Post Exploitation
Elevating Privileges
Running the following command we can see commands that we can execute without a sudo password
sudo -l 
Upon reading on the tar manual, we can actually use tar to spawn a shell!, wtf?!

Post Exploitation Enumeration

The way we’re going to escalate privileges is by creating our own compressed file that contains an SUID executable.
The way we’re going to escalate privileges is by creating our own compressed file that contains an SUID executable.
Create a file on our attacker machine
Compress the var directory and save it to the file called exploit
copy to our target machine in /var/tmp
check time with

Last updated
Was this helpful?
