Archive for the ‘root exploit’ Category

A Decade Old Unix/Linux/BSD Root Privilege-Escalation Bug Discovered

June 20th, 2017

Security researchers have discovered more than a decade-old vulnerability in several Unix-based operating systems — including Linux, OpenBSD, NetBSD, FreeBSD and Solaris — which can be exploited by attackers to escalate their privileges to root, potentially leading to a full system takeover.

Dubbed Stack Clash, the vulnerability (CVE-2017-1000364) has been discovered in the way memory was

Posted in freebsd, hacking news, Linux exploit, Linux Vulnerability, local root exploit, OpenBSD, privilege escalation, root exploit, solaris os, Vulnerability | Comments (0)

A Decade Old Unix/Linux/BSD Root Privilege-Escalation Bug Discovered

June 20th, 2017

Security researchers have discovered more than a decade-old vulnerability in several Unix-based operating systems — including Linux, OpenBSD, NetBSD, FreeBSD and Solaris — which can be exploited by attackers to escalate their privileges to root, potentially leading to a full system takeover.

Dubbed Stack Clash, the vulnerability (CVE-2017-1000364) has been discovered in the way memory was

Posted in freebsd, hacking news, Linux exploit, Linux Vulnerability, local root exploit, OpenBSD, privilege escalation, root exploit, solaris os, Vulnerability | Comments (0)

A Decade Old Unix/Linux/BSD Root Privilege-Escalation Bug Discovered

June 20th, 2017

Update: Find working Exploits and Proof-of-Concepts at the bottom of this article.

Security researchers have discovered more than a decade-old vulnerability in several Unix-based operating systems — including Linux, OpenBSD, NetBSD, FreeBSD and Solaris — which can be exploited by attackers to escalate their privileges to root, potentially leading to a full system takeover.

Dubbed Stack Clash

Posted in freebsd, hacking news, Linux exploit, Linux Vulnerability, local root exploit, OpenBSD, privilege escalation, root exploit, solaris os, Vulnerability | Comments (0)

Dozens of Malicious Apps on Play Store can Root & Hack 90% of Android Devices

June 25th, 2016

It’s not at all surprising that the Google Play Store is surrounded by a large number of malicious apps that has the ability to gain users’ attention into falling victim for one, but this time, it is even worse than most people realize.

Researchers at Trend Micro have detected a family of malicious apps, dubbed ‘Godless,’ that has the capability of secretly rooting almost 90 percent of all

Posted in android hacking software, Android hacking tool, Android Malware, android rooting, Godless malware, hacking android phone, malicious apps, Malware apps, root android phone, root exploit | Comments (0)

Kernel Backdoor found in Gadgets Powered by Popular Chinese ARM Maker

May 12th, 2016

How to Hack an Android device?

It is possibly one of the most frequently asked questions on the Internet.

Although it’s not pretty simple to hack Android devices and gadgets, sometimes you just get lucky to find a backdoor access.

Thanks to Allwinner, a Chinese ARM system-on-a-chip maker, which has recently been caught shipping a version of Linux Kernel with an incredibly simple and

Posted in Android Security, hacking android phone, how to hack android, How to hack computer, kernel hacker, Linux kernel, Linux kernel exploit, root android phone, root exploit | Comments (0)

Mac OS X Zero-Day Exploit Can Bypass Apple’s Latest Protection Feature

March 25th, 2016

A critical zero-day vulnerability has been discovered in all versions of Apple’s OS X operating system that allows hackers to exploit the company’s newest protection feature and steal sensitive data from affected devices.

With the release of OS X El Capitan, Apple introduced a security protection feature to the OS X kernel called System Integrity Protection (SIP). The feature is designed

Posted in Apple Mac OS X, hacking news, Mac OS X, operating system, OS X El Capitan, root exploit, System Integrity Protection, Vulnerability, zero-day exploit, Zero-Day Vulnerability | Comments (0)