diff options
author | Jason A. Donenfeld <Jason@zx2c4.com> | 2012-08-11 09:21:24 +0200 |
---|---|---|
committer | Jason A. Donenfeld <Jason@zx2c4.com> | 2012-08-11 09:21:24 +0200 |
commit | 45ca1205b1e0e05c657b952b24bbfaaec0198918 (patch) | |
tree | 2005965b1d485387e336eb11c7ee2bb8892e31aa | |
parent | Initial commit of exploit. (diff) | |
download | Pwnnel-Blicker-45ca1205b1e0e05c657b952b24bbfaaec0198918.tar.xz Pwnnel-Blicker-45ca1205b1e0e05c657b952b24bbfaaec0198918.zip |
What's the damn program called again?
-rwxr-xr-x | pwnnel-blicker.c | 4 |
1 files changed, 2 insertions, 2 deletions
diff --git a/pwnnel-blicker.c b/pwnnel-blicker.c index a00c35e..a6a9b19 100755 --- a/pwnnel-blicker.c +++ b/pwnnel-blicker.c @@ -5,13 +5,13 @@ * = = * ======================== * - * Tunnel Blicker, a widely used OpenVPN manager for OSX + * Tunnel Blick, a widely used OpenVPN manager for OSX * comes with a nice SUID executable that has more holes * than you care to count. It's a treasure chest of local * roots. I picked one that looked interesting, and here * we have Pwnnel Blicker. * - * Tunnel Blicker will run any executable that has 744 + * Tunnel Blick will run any executable that has 744 * permissions and is owned by root:root. Probably we * could find a way to exploit an already existing 744 * executable, but this would be too easy. So instead, we |