Skip to content

MA-C/Peter-Piper

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

52 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Peter Piper Documentation

1. INTRODUCTION


This script was made as an alternative to legitimate authentication in Applescript. This script uses a method of exploitation in OS X called root piping.

2. EXPLOIT


This script uses an exploit called rocket pipe for OSX 10.10.4 and below. It’s reference information is [here](https://www.sektioneins.de/en/blog/15-07-07-dyld_print_to_file_lpe.html). This exploit gives whatever user that executes it admin instantly. This script also uses an exploit called muymacho for OSX 10.10.5 only. It's reference information is [here] (https://luismiras.github.io/muymacho-exploiting_DYLD_ROOT_PATH/) This exploit gives whatever user that executes it admin instantly.

3. INSTALL


We use `cURL` to get the Java 8 Update 60 package onto the target computer and into a temporary directory, then the `installer` command featured in the OS X command line to install the .pkg we fetched. This is the correct command for this particular task because it skips the graphical installer meaning it can run behind the scenes without target knowledge.

4. CLEANUP


We first remove the temporary directory used to store the Java package during install, then we use the command `sed` to remove the target from the sudoers list.

5. function KeepSafe { } & trap


This is used to ensure the completion of the command if it fails.

License

MIT License

About

Simple Java 8 updater (bash script) made for Madison Academy.

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages