<?xml version="1.0" encoding="utf-8" standalone="yes"?>
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
  <channel>
    <title>Notes on </title>
    <link>https://old.frang4.tech/tags/notes/</link>
    <description>Recent content in Notes on </description>
    <generator>Hugo</generator>
    <language>en-us</language>
    <lastBuildDate>Tue, 03 Jun 2025 03:38:50 -0300</lastBuildDate>
    <atom:link href="https://old.frang4.tech/tags/notes/index.xml" rel="self" type="application/rss+xml" />
    <item>
      <title>Attacking Common Applications - Part I</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-i/writeup/</link>
      <pubDate>Tue, 03 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-i/writeup/</guid>
      <description>&lt;p&gt;This is the part one of the Attacking Common Application&amp;rsquo;s skills assessment section.&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We are presented with a Windows host that has several services running. Among these the vulnerable one is &lt;code&gt;Tomcat 9.0.0.M1&lt;/code&gt; running on port 8080. This does not have any manager pages available, and its vulnerable to several CVEs including Ghostcat and CVE-2019-0232, the latter was the key to get into the machine, as it allowed for RCE. The problem here is that this RCE wasn’t that straight forward, first we needed to fuzz a vulnerable CGI script located in &lt;code&gt;/cgi/cmd.bat&lt;/code&gt; and the use a metasploit module that abused this vulnerability to obtain a reverse shell as &lt;code&gt;NT authority/system&lt;/code&gt;.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Attacking Common Applications - Part II</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-ii/writeup/</link>
      <pubDate>Tue, 03 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-ii/writeup/</guid>
      <description>&lt;p&gt;This is the part two of the Attacking Common Application&amp;rsquo;s skills assessment section.&lt;/p&gt;&#xA;&lt;h2 id=&#34;summary-how&#34;&gt;Summary (How?)&lt;/h2&gt;&#xA;&lt;p&gt;We began by scanning the target and identified several open ports hosting potentially interesting services. One of them was GitLab, accessible via a provided virtual host. Enumeration of the GitLab instance revealed a public repository referencing another virtual host: &lt;code&gt;monitoring&lt;/code&gt;, which resolved to a Nagios instance.&lt;/p&gt;&#xA;&lt;p&gt;Next, we created an account on GitLab and logged in. This revealed additional repositories, one of which contained hardcoded credentials for the Nagios web interface. Using these, we accessed the Nagios instance as an admin.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Attacking Common Applications - Part III</title>
      <link>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-iii/writeup/</link>
      <pubDate>Tue, 03 Jun 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/assessments/attacking-common-applications/part-iii/writeup/</guid>
      <description>&lt;p&gt;This is the part two of the Attacking Common Application&amp;rsquo;s skills assessment section.&lt;/p&gt;&#xA;&lt;h2 id=&#34;situation&#34;&gt;Situation&lt;/h2&gt;&#xA;&lt;p&gt;During our penetration test our team found a Windows host running on the network and the corresponding credentials for the Administrator. It is required that we connect to the host and find the &lt;code&gt;hardcoded password&lt;/code&gt; for the MSSQL service.&#xA;&lt;strong&gt;What is the hardcoded password for the database connection in the MultimasterAPI.dll file?&lt;/strong&gt;&lt;/p&gt;&#xA;&lt;h2 id=&#34;enumeration&#34;&gt;Enumeration&lt;/h2&gt;&#xA;&lt;p&gt;We are given the credentials &lt;code&gt;Administrator&lt;/code&gt;:&lt;code&gt;xcyj8izxNVzhf4z&lt;/code&gt; and a dynamic-linked libraty &lt;code&gt;MultimasterAPI.dll&lt;/code&gt; to analyze, so the first thing was loggin into the box and search for this file, we get 3 hits, but from the path I decide to start with the first one.&lt;/p&gt;</description>
    </item>
    <item>
      <title>Linux Privilege Escalation</title>
      <link>https://old.frang4.tech/posts/cpts/linux-privilege-escalation/</link>
      <pubDate>Wed, 07 May 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/linux-privilege-escalation/</guid>
      <description>&lt;p&gt;This post explains the process of enumerating a linux system in order to find paths to escalate privileges.&lt;/p&gt;&#xA;&lt;h2 id=&#34;overiview&#34;&gt;Overiview&lt;/h2&gt;&#xA;&lt;h3 id=&#34;automated-tools&#34;&gt;Automated tools&lt;/h3&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://github.com/rebootuser/LinEnum&#34; target=&#34;_blank&#34;&gt;LinEnum&lt;/a&gt;&lt;/li&gt;&#xA;&lt;li&gt;&lt;a href=&#34;https://github.com/carlospolop/PEASS-ng/tree/master/linPEAS&#34; target=&#34;_blank&#34;&gt;linPEAS&lt;/a&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h3 id=&#34;manual---general-things&#34;&gt;Manual - General things&lt;/h3&gt;&#xA;&lt;p&gt;These are the general things we will be enumerating in the process below&lt;/p&gt;&#xA;&lt;h4 id=&#34;os&#34;&gt;OS&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;OS Version&lt;/li&gt;&#xA;&lt;li&gt;Kernel Version&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;services&#34;&gt;Services&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Running Services: &lt;code&gt;ps aux | grep root&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;Installed Packages and Versions&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;user&#34;&gt;User&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;&lt;code&gt;whoami&lt;/code&gt;, &lt;code&gt;id&lt;/code&gt;, &lt;code&gt;hostname&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;User Home Directories&lt;/li&gt;&#xA;&lt;li&gt;Sudo Privileges: &lt;code&gt;sudo -l&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;files--directories&#34;&gt;Files &amp;amp; Directories&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Configuration files: &lt;code&gt;.conf&lt;/code&gt; &amp;amp; &lt;code&gt;.config&lt;/code&gt;&lt;/li&gt;&#xA;&lt;li&gt;Readable Shadow File&lt;/li&gt;&#xA;&lt;li&gt;Password Hashes in &lt;code&gt;/etc/passwd&lt;/code&gt; (more common on embedded devices and routers)&lt;/li&gt;&#xA;&lt;li&gt;Writeable Directories&lt;/li&gt;&#xA;&lt;li&gt;Writeable Files&lt;/li&gt;&#xA;&lt;li&gt;SETUID and SETGID Permissions&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;cron-jobs&#34;&gt;Cron Jobs&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Under: &lt;code&gt;/etc/cron*&lt;/code&gt;&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h4 id=&#34;file-systems&#34;&gt;File Systems&lt;/h4&gt;&#xA;&lt;ul&gt;&#xA;&lt;li&gt;Unmounted File System and Aditional Drivers&lt;/li&gt;&#xA;&lt;li&gt;File Systems &amp;amp; Additional Drives&lt;/li&gt;&#xA;&lt;/ul&gt;&#xA;&lt;h2 id=&#34;process-of-enumeration&#34;&gt;Process of enumeration&lt;/h2&gt;&#xA;&lt;h3 id=&#34;1-gaining-situational-awareness&#34;&gt;1. Gaining Situational Awareness&lt;/h3&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;whoami&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;id&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;hostname&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/os-release&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;echo $PATH&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;env&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;uname -a&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;lscpu&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/shells&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;lsblk    &lt;span style=&#34;color:#75715e&#34;&gt;# block devices&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;lpstat   &lt;span style=&#34;color:#75715e&#34;&gt;# printers&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/fstab&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# network information&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;route&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;arp -a&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/passwd&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/passwd | cut -f1 -d: &lt;span style=&#34;color:#75715e&#34;&gt;# usernames&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;grep &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;*&lt;/span&gt;$&lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;&lt;/span&gt; /etc/passwd&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/group&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;getent group sudo&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls /home&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# file systems&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;df -h&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# unmounted fs&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/fstab | grep -v &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;#&amp;#34;&lt;/span&gt; | column -t&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# hidden files for $USER&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type f -name &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;.*&amp;#34;&lt;/span&gt; -exec ls -l &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null | grep $USER&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# setuid files&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -perm -4000 -exec ls -ldb &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -perm -4000 -type f -exec ls -l &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# setgid files&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -uid &lt;span style=&#34;color:#ae81ff&#34;&gt;0&lt;/span&gt; -perm -6000 -type f 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# hidden directories&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type d -name &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;.*&amp;#34;&lt;/span&gt; -ls 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls /var/tmp   &lt;span style=&#34;color:#75715e&#34;&gt;# data retained 30 days&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls /tmp       &lt;span style=&#34;color:#75715e&#34;&gt;# data retained 10 days or until system reboot&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h3 id=&#34;2-linux-services--internals-enumeration&#34;&gt;2. Linux Services &amp;amp; Internals Enumeration&lt;/h3&gt;&#xA;&lt;div class=&#34;highlight&#34;&gt;&lt;pre tabindex=&#34;0&#34; style=&#34;color:#f8f8f2;background-color:#272822;-moz-tab-size:4;-o-tab-size:4;tab-size:4;&#34;&gt;&lt;code class=&#34;language-bash&#34; data-lang=&#34;bash&#34;&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ip a&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/hosts&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;lastlog &lt;span style=&#34;color:#75715e&#34;&gt;# users&amp;#39;s last login command&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;who     &lt;span style=&#34;color:#75715e&#34;&gt;# check who&amp;#39;s logged in&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;finger&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;history&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type f &lt;span style=&#34;color:#ae81ff&#34;&gt;\(&lt;/span&gt; -name *_hist -o -name *_history &lt;span style=&#34;color:#ae81ff&#34;&gt;\)&lt;/span&gt; -exec ls -l &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# finding history files&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# Cronjobs&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls -la /etc/cron.*/&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;cat /etc/crontab&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# writeable files (check for cronjob abuse)&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -path /proc -prune -o -type f -perm -o+w 2&amp;gt;/dev/null&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# proc filesystem is a virtual fs that contains info about system processes, hw, system info&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find /proc -name cmdline -exec cat &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null | tr &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34; &amp;#34;&lt;/span&gt; &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;\n&amp;#34;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;apt list --installed | tr &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;/&amp;#34;&lt;/span&gt; &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34; &amp;#34;&lt;/span&gt; | cut -d&lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34; &amp;#34;&lt;/span&gt; -f1,3 | sed &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#39;s/[0-9]://g&amp;#39;&lt;/span&gt; | tee -a installed_pkgs.list &lt;span style=&#34;color:#75715e&#34;&gt;# list of installed packages&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;sudo -V  &lt;span style=&#34;color:#75715e&#34;&gt;# sudo version&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ls -l /bin /usr/bin/ /usr/sbin/ &lt;span style=&#34;color:#75715e&#34;&gt;# list of binaries&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# compare available binaries against GTFO&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#66d9ef&#34;&gt;for&lt;/span&gt; i in &lt;span style=&#34;color:#66d9ef&#34;&gt;$(&lt;/span&gt;curl -s https://gtfobins.github.io/ | html2text | cut -d&lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34; &amp;#34;&lt;/span&gt; -f1 | sed &lt;span style=&#34;color:#960050;background-color:#1e0010&#34;&gt;&amp;#39;&lt;/span&gt;/^&lt;span style=&#34;color:#f92672&#34;&gt;[[&lt;/span&gt;:space:&lt;span style=&#34;color:#f92672&#34;&gt;]]&lt;/span&gt;*$/&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;#  analyze system calls and signal processing&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;strace ping -c1 IP&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type f &lt;span style=&#34;color:#ae81ff&#34;&gt;\(&lt;/span&gt; -name *.conf -o -name *.config &lt;span style=&#34;color:#ae81ff&#34;&gt;\)&lt;/span&gt; -exec ls -l &lt;span style=&#34;color:#f92672&#34;&gt;{}&lt;/span&gt; &lt;span style=&#34;color:#ae81ff&#34;&gt;\;&lt;/span&gt; 2&amp;gt;/dev/null &lt;span style=&#34;color:#75715e&#34;&gt;# configuration files&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# Scripts&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;find / -type f -name &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;*.sh&amp;#34;&lt;/span&gt; 2&amp;gt;/dev/null | grep -v &lt;span style=&#34;color:#e6db74&#34;&gt;&amp;#34;src\|snap\|share&amp;#34;&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;ps aux | grep root&#xA;&lt;/span&gt;&lt;/span&gt;&lt;span style=&#34;display:flex;&#34;&gt;&lt;span&gt;&lt;span style=&#34;color:#75715e&#34;&gt;# running services by user&lt;/span&gt;&#xA;&lt;/span&gt;&lt;/span&gt;&lt;/code&gt;&lt;/pre&gt;&lt;/div&gt;&lt;h3 id=&#34;3-credential-hunting&#34;&gt;3. Credential Hunting&lt;/h3&gt;&#xA;&lt;p&gt;See &lt;a href=&#34;https://old.frang4.tech/posts/cpts/linux-credential-hunting/&#34;&gt;Credential Hunting Linux&lt;/a&gt;&lt;/p&gt;</description>
    </item>
    <item>
      <title>Linux Credential Hunting</title>
      <link>https://old.frang4.tech/posts/cpts/linux-credential-hunting/</link>
      <pubDate>Tue, 06 May 2025 03:38:50 -0300</pubDate>
      <guid>https://old.frang4.tech/posts/cpts/linux-credential-hunting/</guid>
      <description>&lt;h2 id=&#34;configuration-files&#34;&gt;&lt;strong&gt;Configuration Files&lt;/strong&gt;&lt;/h2&gt;&#xA;&lt;p&gt;find all possible configuration files on the system&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;for l in $(echo &amp;quot;.conf .config .cnf&amp;quot;);do echo -e &amp;quot;\nFile extension: &amp;quot; $l; find / -name &amp;quot;*$l&amp;quot; **2**&amp;gt;/dev/null | grep -v &amp;quot;lib\|fonts\|share\|core&amp;quot; ;done&lt;/code&gt;&lt;/p&gt;&#xA;&lt;p&gt;run the scan directly for each file found with the specified file extension and output the contents. In this example, we search for three words (user, password, pass) in each file with the file extension .cnf.&lt;/p&gt;&#xA;&lt;p&gt;&lt;code&gt;for i in $(find / -name &amp;quot;*.cnf&amp;quot; **2**&amp;gt;/dev/null | grep -v &amp;quot;doc\|lib&amp;quot;);do echo -e &amp;quot;\nFile: &amp;quot; $i; grep &amp;quot;user\|password\|pass&amp;quot; $i **2**&amp;gt;/dev/null | grep -v &amp;quot;\#&amp;quot;;done&lt;/code&gt;&lt;/p&gt;</description>
    </item>
  </channel>
</rss>
