text
stringlengths 0
1.99k
|
|---|
[0] https://github.com/PenturaLabs/Linux_Exploit_Suggester
|
[1] https://code.google.com/p/unix-privesc-check/
|
finsupport was running the latest version of Debian with no local root exploits,
|
but unix-privesc-check returned:
|
WARNING: /etc/cron.hourly/mgmtlicensestatus is run by cron as root. The user
|
www-data can write to /etc/cron.hourly/mgmtlicensestatus
|
WARNING: /etc/cron.hourly/webalizer is run by cron as root. The user www-data
|
can write to /etc/cron.hourly/webalizer
|
so I add to /etc/cron.hourly/webalizer:
|
chown root:root /path/to/my_setuid_shell
|
chmod 04755 /path/to/my_setuid_shell
|
wait an hour, and ....nothing. Turns out that while the cron process is running
|
it doesn't seem to be actually running cron jobs. Looking in the webalizer
|
directory shows it didn't update stats the previous month. Apparently after
|
updating the timezone cron will sometimes run at the wrong time or sometimes not
|
run at all and you need to restart cron after changing the timezone. ls -l
|
/etc/localtime shows the timezone got updated June 6, the same time webalizer
|
stopped recording stats, so that's probably the issue. At any rate, the only
|
thing this server does is host the website, so I already have access to
|
everything interesting on it. Root wouldn't get much of anything new, so I move
|
on to the rest of the network.
|
--[ 6 ]-- Pivoting
|
The next step is to look around the local network of the box you hacked. This
|
is pretty much the same as the first Scanning & Exploiting step, except that
|
from behind the firewall many more interesting services will be exposed. A
|
tarball containing a statically linked copy of nmap and all its scripts that you
|
can upload and run on any box is very useful for this. The various nfs-* and
|
especially smb-* scripts nmap has will be extremely useful.
|
The only interesting thing I could get on finsupport's local network was another
|
webserver serving up a folder called 'qateam' containing their mobile malware.
|
--[ 7 ]-- Have Fun
|
Once you're in their networks, the real fun starts. Just use your imagination.
|
While I titled this a guide for wannabe whistleblowers, there's no reason to
|
limit yourself to leaking documents. My original plan was to:
|
1) Hack Gamma and obtain a copy of the FinSpy server software
|
2) Find vulnerabilities in FinSpy server.
|
3) Scan the internet for, and hack, all FinSpy C&C servers.
|
4) Identify the groups running them.
|
5) Use the C&C server to upload and run a program on all targets telling them
|
who was spying on them.
|
6) Use the C&C server to uninstall FinFisher on all targets.
|
7) Join the former C&C servers into a botnet to DDoS Gamma Group.
|
It was only after failing to fully hack Gamma and ending up with some
|
interesting documents but no copy of the FinSpy server software that I had to
|
make due with the far less lulzy backup plan of leaking their stuff while
|
mocking them on twitter.
|
Point your GPUs at FinSpy-PC+Mobile-2012-07-12-Final.zip and crack the password
|
already so I can move on to step 2!
|
--[ 8 ]-- Other Methods
|
The general method I outlined above of scan, find vulnerabilities, and exploit
|
is just one way to hack, probably better suited to those with a background in
|
programming. There's no one right way, and any method that works is as good as
|
any other. The other main ways that I'll state without going into detail are:
|
1) Exploits in web browers, java, flash, or microsoft office, combined with
|
emailing employees with a convincing message to get them to open the link or
|
attachment, or hacking a web site frequented by the employees and adding the
|
browser/java/flash exploit to that.
|
This is the method used by most of the government hacking groups, but you don't
|
need to be a government with millions to spend on 0day research or subscriptions
|
to FinSploit or VUPEN to pull it off. You can get a quality russian exploit kit
|
for a couple thousand, and rent access to one for much less. There's also
|
metasploit browser autopwn, but you'll probably have better luck with no
|
exploits and a fake flash updater prompt.
|
2) Taking advantage of the fact that people are nice, trusting, and helpful 95%
|
of the time.
|
The infosec industry invented a term to make this sound like some sort of
|
science: "Social Engineering". This is probably the way to go if you don't know
|
too much about computers, and it really is all it takes to be a successful
|
hacker [0].
|
[0] https://www.youtube.com/watch?v=DB6ywr9fngU
|
--[ 9 ]-- Resources
|
Links:
|
* https://www.pentesterlab.com/exercises/
|
* http://overthewire.org/wargames/
|
* http://www.hackthissite.org/
|
* http://smashthestack.org/
|
* http://www.win.tue.nl/~aeb/linux/hh/hh.html
|
* http://www.phrack.com/
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.