From the course: Kali Linux for Advanced Pen Testing and Ethical Hacking

Unlock this course with a free trial

Join today to access over 25,300 courses taught by industry experts.

Escalating to root

Escalating to root

- [Instructor] We've looked at a number of Metasploitable attacks that provide a user shell. But our goal is to get full control of the system through a root shell. Let's look at how we escalate privileges. First of all, let's go back to one of our user shells that we got with the shelly.php implant, which we uploaded using ProFTPD. We still have the PHP file loaded into Metasploitable. So all we need to do is to execute it and link back to our listener, nc -lvnp 2222. And we execute, and we have a shell. Okay, now we're here. Let's get the exact operating system and version. Uname -a, lsb_release -a. We can see we're Linux Kernel 2.6.24 and we're running Ubuntu 8.04. Let's see what the Ubuntu exploits there are for a Linux Kernel with 2.6 in its version using Searchsploit. Searchsploit Linux Kernel 2.6 Ubuntu. And we see we've got quite a few. I'll select the third on the list. It's a C program, so we'll have to…

Contents