4837 Total CVEs
26 Years
GitHub
README.md
Rendering markdown...
POC / prank.asm ASM
section .text
    global _start

_start:
    mov rax, 1          ; write
    mov rdi, 1
    lea rsi, [rel msg_start]
    mov rdx, msg_start_len
    syscall

    ; [+] Found SUID binary
    mov rax, 1
    mov rdi, 1
    lea rsi, [rel msg_suid]
    mov rdx, msg_suid_len
    syscall

    ; setuid(0)
    mov rax, 105
    xor rdi, rdi
    syscall

    ; setgid(0)
    mov rax, 106
    xor rdi, rdi
    syscall

    ; [+] Exploit successful!
    mov rax, 1
    mov rdi, 1
    lea rsi, [rel msg_root]
    mov rdx, msg_root_len
    syscall

    ; execve("/bin/sh", NULL, NULL)
    mov rax, 59
    lea rdi, [rel bin_sh]
    xor rsi, rsi
    xor rdx, rdx
    syscall

    ; 😂 PRANK!
    mov rax, 1
    mov rdi, 1
    lea rsi, [rel msg_prank]
    mov rdx, msg_prank_len
    syscall

    ; exit(0)
    mov rax, 60
    xor rdi, rdi
    syscall

msg_start db "🔥 INITIATING PRIVILEGE ESCALATION... 🔥", 10
msg_start_len equ $ - msg_start

msg_suid db "[+] Found SUID binary: /usr/bin/passwd (root privileges detected!)", 10
msg_suid_len equ $ - msg_suid

msg_root db "[+] Exploit successful! Root shell spawned!", 10
msg_root_len equ $ - msg_root

bin_sh db "/bin/sh", 0

msg_prank db "😂 APRIL FOOLS! You got pranked  no root for you! 😂", 10
msg_prank_len equ $ - msg_prank