From a0c08ee7c9de75e7674eee76df532c5da7adc03a Mon Sep 17 00:00:00 2001 From: toni Date: Wed, 15 Jan 2014 17:26:00 +0100 Subject: simple strcpy() exploit works --- disable_prot.sh | 9 +++++++++ 1 file changed, 9 insertions(+) create mode 100755 disable_prot.sh (limited to 'disable_prot.sh') diff --git a/disable_prot.sh b/disable_prot.sh new file mode 100755 index 0000000..16498a3 --- /dev/null +++ b/disable_prot.sh @@ -0,0 +1,9 @@ +#!/bin/sh + +if [ `id -u` -ne 0 ]; then + echo "$0: This program should be run as root" +fi + +sysctl -w kernel.randomize_va_space=0 2>/dev/null +sysctl -w kernel.exec-shield=0 2>/dev/null + -- cgit v1.2.3