Post Exploitation

Elevating Privileges

Running the following command we can see commands that we can execute without a sudo password

sudo -l 
Looks like we can run /bin/tar

Upon reading on the tar manual, we can actually use tar to spawn a shell!, wtf?!

Post Exploitation Enumeration

The way we’re going to escalate privileges is by creating our own compressed file that contains an SUID executable.

The way we’re going to escalate privileges is by creating our own compressed file that contains an SUID executable.

Create a file on our attacker machine

Compress the var directory and save it to the file called exploit

copy to our target machine in /var/tmp

check time with

Last updated

Was this helpful?