/etc/dnsmasq.conf
:
listen-address=::1,127.0.0.1
interface=lo
conf-dir=/etc/dnsmasq.d
bind-interfaces
/etc/dnsmasq.d/openresolv.conf
:
#!/bin/bash | |
# script to mount and chroot into a rootfs directory | |
# designed for openwrt systems, but should work for anything with minimal modifications | |
# unless you specify a different chroot dir, | |
# place script on the same level as the rootfs directory, should look something like so: | |
# /mnt/ | |
# |- chroot.sh | |
# |- rootfs/ |
#!/bin/sh | |
_DATA="[$(date -uR)] | |
PID $$: $(tr '\0' ' ' < /proc/$$/cmdline) | |
PPID $PPID: $(tr '\0' ' ' < /proc/$PPID/cmdline) | |
UGID: $(id) | |
[-------------------------------] | |
" | |
echo "$_DATA" >> /tmp/trig |
#!/usr/bin/env python | |
""" | |
Let's say you've been able to run a SUID binary and | |
dropped into a shell where your EUID is 0, but your | |
real UID/GID are still 1000. There's no C compiler | |
and you're not really keen on dropping files on disk. | |
bash drops EUID for security purposes and sudo still | |
asks for a password. But there's Python installed. | |
""" |
/etc/dnsmasq.conf
:
listen-address=::1,127.0.0.1
interface=lo
conf-dir=/etc/dnsmasq.d
bind-interfaces
/etc/dnsmasq.d/openresolv.conf
: