Room Link: https://tryhackme.com/room/linprivesc
What is the hostname of the target system?
Victim
What is the Linux kernel version of the target system?
Victim
What Linux is this?
Victim
What version of the Python language is installed on the system?
Victim
What vulnerability seem to affect the kernel of the target system? (Enter a CVE number)
CVE-2015-1328
Privilege Escalation: Kernel Exploits
Victim
Kali
Victim
Privilege Escalation: Sudo
How many programs can the user "karen" run on the target system with sudo rights?
Victim
What is the content of the flag2.txt file?
Victim
How would you use Nmap to spawn a root shell if your user had sudo rights on nmap?
Victim
What is the hash of frank's password?
Victim
Privilege Escalation: SUID
Victim
Which user shares the name of a great comic book writer?
Victim
What is the password of user2?
Since base64 was in the list we can read the contents of shadow and passwd with it. Once outputted save the results on Kali.
Victim
Kali
What is the content of the flag3.txt file?
Victim
Privilege Escalation: Capabilities
How many binaries have set capabilities?
Victim
What is the content of the flag4.txt file?
Victim
Victim
Privilege Escalation: Cron Jobs
How many user-defined cron jobs can you see on the target system?
Victim
Victim
Kali
Victim
What is Matt's password?
Cat files and copy over to Kali.
Victim
Kali
Privilege Escalation: PATH
What is the odd folder you have write access for?
Victim
Exploit the $PATH vulnerability to read the content of the flag6.txt file
Victim
Privilege Escalation: NFS
Victim
Kali
nfc.c
Kali
Victim
Capstone Challenge
Victim
Kali
Victim
Victim