Last active
February 2, 2023 03:26
-
-
Save Neo23x0/e800b698dd8739c957144722dc5195c8 to your computer and use it in GitHub Desktop.
One-Liner to Detect DirtyCOW Code
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/bash | |
# - Matches on source and compiled code | |
# - Searches in user home directories by default | |
# - Detects certain strings in files smaller 300 kbyte | |
# - Does not print anything if nothing was found | |
# - Appends the file's time stamp of the files in question > good indicator to spot false positives | |
# - Should work on most Linux systems with bash | |
# Old version | |
# for f in $(find /home/ -type f -size -300 2> /dev/null); do if [[ $(strings -a "$f" 2> /dev/null | egrep "/proc/(self|%d)/(mem|maps)") != "" ]];then m=$(stat -c %y $f); echo "Contains DirtyCOW string: $f MOD_DATE: $m"; fi; done; | |
for f in $(find /home/ -type f -size -300 2> /dev/null); do if [[ $(egrep "/proc/(self|%d)/(mem|maps)" "$f") != "" ]];then m=$(stat -c %y "$f"); echo "Contains DirtyCOW string: $f MOD_DATE: $m"; fi; done; |
Thanks - just updated
A small note: This tool gives you a false negative if your /home folder contains no users or file content (as is relatively common on servers).
Also, this must probably be run as a regular user. Running it as root is a silly way to test if you can get root. ;)
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Filenames in spaces will break this script. Try$(find /home/ -type f -size -300 2> /dev/null); do if [[ $ (echo egrep "/proc/(self|%d)/(mem|maps)" "$f") != "" ]];then m=$(stat -c %y "$f"); echo "Contains DirtyCOW string: $f MOD_DATE: $m"; fi; done;
for f in