Understanding shell scripting is one step to make efficient your work with linux command. Some times we have to work with complex shell command every day and type it repetively. Without shell scripting we have to type all of that command manually and wasting our time. This paper has been presented in PT. Datacomm Diangraha at 8-10th May 2010, which contents of,
Table of Content
1. Basic Shell Scripting
a. Redirections & Pipes
i. Redirections
ii. Pipes
b. Variables
c. Conditional & Looping Statements
i. Conditional if .. then
ii. Conditional if .. then .. else
iii. Conditional switch .. case
iv. Looping for
v. Looping while
vi. Looping until
d. Introduction Bash I/O Scripting
i. Using read
ii. Using command line argument
e. Arithmetic & Strings Operations
i. Arithmetic Operations
ii. Strings Operations
2. Advanced Shell Scripting
a. Array
b. Regular Expression
i. Grep
ii. Awk
iii. Sed
c. System Administrative Command Scripting
d. Aliases
e. Functions
f. I/O Redirections
g. Using /dev & /proc
i. Using /dev
ii. Using /proc
h. Security Issues
i. Code Poetry
3. Shell Scripting in Practice
a. Creating & Scheduling Automatic Backup
b. Creating & Scheduling Automatic File Integrity Checker
c. DomainToIP Enumeration Script
d. Start & Stop GRE Tunneling Script
e. Automatic Default Routing Switcher Script
f. Start & Stop Firewall Script
g. Start & Stop Bandwith Management Script
h. Datacomm needs?? Q&A
Just download this paper at here and all bash script presented here. Oke, that’s all and hope it help! Enjoy
Yupe, that’s true when sock_sendpage() is discovered to be vulnerable by Tavis Ormandy and Julien Tinnes. The function is vulnerable to NULL pointer dereference that can be exploited to escalate priviledge to be root. Most of linux kernel are reported to be vulnerable. Exploit to take advantage of this flaw has been developed and spreaded freely on internet. The exploit can be used to bypass security restriction like SElinux.
http://milw0rm.com/exploits/9435 – the first written exploit by spender of gresecurity
http://milw0rm.com/exploits/9436 – another exploit taken from www.frasunek.com
http://milw0rm.com/exploits/9479 – another exploit from p0c73n1
http://milw0rm.com/exploits/9545 – another exploit written by Ramon de Carvalho Valle of risesecurity
Download the exploit, compile and execute! BOOMMM It’s root! Finally, this post is a little bit late .
I just look arround on milw0rm today and searching for linux kernel exploit, luckily i find four new linux kernel exploits.
- First exploit is to attack linux kernel locally using exit_notify() function vulnerability. This flaw affects linux kernel less than 2.6.29 (most of linux kernel). Just take a look here for the proof of concept.
- Second exploit is to attack linux kernel locally using UDEV vulnerability. Udev less than 1.4.1 is reported that it doesn’t verify wheter a NETLINK message originates from kernel space, which allows local users to gain root priviledge by sending a NETLINK message from user space. Let take a look here and here for the proof of concept.
- Third exploit is to attack linux kernel remotely using SCTP FWD memory corruption. Some people say this bug isn’t exploitable untill sgrakkyu gives his explanation. Sgrakkyu explanation can be read here, take a look here for the proof of concept. This flaw affects most of linux kernel.
- Fourth exploit is to attack linux kernel locally using ptrace_attach() function vulnerability. This flaw affects linux kernel version 2.6.29. Just take a look here and here for the proof of concept.
Now i just think, which is more secure by default “linux or windows??“, even openbsd which’s claimed as the most secured operating system has a stupid bugs inside its code.
By IPSECS Admin. Posted in News | Comments Off
Click here to view our old researches. Enjoy!