Hello,
We are going to exploit one of OffSec Proving Grounds easy machines which called Sar
and this post is not a fully detailed walkthrough, I will just go through the important points during the exploit process.
Enumeration:
Nmap:
Getting Shell:
The port 80
is running sar2HTML
application:
Privilege Escalation:
Running LinEnum:
Exploiting cronjob and getting root on the box:
Reverse Shell:
I used this script to generate Reverse Shell and running a netcat listener:
Happy Hacking!
Comments powered by Disqus.