How to Perform a Local Privilege Escalation on Mac.

May 25, 2016 08:53 PM
635997812063976680.jpg

Hello null byte!! I found a local local privilege escalation exploit on Exploit-db known as CVE-2015-5889: issetugid() + rsh + libmalloc osx local root by rebel. You can visit the link here or find the code on pastebin here.

Step 1: Download the Script

If you don't know how then you are at the wrong place. Otherwise save it as exploit.py and then move on to step 2.

Step 2: Run the Script.

Go into terminal and run it as python (whatever directory it is in) and run it. The output should include that it has created /etc/crontab and then waiting for sudoer file to change. Afterwards you should have a root shell!

Step 3: Post Exploitation!

Now if I were you I would change the root password with passwd root and then set the password but thats just me. From here do whatever you want

Step 4: End

Thank you all for reading! I hope you enjoyed this. Don't do anything bad and what you do with this information I am not responsible for.

Have fun! -August

Comments

No Comments Exist

Be the first, drop a comment!