From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Unlock this course with a free trial
Join today to access over 25,300 courses taught by industry experts.
Escalating to root - Linux Tutorial
From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking
Escalating to root
- [Instructor] We've looked at a number of Metasploitable attacks that provide a user shell. But our goal is to get full control of the system through a root shell. Let's look at how we escalate privileges. First of all, let's go back to one of our user shells that we got with the shelly.php implant, which we uploaded using ProFTPD. We still have the PHP file loaded into Metasploitable. So all we need to do is to execute it and link back to our listener, nc -lvnp 2222. And we execute, and we have a shell. Okay, now we're here. Let's get the exact operating system and version. Uname -a, lsb_release -a. We can see we're Linux Kernel 2.6.24 and we're running Ubuntu 8.04. Let's see what the Ubuntu exploits there are for a Linux Kernel with 2.6 in its version using Searchsploit. Searchsploit Linux Kernel 2.6 Ubuntu. And we see we've got quite a few. I'll select the third on the list. It's a C program, so we'll have to…
Practice while you learn with exercise files
Download the files the instructor uses to teach the course. Follow along and learn by watching, listening and practicing.
Contents
-
-
-
-
-
-
-
(Locked)
Targeting Metasploitable44s
-
(Locked)
Exploiting VSFTPD3m 22s
-
(Locked)
Exploiting with ProFTPD4m 52s
-
(Locked)
Exploiting Tomcat2m 58s
-
(Locked)
Exploiting IRC1m 23s
-
(Locked)
Exploiting the distributed compile system1m 35s
-
(Locked)
Exploiting network files2m 59s
-
(Locked)
Hiding in plain sight43s
-
(Locked)
Escalating to root5m 18s
-
(Locked)
-
-
-
-