would have to be either retarded or running root as default user, or you know messed up access rights on his system, this stuff happens sometimes though. It's sweet yet I'd say out dated exploit, that you won't find much use of.
Also whether the thumb drive gets actually executed very much depends on particular distro and system configuration
There's a tool out there called the USB pocketknife (a.k.a. USB Hacksaw/Siwtchblade) that does something very similar to this (along with a bunch of other stuff) for windows machines.
Anyway, how often do you have physical access to other people's servers? I don't ever have it, but you might be different.
If you do have physical access a lot, maybe you should code a tool for linux to do some cool stuff when a flash drive is plugged in.
[x] Check out some rooting material like RTB or STS. [x] Go learn about exploits and how they work. [x] Learn about different ways to use the exploit you've found. (You might not have sufficient privileges to just upload it, compile it, or run it normally, in which case you should look into how to obtain the proper permissions.)
Oh god. In case anyone is wondering, the "su" command don't work in scobe's case as he himself had mentioned that he does'nt have root access,and since the command requires the root password for it to execute, it won't work for him.
Oh, and typing su in capitals doesn't work since *nix/Linux is case-sensitive.
I hope I didn't make any mistakes.
fuser wrote: Oh god. In case anyone is wondering, the "su" command don't work in scobe's case as he himself had mentioned that he does'nt have root access,and since the command requires the root password for it to execute, it won't work for him.
Oh, and typing su in capitals doesn't work since *nix/Linux is case-sensitive.
I hope I didn't make any mistakes.
well theoretically there could be blank root password, so su would give you root straight away :D
but then again we aren't talking about linux that was set up but a retarded person, I guess…