Post Exploitation
Last updated
Was this helpful?
Last updated
Was this helpful?
Running LinEnum, there was only one thing that stood out.
Port 22 appears to be open, even though it was closed in our nmap. This can be exploited by port knocking.
After reading the above, chroot will execute files in the /tmp directory. We have to create an executable and that we want to run in that directory. We do so with the following command.
Creating our listener and waiting a bit, we eventually get a root shell.