Paranoid
Hi :))
Before jumping in, look at the tag and file of the article
Audit.log
file, go to google search, there is a tool for it
yeh, there is an auditd tool lol XD
1
2
sudo apt-get update
sudo apt-get -y install auditd
Remember to log in to root, comrades -..-
After downloading, there are many tools, it’s not convenient to explain here hehe
After reading the instructions, to get an overview, use the command line below
-if,--input <Input File name>
: use this file as input
--summary
: sorted totals for main object in report
1
2
aureport --summary -if audit.log
okee, swim to solve this challenge
What account was compromised? (2 points)
To know which account is compromised, look at the authentication report
-au,--auth
: Authentication report
1
2
aureport -au -if audit.log
According to the report, left to right will be date, time, acct, host, term, path, success, event
Wow maybe that’s it, i’m a newbie (.-.) , sorry if it’s wrong hehe
btlo
What attack type was used to gain initial access? (2 points)
From the picture I took above, it could only be a brute force attack =)) returning too many events in 1 second
brute force
What is the attacker’s IP address? (2 points)
I listed it above as the host column
192.168.4.155
What tool was used to perform system enumeration? (2 points)
If the hacker already has permission, then see what he typed on the console
--tty
: Report about tty keystrokes
1
2
aureport --tty -if audit.log
From the image , the hacker wget
the command file linpeas.sh
from his machine with port 8000
After researching on Google, LinPeas
is a command file that searches for paths to elevate privileges on Linux/Unix*/MacOS hosts.
1
2
lsb_release -a
The command lsb_release -a is used to display version information and description of a Linux distribution based on the LSB (Linux Standard Base) standard.
Then he wget
file evil.tar.gz
from his computer, the attacker executed the command make
… wait pause here, what is the make
command used for
There is a document for you to clearly understand the make command
But to put it simply, it will use information from the description file, which the program creator has completed, which helps eliminate repetition and speed up compilation as well as save time.
then he executed ./evil
with argument 0
, I don’t really understand here @~@, and then he erased his tracks and escaped
What is the name of the binary and pid used to gain root? (3 points)
After analyzing above, we know that there is a command file that was executed as evil
, ok so let’s list the ids of the executing processes.
-p,--pid
: Pid report
I forgot, there will be a lot of them and not very related to what we are looking for, let’s filter them with
grep 'evil'
1
2
aureport -p -if audit.log | grep 'evil'
From left to right we have date, pid, path, UID, GID, event ID
evil, 829992
What CVE was exploited to gain root access? (Do your research!) (3 points)
hehe too easy
CVE-2021-3560
boom!, wrong right =))) I also thought it would be easy to eat kkk
keep searching
try it and see if it’s right
CVE-2021-3156
ohhhhhhhhhhhhhhh~ that’s righttttttt
Here is it CVE-2021-3156
What type of vulnerability is this? (3 points)
right ~
Heap-Based Buffer Overflow
What file was exfiltrated once root was gained? (3 points)
I’ve been confused about this all morning :))
And after looking back, I realized I missed it :_)
/etc/shadow
ok okay I’m tired TT
goodbye, thank you for reading until now //~//