Kenobi
January 11, 2024
Last updated
January 11, 2024
Last updated
View the log.txt then we can see some id_rsa information
Use exploit db to search for exploits about ProFTPD located in port 21
This will copy the file id_rsa to /var/tmp
Then after that we will mount that directory to ours
First make dir in /tmp
Change the permission to 600 cuz that's what rsa wants
Then just ssh to the kenobi user
We copied the /bin/sh shell, called it curl, gave it the correct permissions and then put its location in our path.
This meant that when the /usr/bin/menu binary was run, its using our path variable to find the "curl" binary..
Which is actually a version of /usr/sh, as well as this file being run as root it runs our shell as root!