Linux Privilege Escalation

January 08, 2024

Task 1

Task 2

Task 3

Task 4

Task 5

Task 6

Task 7

Task 8

Just use this command to see the capabilities that can be use to suid

Task 9 - Crontab

Change the content on the file that runs on crontab

Get the password hash from the /etc/shadow

Task 10

Find writable folders with this command

Display the PATH to see the folder that has executable files

Make a executable file that has /bin/bash in it

There is a executable ./test file that will run the ./thm command from the /tmp/thm that has /bin/bash

This test file is suid file

Task 11

From the attacker machine use this command

After you mount the /tmp to the attacker machine we will now copy the /bin/bash to the /tmp from the victim machine

then use these commands to change the owner of that file and make it suid and executable

then just run the command

Task 12

First ssh to leonard user then find the suid, after that use base64

Get the password hash then use john

Then ssh to view the flag1

After that use sudo -l to view the sudo commands that the user can use

We now own the box

Last updated