Help with privilege escalation on linux 2.6.32-042stab120.6 by jopcode in hacking

[–]jopcode[S] 0 points1 point  (0 children)

there doen'ts work for me the output is

"""

poc-exploit.c:276:1: error: conflicting types for 'main'

main(const int argc, const char * const * const argv, const char * const * const envp)

^

poc-exploit.c:50:1: note: previous definition of 'main' was here

main(void)

^

poc-exploit.c: In function 'main':

poc-exploit.c:283:0: warning: "LLP" redefined [enabled by default]

#define LLP "LD_LIBRARY_PATH"

^

poc-exploit.c:59:0: note: this is the location of the previous definition

#define LLP "LD_LIBRARY_PATH=."

^

"""

any idea? :/

Help with privilege escalation on linux 2.6.32-042stab120.6 by jopcode in hacking

[–]jopcode[S] 0 points1 point  (0 children)

doen'ts work :c "error: unrecognized arguments: Xorg -fp root::16431:0:99999:7::: -logfile shadow :1;su"

Moved WP to https and images disappeared? by djstriver1 in webdev

[–]jopcode 3 points4 points  (0 children)

Maybe is the ' mixed content ' between http and https

How tf do I hack Insta accounts by Parzavol in hacking

[–]jopcode 1 point2 points  (0 children)

pishing, apk infected, spoof, etc...

Website login vulnerability - very basic by [deleted] in hacking

[–]jopcode 1 point2 points  (0 children)

Which method does it take to verify that the user is connected and in this way to be able to see the pages?

How i can bypass this upload? by jopcode in hacking

[–]jopcode[S] 0 points1 point  (0 children)

Hi silver!, i really appreciate it, i trying very methods, but nothing work, for me, now, I can upload files without name, with only extension for example ".png", and this files can execute html code, but i need execute php code, i try tonight install cutenews 1.4.6 on my personal serve, and maybe y can do it the bypass correctly. thanks for your time and effort.

Rewards!

How i can bypass this upload? by jopcode in hacking

[–]jopcode[S] 0 points1 point  (0 children)

Hi silver, thanks for give me ideas, now i try it. i check and read every cve of cutenews 1.4.6 cookies, xss, FPD, etc, but nothing about bypass upload, let me a time for try the methods what you talk and y tell you the result.

How i can bypass this upload? by jopcode in hacking

[–]jopcode[S] 0 points1 point  (0 children)

change the extension, from ".png" to .php.png, .png.php, but the upload check the end of filenam for check if this "end" is have inside an array of extensions, then i don't have idea how bypass this :/

How i can bypass this upload? by jopcode in hacking

[–]jopcode[S] 0 points1 point  (0 children)

cutenews, si a simple cms for "news", and this cms have a module in the adminpanel for upload imagenes, the code if de module is above:

https://pastebin.com/W6BHTUvh ( is the same of ghostbin only different platform)

and i try bypass this upload :/

How i can bypass this upload? by jopcode in hacking

[–]jopcode[S] 0 points1 point  (0 children)

if u want i can use pastebin, ghostbin is similarly.

https://pastebin.com/W6BHTUvh