blasty

Results 10 comments of blasty

Thanks @jr64 and others for the progress on this. I've gotten this to work (sort of) on a T480s with @jr64's kernel module and `libnfc-nci-R2.2`. However, with the `nfcDemoApp` (in...

Hi Nguyen, This was a quick lunchtime project that I decided to push to github. Still in it's early stages.. Kind of shocked you found it at all. :) Will...

Can you try adding a `test` user to your system and run the exploit from that? I've seen issues where a user who's already privileged to use sudo make the...

@Lyes06 Good to see you could get it working with a different user! `fuzz2.py` must be run as a user who has sudo rights (if you look in the script...

Hey guys, I've not had much time to look at any of this. It seems the majority of issues being created are in the form of "HALP PLZ SUPPORT DISTRO...

Hi @Amodio. I will try to investigate this once I find some time. Thanks for reporting.

@MattyAgain is there an easy way to get access to a Debian Openstack VM? I tried converting the qcow2 to vdi using `qemu-img convert..` but it stops somewhere early in...

@MattyAgain thanks for the zip file, VM works a charm. Unfortunately I was not able to get the exploit working so far. I might investigate more but no promises when....

Finding target can't be trivially explained in a comment. I suggest reading this excellent writeup https://www.kalmarunionen.dk/writeups/sudo/ as it covers the same exploitation strategy as this exploit. As far as setting...

Sorry about that. To be honest I don't understand apt policies. Something is preventing us from installing the older (by now) 2.4.49 package (even though it still exists on the...