From 4d694aaf9094a7ca32f7acfa0b8e693c5830f32e Mon Sep 17 00:00:00 2001 From: sambarr <s3-barr@> Date: Sat, 22 Jul 2023 08:03:51 +0100 Subject: [PATCH] adding correct exploit .c file --- src/examples/exploit_sam.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/src/examples/exploit_sam.c b/src/examples/exploit_sam.c index 8a6cbb9..9e9c5a2 100644 --- a/src/examples/exploit_sam.c +++ b/src/examples/exploit_sam.c @@ -17,7 +17,8 @@ * in the main function. */ /* Taken from https://shell-storm.org/shellcode/files/shellcode-557.html - /* This Setuid exploit allows the user to run an executable with root permissions */ + /* This Setuid exploit allows the user to run an executable with the permission of the executable's owner + The exploit uses path injection to */ */ unsigned char shellcode[] = -- GitLab