brucetherealadmin


Checking for sudo privileges of the brucetherealadmin user after making a lateral movement

[brucetherealadmin@armageddon ~]$ sudo -l
matching defaults entries for brucetherealadmin on armageddon:
    !visiblepw, always_set_home, match_group_by_gid, always_query_group_plugin, env_reset, env_keep="COLORS DISPLAY HOSTNAME HISTSIZE
    KDEDIR LS_COLORS", env_keep+="MAIL PS1 PS2 QTDIR USERNAME LANG LC_ADDRESS LC_CTYPE", env_keep+="LC_COLLATE LC_IDENTIFICATION
    LC_MEASUREMENT LC_MESSAGES", env_keep+="LC_MONETARY LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE", env_keep+="LC_TIME LC_ALL LANGUAGE
    linguas _xkb_charset xauthority", secure_path=/sbin\:/bin\:/usr/sbin\:/usr/bin
 
user brucetherealadmin may run the following commands on armageddon:
    (root) nopasswd: /usr/bin/snap install *

The brucetherealadmin user is able to execute the /usr/bin/snap install * command with sudo privileges

Snap


According to GTFObins, snap can be abused for privilege escalation if configured with sudo privileges

Moving on to the Privilege Escalation phase