Ethical Hacking and Penetration Testing Guide


Escalating Privileges on a Linux Machine



Yüklə 22,44 Mb.
Pdf görüntüsü
səhifə149/235
tarix07.08.2023
ölçüsü22,44 Mb.
#138846
1   ...   145   146   147   148   149   150   151   152   ...   235
Ethical Hacking and Penetration Testing Guide ( PDFDrive )

241
Escalating Privileges on a Linux Machine
The methods we talked about would only work on a Windows-based operating system, so you 
must be wondering why we didn’t discuss escalating privileges on a Linux box. The reason 
is that there are specific privilege escalation exploits for a Linux-based operating system 
depending upon the kernel version that our target is using. The getsystem inside meterpreter 
is less likely to work on them. I reserved this part for the web hacking chapter, where we will 
learn about server hacking.
Maintaining Access
So now we have managed to escalate our privileges to either administrator level or SYSTEM level. 
Our next step would be to make it easier for us to access the system any time we want.
So far, we have managed to maintain stability, but we haven’t managed to establish per-
sistency. Whenever the target computer reboots, the process on which we have attached our 
meterpreter session will be closed and we would lose access. So one might ask, why not access 
the system by using the vulnerability we previously exploited? Well, yes, we can do that, but it is 
not the best approach, since over time applications get updated, patches are applied, and, hence, 
vulnerabilities are patched. What we want is an easier way to access our system, for which there 
are better approaches. Therefore we don’t want to go through all the hard work of compromising 
the target again.
We focus on two different strategies for maintaining access. They are discussed next.
Installing a Backdoor
Backdooring a system is one of the best approaches in my opinion since it’s stealthy most of the 
times. What we want to make sure with installing a backdoor is that our 
backdoor is persistent 
and 
that we are able to connect with our backdoor even when the system reboots. In order to accom-
plish this we would make changes to the registry.

Yüklə 22,44 Mb.

Dostları ilə paylaş:
1   ...   145   146   147   148   149   150   151   152   ...   235




Verilənlər bazası müəlliflik hüququ ilə müdafiə olunur ©azkurs.org 2024
rəhbərliyinə müraciət

gir | qeydiyyatdan keç
    Ana səhifə


yükləyin