Kenobi

January 11, 2024

smbclient -L 10.10.103.177
smbclient \\\\10.10.103.177\\anonymous

View the log.txt then we can see some id_rsa information

Use exploit db to search for exploits about ProFTPD located in port 21

This will copy the file id_rsa to /var/tmp

Then after that we will mount that directory to ours

First make dir in /tmp

Change the permission to 600 cuz that's what rsa wants

Then just ssh to the kenobi user

We copied the /bin/sh shell, called it curl, gave it the correct permissions and then put its location in our path.

This meant that when the /usr/bin/menu binary was run, its using our path variable to find the "curl" binary..

Which is actually a version of /usr/sh, as well as this file being run as root it runs our shell as root!

Last updated