Demonstrating Session Hijacking & Linux Privilege Escalation | TryHackMe Hijack



Demonstrating Session Hijacking & Linux Privilege Escalation | TryHackMe Hijack

Demonstrating Session Hijacking & Linux Privilege Escalation | TryHackMe Hijack

In this video walk-through, we covered a boot to root machine where we started with an Nmap scan to discover several open ports and services running such as FTP server, Apache web server and NFS file share. By mounting the NFS file share to our local machine we discovered plain text credentials which got us access to the FTP server. Next we downloaded text files from FTP server, one included a note from the admin and the other included tenths of passwords. Because rate limiting is implemented on the server, we didn’t run brute force on the login form found on the web page rather we found that the PHPsession ID is computed using a combination of base64 and md5 hash that included the username and password of the logged on user. We created a python script that iterates through the password list we found earlier, calculates the md5sum of the password, encodes it with base64 to find the session ID and tries it against the administration page. This enabled us to find the correct password of the admin user along with the session ID. Next we achieved a reverse shell by chaining commands on the server status page and later on achieved privilege escalation by exploiting a misconfigured library path through sudo with the Apache process.
**********
Receive Cyber Security Field, Certifications Notes and Special Training Videos
https://www.youtube.com/channel/UCNSdU_1ehXtGclimTVckHmQ/join
******
Writeup
https://motasem-notes.net/demonstrating-session-hijacking-linux-privilege-escalation-tryhackme-hijack/
TryHackMe Hijack
https://tryhackme.com/room/hijack
********
Patreon
https://www.patreon.com/motasemhamdan?fan_landing=true
Instagram
https://www.instagram.com/dev.stuxnet/
Twitter
https://twitter.com/ManMotasem
Facebook
https://www.facebook.com/motasemhamdantty/
LinkedIn
[1]: https://www.linkedin.com/in/motasem-hamdan-7673289b/
[2]: https://www.linkedin.com/in/motasem-eldad-ha-bb42481b2/
Website
https://www.motasem-notes.net
Backup channel
https://www.youtube.com/channel/UCF2AfcPUjr7r8cYuMvyRTTQ
My Movie channel:
https://www.youtube.com/channel/UCilElKPoXEaAfMf0bgH2pzA
******