aboutsummaryrefslogtreecommitdiffstats
path: root/ramfs/home/README
diff options
context:
space:
mode:
authorJason A. Donenfeld <Jason@zx2c4.com>2012-10-02 02:42:21 +0200
committerJason A. Donenfeld <Jason@zx2c4.com>2013-10-02 01:33:22 +0200
commit40b48713e6b5d5570906ae1cebd1c022abd52358 (patch)
tree0809b62d7f06f6f15825718439f052ec92969c54 /ramfs/home/README
downloadkernel-pwn-challenge-master.tar.xz
kernel-pwn-challenge-master.zip
Initial commit.HEADmaster
Diffstat (limited to 'ramfs/home/README')
-rw-r--r--ramfs/home/README21
1 files changed, 21 insertions, 0 deletions
diff --git a/ramfs/home/README b/ramfs/home/README
new file mode 100644
index 0000000..48f8c16
--- /dev/null
+++ b/ramfs/home/README
@@ -0,0 +1,21 @@
+=== Welcome to the ZX2C4 Kernel Challenge ===
+ by Jason A. Donenfeld <Jason@zx2c4.com>
+
+
+Pwn the kernel and pop a root shell!
+
+Source is available inside /src.
+
+
+eth0 receives an IP address via dhcp. It may be helpful to do
+development on the host and send binaries to the VM:
+
+On the VM:
+ /home $ while true; do nc -l -p 1234 > a; chmod +x a; ./a; done
+
+On the host:
+ $ gcc -static -o a vuln.c && nc 192.168.56.102 1234 < a
+
+
+More information about this project is available at:
+ <http://git.zx2c4.com/kernel-pwn-challenge/about/>