Home Sar Easy box on Offensive Security Proving Grounds - OSCP Preparation.
Post
Cancel

Sar Easy box on Offensive Security Proving Grounds - OSCP Preparation.

Hello,

We are going to exploit one of OffSec Proving Grounds easy machines which called Sar and this post is not a fully detailed walkthrough, I will just go through the important points during the exploit process.

Enumeration:

  • Nmap: nmap

  • Getting Shell:

The port 80 is running sar2HTML application: shell

Privilege Escalation:

  • Running LinEnum: linenum

  • Exploiting cronjob and getting root on the box: cron

  • Reverse Shell:

I used this script to generate Reverse Shell and running a netcat listener: root

Happy Hacking!

This post is licensed under CC BY 4.0 by the author.

Potato Easy box on Offensive Security Proving Grounds - OSCP Preparation.

BTRSys2.1 Medium box on Offensive Security Proving Grounds - OSCP Preparation.

Comments powered by Disqus.