summaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorJason A. Donenfeld <Jason@zx2c4.com>2012-08-11 09:21:24 +0200
committerJason A. Donenfeld <Jason@zx2c4.com>2012-08-11 09:21:24 +0200
commit45ca1205b1e0e05c657b952b24bbfaaec0198918 (patch)
tree2005965b1d485387e336eb11c7ee2bb8892e31aa
parentInitial commit of exploit. (diff)
downloadPwnnel-Blicker-45ca1205b1e0e05c657b952b24bbfaaec0198918.tar.xz
Pwnnel-Blicker-45ca1205b1e0e05c657b952b24bbfaaec0198918.zip
What's the damn program called again?
-rwxr-xr-xpwnnel-blicker.c4
1 files changed, 2 insertions, 2 deletions
diff --git a/pwnnel-blicker.c b/pwnnel-blicker.c
index a00c35e..a6a9b19 100755
--- a/pwnnel-blicker.c
+++ b/pwnnel-blicker.c
@@ -5,13 +5,13 @@
* = =
* ========================
*
- * Tunnel Blicker, a widely used OpenVPN manager for OSX
+ * Tunnel Blick, a widely used OpenVPN manager for OSX
* comes with a nice SUID executable that has more holes
* than you care to count. It's a treasure chest of local
* roots. I picked one that looked interesting, and here
* we have Pwnnel Blicker.
*
- * Tunnel Blicker will run any executable that has 744
+ * Tunnel Blick will run any executable that has 744
* permissions and is owned by root:root. Probably we
* could find a way to exploit an already existing 744
* executable, but this would be too easy. So instead, we