Security Challenge. In a group, search for various means to pass root on the ISO given to you. | Mirror of https://github.com/C18H24O2/boot2root
- Python 43.7%
- C 37.1%
- Shell 15%
- Nix 4.2%
|
|
||
|---|---|---|
| vm | 🔨 chore(vm-scripts): cleanup, reroute network through host-only | |
| writeups | ✨ feature(writeup3): fix irregularities in payload execution, we're good to go now | |
| .envrc | 🚧 wip: add ret2libc payload | |
| .gitignore | 🚧 wip: needs even more cleanup | |
| LICENSE | 🔨 chore: initial commit | |
| README.md | 📝 doc(README.md): final readme cleanup | |
| shell.nix | ✨ feature(writeup5): done | |
boot2root
Exploits
- Regular Path (Bomb)
- Regular Path w/ ret2libc
- DirtyC0w
- Reverse Shell
- Apache 2.2.22 suEXEC
- Extras
- Fakeroot
- ISO File exploitation
- Failed SquirrelMail exploit
License
This project is licensed under the ISC License.