method_5_post-exploitation
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revisionNext revision | Previous revision | ||
method_5_post-exploitation [2022/11/20 21:11] – [Windows] gman | method_5_post-exploitation [2023/01/12 00:31] (current) – [First Thing] gman | ||
---|---|---|---|
Line 33: | Line 33: | ||
* Concealment | * Concealment | ||
* Retain Access | * Retain Access | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ===== First Thing ===== | ||
+ | |||
+ | After you've compromised a system, one of the //**first things**// you want to try is acquiring the local credential store (passwords). | ||
+ | |||
+ | **Windows: | ||
+ | |||
+ | **Linux:** The '' | ||
+ | - '' | ||
+ | - '' | ||
+ | - '' | ||
+ | |||
+ | Linux passwords are usually found in ''/ | ||
+ | * You can simply copy that file to your attack machine and crack offline (if you have root). | ||
+ | * Therefore, priv esc is a key part of acquiring credentials. | ||
---- | ---- | ||
Line 81: | Line 98: | ||
===== Linux ===== | ===== Linux ===== | ||
- | more to come... | + | **Common Attack Vectors: |
+ | * SUID/SGID files | ||
+ | * Cron jobs | ||
+ | * The kernel | ||
+ | * Check to see if ''/ | ||
+ | * Check sudo: '' | ||
+ | * You can also '' | ||
---- | ---- | ||
Line 87: | Line 110: | ||
====== Privilege Escalation ====== | ====== Privilege Escalation ====== | ||
- | ===== udevd ===== | + | ===== Linux ===== |
+ | |||
+ | ==== SUDO ==== | ||
+ | |||
+ | '' | ||
+ | * It allows users to escalate their privileges based on settings in the ''/ | ||
+ | * When the '' | ||
+ | |||
+ | Therefore, // | ||
+ | * Figure out which accounts you want to target based on the rights they have. | ||
+ | * Try to compromise accounts with sudo privilege. | ||
+ | |||
+ | One of the first commands you want to execute in order to abuse sudoer rights: '' | ||
+ | * This will list (" | ||
+ | * This shows you the user account names and privileges they have within the sudo environment. | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== SUID ==== | ||
+ | |||
+ | **SUID:** Set User ID. **SGID:** Set Group ID | ||
+ | * These are special bits of a file that tell Linux to run the executable as the owner (SUID) or as the group (SGID) of the file, not as the user who launched it. | ||
+ | |||
+ | To find all the files on a system that have the SUID bit set: | ||
+ | |||
+ | < | ||
+ | find / -perm -4000 | ||
+ | # or | ||
+ | find / -perm /4000 | ||
+ | |||
+ | # To see all the details: | ||
+ | find / -perm -u=s -type f 2>/ | ||
+ | # or | ||
+ | find / -user root -perm -4000 -exec ls -ldb {} \; | ||
+ | # note: you need a space between {} and \; | ||
+ | </ | ||
+ | |||
+ | ---- | ||
+ | |||
+ | ==== udevd ==== | ||
If you get a user/daemon shell, you need to escalate your privileges to root. Check udevd... | If you get a user/daemon shell, you need to escalate your privileges to root. Check udevd... | ||
Line 169: | Line 231: | ||
---- | ---- | ||
+ | ===== Windoze ===== | ||
+ | |||
+ | ==== LSA Secrets Registry ==== | ||
+ | |||
+ | The **LSA Secrets Registry** contains the password of the currently logged-in user in an encrypted form. | ||
+ | * You can find the LSA Secrets Registry here: '' | ||
+ | * You can find the encryption key to the user's password in the parent directory: '' | ||
+ | |||
+ | So, if you have admin access to the Windows Registry, you can recover the encrypted password and its key fairly easily. |
method_5_post-exploitation.1668978716.txt.gz · Last modified: by gman