description |
---|
Practice your Linux Privilege Escalation skills on an intentionally misconfigured Debian VM with multiple ways to get root! SSH is available. Credentials: user:password321 |
{% embed url="https://tryhackme.com/room/linuxprivesc" %} https://tryhackme.com/room/linuxprivesc {% endembed %}
Room Attributes | Value |
---|---|
Subscription Required | False [Free] |
Type | Walkthroughs |
Difficulty | Medium |
Tags | PrivEsc, Privilege Escalation, Linux, Linux Privilege Escalation |
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩uid=1000(user) gid=1000(user) groups=1000(user),24(cdrom),25(floppy),29(audio),30(dip),44(video),46(plugdev)
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩$6$Tb/euwmK$OXA.dwMeOAcopwBl68boTG5zi65wIHsc84OWAIye5VITLLtVlaXvRDJXET..it8r.jbrlpfZeMdwD3B0fGxJI0
{% hint style="warning" %} HINT: john the ripper should automatically identify it when cracking! {% endhint %}
Reveal Flag 🚩
🚩sha512crypt
Reveal Flag 🚩
🚩password123
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩uid=0(root) gid=0(root) groups=0(root)
Reveal Flag 🚩
🚩11
Reveal Flag 🚩
🚩apache2
Consider how you might use this program with sudo to gain root privileges without a shell escape sequence.
{% hint style="warning" %} HINT: Play around with certain options the program has! {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩/home/user:/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩mysql -h somehost.local -uroot -ppassword123
Reveal Flag 🚩
🚩/etc/openvpn/auth.txt
{% hint style="success" %} No answer needed {% endhint %}
Reveal Flag 🚩
🚩no_root_squash
{% hint style="success" %} No answer needed {% endhint %}
Experiment with all three tools, running them with different options. Do all of them identify the techniques used in this room?
{% hint style="success" %} No answer needed {% endhint %}