Changes for page Application_Webkit

Last modified by Nicolas Gregoire on 2012/01/14 17:48

<
From version < 10.1 >
edited by Nicolas Gregoire
on 2012/01/14 00:31
To version < 12.1 >
edited by Nicolas Gregoire
on 2012/01/14 00:33
>
Change comment: There is no comment for this version

Summary

Details

Icon Page properties
Content
... ... @@ -30,6 +30,8 @@
30 30  
31 31  [[image:macos-tmp-owned.png||style="display: block; margin-left: auto; margin-right: auto"]]
32 32  
33 +
34 +
33 33  [[image:ipad-tmp-owned.png||style="display: block; margin-left: auto; margin-right: auto"]]
34 34  
35 35  == Meatsploit ==
... ... @@ -43,5 +43,5 @@
43 43  
44 44  An exploit for HP webOS 3.x was developed. This exploit drops a backdoor which is later executed with root privileges at boot time. The exploit is composed of two files :
45 45  
46 -* [[webos-root-backdoor.xml>>attach:webos-root-backdoor.xml]] contains the configurable data (name and content of the destination file) and a processing instruction trigger the XSLT code
48 +* [[webos-root-backdoor.xml>>attach:webos-root-backdoor.xml]] contains the configurable data (name and content of the destination file) and a processing instruction triggering the XSLT code
47 47  * [[webos-root-backdoor.xsl>>attach:webos-root-backdoor.xsl]] reads the XML file and create the requested file on disk. This version overwrites a script located in /etc/default/ with a version including a reverse-shell based on netcat

Welcome

Welcome on the XSLT Hacking Encyclopedia !

You may be interested by the Engines and Applications pages.

Link to the blog
Twitter: @Agarri_FR

Tag Cloud

Failed to execute the [velocity] macro. Cause: [The execution of the [velocity] script macro is not allowed in [xhe:XWiki.TagCloud]. Check the rights of its last author or the parameters if it's rendered from another script.]. Click on this message for details.

Content by Nicolas Grégoire / Agarri
Blog - Follow me @Agarri_FR