Yep, actually had a reply in my drafts. I think he's serious. We've been getting those lately.
t On Aug 27, 2012, at 2:37 PM, Wiliam Steck <[email protected]> wrote: > this will only work if the desired user is in sudo and has permissions to > execute as root. > Otherwise, this post was a huge troll to get traffic to the website this > article is hosted on. > > [20101:20100 - 0:501] 02:31:36 [nethic@nekobus:/dev/pts/9 +1] ~ > $ fakeroot > > [20209:20194 - 0:501] 02:31:39 [root@nekobus:/dev/pts/9 +3] ~ > $ ls /root > ls: cannot open directory /root: Permission denied > > [20209:20194 - 0:502] 02:31:47 [root@nekobus:/dev/pts/9 +3] ~ > $ python > Python 2.7.3 (default, Apr 20 2012, 22:39:59) > [GCC 4.6.3] on linux2 > Type "help", "copyright", "credits" or "license" for more information. > >>> import os > >>> os.system("sudo su") > ERROR: ld.so: object 'libfakeroot-sysv.so' from LD_PRELOAD cannot be > preloaded: ignored. > [sudo] password for nethic: > Sorry, try again. > [sudo] password for nethic: > Sorry, try again. > [sudo] password for nethic: > Sorry, try again. > sudo: 3 incorrect password attempts > 256 > >>> os.system("touch /root/test") > touch: cannot touch `/root/test': Permission denied > 256 > > Better luck next time <3 <3 <3 > _______________________________________________ > Full-Disclosure - We believe in it. > Charter: http://lists.grok.org.uk/full-disclosure-charter.html > Hosted and sponsored by Secunia - http://secunia.com/ _______________________________________________ Full-Disclosure - We believe in it. Charter: http://lists.grok.org.uk/full-disclosure-charter.html Hosted and sponsored by Secunia - http://secunia.com/
