/etc/dnsmasq.conf:
listen-address=::1,127.0.0.1
interface=lo
conf-dir=/etc/dnsmasq.d
bind-interfaces/etc/dnsmasq.d/openresolv.conf:
/etc/dnsmasq.conf:
listen-address=::1,127.0.0.1
interface=lo
conf-dir=/etc/dnsmasq.d
bind-interfaces/etc/dnsmasq.d/openresolv.conf:
| #!/usr/bin/env python | |
| """ | |
| Let's say you've been able to run a SUID binary and | |
| dropped into a shell where your EUID is 0, but your | |
| real UID/GID are still 1000. There's no C compiler | |
| and you're not really keen on dropping files on disk. | |
| bash drops EUID for security purposes and sudo still | |
| asks for a password. But there's Python installed. | |
| """ |
| #!/bin/sh | |
| _DATA="[$(date -uR)] | |
| PID $$: $(tr '\0' ' ' < /proc/$$/cmdline) | |
| PPID $PPID: $(tr '\0' ' ' < /proc/$PPID/cmdline) | |
| UGID: $(id) | |
| [-------------------------------] | |
| " | |
| echo "$_DATA" >> /tmp/trig |
| #!/bin/bash | |
| # script to mount and chroot into a rootfs directory | |
| # designed for openwrt systems, but should work for anything with minimal modifications | |
| # unless you specify a different chroot dir, | |
| # place script on the same level as the rootfs directory, should look something like so: | |
| # /mnt/ | |
| # |- chroot.sh | |
| # |- rootfs/ |