Checking the sudo privileges of current user is almost always the first thing that I do right after the initial foothold

nibbler


nibbler@nibbles:/var/www/html/nibbleblog/content/private/plugins/my_image$ sudo -l
matching defaults entries for nibbler on nibbles:
    env_reset, mail_badpass,
    secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
 
user nibbler may run the following commands on nibbles:
    (root) nopasswd: /home/nibbler/personal/stuff/monitor.sh

nibbler is able to execute /home/nibbler/personal/stuff/monitor.sh as therootuser without prompted for password

/home/nibbler/personal/stuff/monitor.sh


What could this be?

nibbler@Nibbles:/tmp$ cat /home/nibbler/personal/stuff/monitor.sh
cat /home/nibbler/personal/stuff/monitor.sh
cat: /home/nibbler/personal/stuff/monitor.sh: No such file or directory

Says it doesn’t exist

nibbler@Nibbles:/tmp$ cd /home/nibbler ; ll
total 28K
4.0K drwx------ 2 nibbler nibbler 4.0K Jan 13 23:29 .gnupg
4.0K drwxr-xr-x 5 nibbler nibbler 4.0K Jan 13 23:29 .
4.0K drwxr-x--- 3 nibbler nibbler 4.0K Jan 13 23:26 .config
4.0K -r-------- 1 nibbler nibbler   33 Jan 13 22:45 user.txt
   0 -rw------- 1 nibbler nibbler    0 Dec 29  2017 .bash_history
4.0K -r-------- 1 nibbler nibbler 1.9K Dec 10  2017 personal.zip
4.0K drwxrwxr-x 2 nibbler nibbler 4.0K Dec 10  2017 .nano
4.0K drwxr-xr-x 3 root    root    4.0K Dec 10  2017 ..

It never existed. At this point, it doesn’t matter as I could just make the whole thing up and have code execution.

But I wanna see what’s in the zip file; personal.zip Based on the name, it appears to be relevant

nibbler@Nibbles:/home/nibbler$ unzip personal.zip
unzip personal.zip
Archive:  personal.zip
   creating: personal/
   creating: personal/stuff/
  inflating: personal/stuff/monitor.sh  

It was literally /home/nibbler/personal/stuff/monitor.sh

nibbler@Nibbles:/home/nibbler/personal/stuff$ cat monitor.sh
                  ####################################################################################################
                  #                                        Tecmint_monitor.sh                                        #
                  # Written for Tecmint.com for the post www.tecmint.com/linux-server-health-monitoring-script/      #
                  # If any bug, report us in the link below                                                          #
                  # Free to use/edit/distribute the code below by                                                    #
                  # giving proper credit to Tecmint.com and Author                                                   #
                  #                                                                                                  #
                  ####################################################################################################
#! /bin/bash
# unset any variable which system may be using
 
# clear the screen
clear
 
unset tecreset os architecture kernelrelease internalip externalip nameserver loadaverage
 
while getopts iv name
do
        case $name in
          i)iopt=1;;
          v)vopt=1;;
          *)echo "Invalid arg";;
        esac
done
 
if [[ ! -z $iopt ]]
then
{
wd=$(pwd)
basename "$(test -L "$0" && readlink "$0" || echo "$0")" > /tmp/scriptname
scriptname=$(echo -e -n $wd/ && cat /tmp/scriptname)
su -c "cp $scriptname /usr/bin/monitor" root && echo "Congratulations! Script Installed, now run monitor Command" || echo "Installation failed"
}
fi
 
if [[ ! -z $vopt ]]
then
{
echo -e "tecmint_monitor version 0.1\nDesigned by Tecmint.com\nReleased Under Apache 2.0 License"
}
fi
 
if [[ $#--eq-0-| -eq 0 ]]
then
{
 
 
# Define Variable tecreset
tecreset=$(tput sgr0)
 
# Check if connected to Internet or not
ping -c 1 google.com &> /dev/null && echo -e '\E[32m'"Internet: $tecreset Connected" || echo -e '\E[32m'"Internet: $tecreset Disconnected"
 
# Check OS Type
os=$(uname -o)
echo -e '\E[32m'"Operating System Type :" $tecreset $os
 
# Check OS Release Version and Name
cat /etc/os-release | grep 'NAME\|VERSION' | grep -v 'VERSION_ID' | grep -v 'PRETTY_NAME' > /tmp/osrelease
echo -n -e '\E[32m'"OS Name :" $tecreset  && cat /tmp/osrelease | grep -v "VERSION" | cut -f2 -d\"
echo -n -e '\E[32m'"OS Version :" $tecreset && cat /tmp/osrelease | grep -v "NAME" | cut -f2 -d\"
 
# Check Architecture
architecture=$(uname -m)
echo -e '\E[32m'"Architecture :" $tecreset $architecture
 
# Check Kernel Release
kernelrelease=$(uname -r)
echo -e '\E[32m'"Kernel Release :" $tecreset $kernelrelease
 
# Check hostname
echo -e '\E[32m'"Hostname :" $tecreset $HOSTNAME
 
# Check Internal IP
internalip=$(hostname -I)
echo -e '\E[32m'"Internal IP :" $tecreset $internalip
 
# Check External IP
externalip=$(curl -s ipecho.net/plain;echo)
echo -e '\E[32m'"External IP : $tecreset "$externalip
 
# Check DNS
nameservers=$(cat /etc/resolv.conf | sed '1 d' | awk '{print $2}')
echo -e '\E[32m'"Name Servers :" $tecreset $nameservers 
 
# Check Logged In Users
who>/tmp/who
echo -e '\E[32m'"Logged In users :" $tecreset && cat /tmp/who 
 
# Check RAM and SWAP Usages
free -h | grep -v + > /tmp/ramcache
echo -e '\E[32m'"Ram Usages :" $tecreset
cat /tmp/ramcache | grep -v "Swap"
echo -e '\E[32m'"Swap Usages :" $tecreset
cat /tmp/ramcache | grep -v "Mem"
 
# Check Disk Usages
df -h| grep 'Filesystem\|/dev/sda*' > /tmp/diskusage
echo -e '\E[32m'"Disk Usages :" $tecreset 
cat /tmp/diskusage
 
# Check Load Average
loadaverage=$(top -n 1 -b | grep "load average:" | awk '{print $10 $11 $12}')
echo -e '\E[32m'"Load Average :" $tecreset $loadaverage
 
# Check System Uptime
tecuptime=$(uptime | awk '{print $3,$4}' | cut -f1 -d,)
echo -e '\E[32m'"System Uptime Days/(HH:MM) :" $tecreset $tecuptime
 
# Unset Variables
unset tecreset os architecture kernelrelease internalip externalip nameserver loadaverage
 
# Remove Temporary Files
rm /tmp/osrelease /tmp/who /tmp/ramcache /tmp/diskusage
}
fi
shift $(($OPTIND -1))

This is some kind of system health checking tool.

Since I own the file, I can just overwrite it for privilege escalation