Post Exploitation
Checking for commands we can run as root


Identifying Hash

sudo john --wordlist=/usr/share/wordlist/rockyou.txt sammyhash.txt
cooldude!

Privilege Escalation
First we create a bash file

On the Sammy Computer we can use wget as root and out put the contents of a file to somewhere else on the system.

Running the /root/troll command after being overwritten

Last updated
Was this helpful?