Irked
UnrealIRCd Backdoor exploitation - Custom binary manipulation PrivEsc
Last updated
UnrealIRCd Backdoor exploitation - Custom binary manipulation PrivEsc
Last updated
Starting off with the nmap scan
Ports 22 and 111 running OpenSSH 6.7p1 and rpcbind 2–4 don’t look promising
Ports 6697, 8067 & 65534 are running UnrealIRCd - A version of this service was vulnerable to a backdoor command execution
Port 8067 is vulnerable!
and we get a reverse shell on our listener !
Running the binary gives us an error message
The script is searching /tmp/listusers
, we can easily manipulate the script by invoking bash as the /tmp/listusers