10/100

Linux Exploitation

LUHack

Linux Exploitation


The goal on compromising a Linux machine is to escalate privileges to root or pivot to other machines on the network.


Some useful info


Cron


Schedule strings are in the format:

1
* * * * * command to be executed

Where the fields are:


$PATH


which


Envriorment Variables


Linux File Permissions


1
2
$ ls -la .bashrc
-rw-r--r-- 1 max max 2757 Dec 25 23:36 .bashrc

-rw-r-x—

In the format

1
{file type}{owner permissions}{group permissions}{other permissions}

Numeric Permissions

Therfore, rwxr-x--- would be 750


SUID/SGID

-rwsr-xr-x


Shared Objects