Demonstrating Session Hijacking & Linux Privilege Escalation | TryHackMe Hijack

preview_player
Показать описание
In this video walk-through, we covered a boot to root machine where we started with an Nmap scan to discover several open ports and services running such as FTP server, Apache web server and NFS file share. By mounting the NFS file share to our local machine we discovered plain text credentials which got us access to the FTP server. Next we downloaded text files from FTP server, one included a note from the admin and the other included tenths of passwords. Because rate limiting is implemented on the server, we didn't run brute force on the login form found on the web page rather we found that the PHPsession ID is computed using a combination of base64 and md5 hash that included the username and password of the logged on user. We created a python script that iterates through the password list we found earlier, calculates the md5sum of the password, encodes it with base64 to find the session ID and tries it against the administration page. This enabled us to find the correct password of the admin user along with the session ID. Next we achieved a reverse shell by chaining commands on the server status page and later on achieved privilege escalation by exploiting a misconfigured library path through sudo with the Apache process.
**********
Receive Cyber Security Field, Certifications Notes and Special Training Videos
******
Writeup
TryHackMe Hijack
********
Patreon
Instagram
Twitter
Facebook
LinkedIn
Website
Backup channel
My Movie channel:
******
Рекомендации по теме
Комментарии
Автор

Will you please tell me that where did you get this "Cyber Security Manual / Red Team"? It would be very helpful for me in penetration testing.
Thank you

nilshopnil