metasploit-framework/modules/exploits/linux
James Lee 7091d1c65b Add an exploit for sock_sendpage
Unfortunately, adds a dep on bionic for runtime compilation.

Gets ring0, sets the (res)uid to 0 and jumps to the payload.  Still some
payload issues because linux stagers don't mprotect(2) the buffer they
read(2) into.  Single payloads work fine, though.

Also cleans up and improves local exploits' ability to compile C.

[SEERM #3038]
2012-07-15 20:29:48 -06:00
..
browser Minor fixes 2012-04-19 18:07:35 -05:00
ftp This mega-diff adds better error classification to existing modules 2012-06-19 12:59:15 -05:00
games Fix up the boilerplate comment to use a better url 2012-02-20 19:40:50 -06:00
http Update milw0rm references. 2012-06-28 14:27:12 -05:00
ids Fix up the boilerplate comment to use a better url 2012-02-20 19:40:50 -06:00
imap Update milw0rm references. 2012-06-28 14:27:12 -05:00
local Add an exploit for sock_sendpage 2012-07-15 20:29:48 -06:00
madwifi Additional exploit fail_with() changes to remove raise calls 2012-06-19 19:43:41 -05:00
misc Update milw0rm references. 2012-06-28 14:27:12 -05:00
mysql This mega-diff adds better error classification to existing modules 2012-06-19 12:59:15 -05:00
pop3 Sed replacement of exploit-db links with EDB refs 2012-03-21 16:43:21 -05:00
pptp Fix up the boilerplate comment to use a better url 2012-02-20 19:40:50 -06:00
proxy Fix up the boilerplate comment to use a better url 2012-02-20 19:40:50 -06:00
samba This mega-diff adds better error classification to existing modules 2012-06-19 12:59:15 -05:00
ssh Put the curly braces back and drop a comma 2012-06-16 01:17:33 -06:00
telnet This mega-diff adds better error classification to existing modules 2012-06-19 12:59:15 -05:00