Bounty Hacker
Anon FTP - Password Cracking - TAR Binary Exploitation
Initial Enumeration
Only three ports were open -
21
,22
,80
Deep enumeration on port 80, din't give anything useful
Nmap script scan told us - FTP anonymous access is allowed, logging onto that gave us two sensitive files
One of which had a list of potential passwords, and in the other file we found a potential username called
lin
Since port 22 was
open
, bruteforced the password usinghydra
- Got a shell !
Privilege Escalation
Basic enumeration on the user's file system gave us nothing
Tried to check
sudo lists
usingsudo -l
, gave the current user's password and surprisingly told us/usr/bin/tar
- was running as a sudo userImmediately used gtfobins to abuse
tar
sudo tar -cf /dev/null /dev/null --checkpoint=1 --checkpoint-action=exec=/bin/sh
Last updated