Linux Privilege Escalation Techniques | Cron Jobs | TryHackMe

preview_player
Показать описание
In this video walk-through, we covered Linux Privilege Escalation through the cron tab in Linux. Cron tab includes all cron jobs of programs scheduled to run at specific time.
#Linux
----
Answers
--------
Receive Cyber Security Field Notes
-------
Patreon
Backup channel
My Movie channel:
------------
Рекомендации по теме
Комментарии
Автор

Hi. I'm just trying to practice privilege escalation on my own machine (VM). I've seen a method on the internet where you overwrite a file that is writable by the user and run as root. I noticed such a directory on Kali in the /etc/cron.hourly folder.
However, this file is a Linux regular file.

Do you know if I can overwrite its contents with reverse shell code?

The plan is to get root using netcat on regular user and listen for example host and thus file with previously entered as RHOST="1270.0.1" and some port.

I have a problem because when I try to run this regular .placeholder file, I get a message that connection is refused.

What could be causing this?

KarolinaRiddle
Автор

can you tell me why did u use the (elf )on the payload

moaxd
Автор

كنت عايز نسخه من my notes library الجميله دي ينفع ؟ طب الاقيها فين ؟

nagyhassan
Автор

in 4:50 I didn't recieved the listening why ip and port is right ?

TheWasem
Автор

hi, thank you for the explanation, I learned a lot from you.

Just one small thing...

After getting the first shell, I didn't see you modify the "overwrite.sh" back to what it was, or delete the code. How can we know the second shell is not just the result of "overwrite.sh" You also used the same port.

erhugirl
Автор

I have a problem when i do nc -lvp 4545 it just keeps listening with result
Also with wget it keeps saying that it timed out and try again, what is the solution?

ibrahimbah
Автор

I have a cron that executes a file .sh with perms 777, but it runs as a common user, do you know how to proceed?

nitczi
visit shbcf.ru