The gMan nixWiki

Because the mind is made of Teflon...

User Tools

Site Tools


method_5_post-exploitation

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

Both sides previous revisionPrevious revision
Next revision
Previous revision
method_5_post-exploitation [2022/11/20 21:31] – [Linux] gmanmethod_5_post-exploitation [2023/01/12 00:31] (current) – [First Thing] gman
Line 33: Line 33:
     * Concealment     * Concealment
     * Retain Access     * Retain Access
 +
 +----
 +
 +===== First Thing =====
 +
 +After you've compromised a system, one of the //**first things**// you want to try is acquiring the local credential store (passwords).
 +
 +**Windows:** The go-to tool is ''mimikatz'' (it can read hashes directly from memory).
 +
 +**Linux:** The ''creddump'' package contains...
 +  - ''cachedump'': dumps cashed credentials
 +  - ''lsadump'': dumps LSA Secrets
 +  - ''pwdump'': dumps password hashes
 +
 +Linux passwords are usually found in ''/etc/shadow''.
 +  * You can simply copy that file to your attack machine and crack offline (if you have root).
 +  * Therefore, priv esc is a key part of acquiring credentials.
  
 ---- ----
Line 93: Line 110:
 ====== Privilege Escalation ====== ====== Privilege Escalation ======
  
-===== udevd =====+===== Linux ===== 
 + 
 +==== SUDO ==== 
 + 
 +''sudo'' is the "super user do" command.  
 +  * It allows users to escalate their privileges based on settings in the ''/etc/sudoers'' file. 
 +  * When the ''sudo'' command is called, the ''sudoers'' file is checked and rights are granted if they are permitted.  
 + 
 +Therefore, //**always**// review the ''sudoers'' file after you gain access to a machine. 
 +  * Figure out which accounts you want to target based on the rights they have. 
 +  * Try to compromise accounts with sudo privilege. 
 + 
 +One of the first commands you want to execute in order to abuse sudoer rights: ''sudo -l'' 
 +  * This will list ("-l" is for "list") the sudoers. 
 +  * This shows you the user account names and privileges they have within the sudo environment. 
 + 
 +---- 
 + 
 +==== SUID ==== 
 + 
 +**SUID:** Set User ID.  **SGID:** Set Group ID 
 +  * These are special bits of a file that tell Linux to run the executable as the owner (SUID) or as the group (SGID) of the file, not as the user who launched it.  
 + 
 +To find all the files on a system that have the SUID bit set:  
 + 
 +<code> 
 +find / -perm -4000 
 +# or 
 +find / -perm /4000 
 + 
 +# To see all the details: 
 +find / -perm -u=s -type f 2>/dev/null 
 +# or 
 +find / -user root -perm -4000 -exec ls -ldb {} \; 
 +# note: you need a space between {} and \; 
 +</code> 
 + 
 +---- 
 + 
 +==== udevd ====
  
 If you get a user/daemon shell, you need to escalate your privileges to root. Check udevd... If you get a user/daemon shell, you need to escalate your privileges to root. Check udevd...
Line 175: Line 231:
 ---- ----
  
 +===== Windoze =====
 +
 +==== LSA Secrets Registry ====
 +
 +The **LSA Secrets Registry** contains the password of the currently logged-in user in an encrypted form.
 +  * You can find the LSA Secrets Registry here: ''HKEY_LOCAL_MACHINE/Security/Policy/Secrets''
 +  * You can find the encryption key to the user's password in the parent directory: ''HKEY_LOCAL_MACHINE/Security/Policy''
 +
 +So, if you have admin access to the Windows Registry, you can recover the encrypted password and its key fairly easily. 
method_5_post-exploitation.1668979894.txt.gz · Last modified: by gman