Kenobi
January 11, 2024
smbclient -L 10.10.103.177
smbclient \\\\10.10.103.177\\anonymous
View the log.txt then we can see some id_rsa information




Use exploit db to search for exploits about ProFTPD located in port 21


This will copy the file id_rsa to /var/tmp

Then after that we will mount that directory to ours
First make dir in /tmp

Change the permission to 600 cuz that's what rsa wants

Then just ssh to the kenobi user


We copied the /bin/sh shell, called it curl, gave it the correct permissions and then put its location in our path.
This meant that when the /usr/bin/menu binary was run, its using our path variable to find the "curl" binary..
Which is actually a version of /usr/sh, as well as this file being run as root it runs our shell as root!
Last updated