Last updated
Last updated
when connecting to the service i tried most of the common priv esc techniques but none worked however. After being triggered for hours because it wasn't sudo -l i read the briefing again. I then googled the briefing and after quite a bit of endless googling found something called linux capabilities that could be exploited. I ended up finding this website about it:
After running the check to see if this could be exploited on our system:
this shows the same thing as the website so we know it should be able to be exploited.
We see that the binary tar has the privelages to read anything on the file system.
We attempt the example on /etc/shadow just like in the website and then go on to do the same thing on the flag.txt file:
We then go into the /tmp/home/user1
directory and read the flag.txt
file