shelly
Checking for sudo privileges of the shelly
user after making some basic enumeration
shelly@shocker:/home/shelly$ sudo -l
matching defaults entries for shelly on shocker:
env_reset, mail_badpass,
secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/snap/bin
user shelly may run the following commands on shocker:
(root) nopasswd: /usr/bin/perl
The shelly
user is able to execute the /usr/bin/perl
command with sudo privileges
perl
According to GTFObins, perl can be abused to escalate privileges to the
root
user if configured to run with sudo
Moving on to the Privilege Escalation phase