- Windows Privilege Escalation Fundamentals
- Basic Linux Privilege Escalation
Linuxprivchcker needs python on the system which usually is there. If not, one could do the similar thing using bash. Will have to serach in gethub sitepython -c 'import pty; pty.spawn("/bin/sh")'……emulate bash session from an hacked session so one can enter root pwd. If you try w/o it, you may get a message "su: must be run from a terminal"From <https://netsec.ws/?p=337> - Linux Post Exploitation Command List
- Escaping Restricted Linux Shells
- Offensive Security’s Exploit Database Archive
From <https://www.exploit-db.com/> - Escaping restricted shell :
If I can run the command echo, I can easily “escape” and bypass the limited shell by using the command echo os.system('/bin/bash') - Password cracker Last 50 successful MD5 decryptions / founds
-
From <https://hashkiller.co.uk/> - The following python script appeared to create the above string in cryptedpass.txt: /encode & decode pwd
sh-4.1$ cat cryptpass.py
cat cryptpass.py
#Enhanced with thanks to Dinesh Singh Sikawar @LinkedIn
import base64,codecs,sysdef encodeString(str):
base64string= base64.b64encode(str)
return codecs.encode(base64string[::-1], 'rot13')cryptoResult=encodeString(sys.argv[1])
print cryptoResultThe above script was modified on the attacking machine to decode the string:#Enhanced with thanks to Dinesh Singh Sikawar @LinkedIn
import base64,codecs,sysdef encodeString(str):
base64string= base64.b64encode(str)
return codecs.encode(base64string[::-1], 'rot13')def decodeString(str):
string = str[::-1]
string = string.encode("rot13")
return base64.b64decode(string)print decodeString(sys.argv[1])String successfully decoded:[root:~]# python reverse.py "=RFn0AKnlMHMPIzpyuTI0ITG"
LetThereBeFristi!
From <https://highon.coffee/blog/fristileaks-walkthrough/>
Walkthrough 1. https://medium.com/@Kan1shka9/pentesterlab-php-include-and-post-exploitation-walkthrough-8a85bcfa7b1d 2. Ine [] 3. http://megwhite.com.au/pentester-lab-bootcamp-walkthrough-php-include-post-exploitation/ 4. http://fallensnow-jack.blogspot.com/2014/07/pentester-lab-php-lfi-post-exploitation.html Notes: root@kali:~# nmap 10.0.0.12 Starting Nmap 7.40 ( https://nmap.org ) at 2017-05-30 12:23 EDT Nmap scan report for 10.0.0.12 Host is up (0.00035s latency). Not shown: 999 filtered ports PORT STATE SERVICE 80/tcp open http MAC Address: 08:00:27:1F:12:24 (Oracle VirtualBox virtual NIC) Nmap done: 1 IP address (1 host up) scanned in 5.31 seconds root@kali:~# Enumerating port 80 Run dirb root@kali:~# dirb http://10.0.0.12/ ----------------- DIRB v2.22 By The Dark Raver...
Comments
Post a Comment