This article provides a detailed runbook for enumerating and exploiting Linux machines during OSCP preparation. The author emphasizes the importance of thorough enumeration, stating that "getting through the OSCP is all about becoming good at enumeration."
The runbook covers the following key steps:
Shell Stabilization and Backup Shell: The author recommends stabilizing the initial shell and immediately obtaining a backup shell to ensure a stable workflow.
System Information Gathering: The author suggests running commands like whoami
, ifconfig
, hostname
, sudo -l
, sudo --version
, cat /etc/issue
, uname -r
, and arch
to gather crucial information about the target system.
Directory and File Analysis: The author recommends exploring directories like /opt
, /var/mail
, and /home
to search for configuration files, user information, and potential clues for privilege escalation.
Searching with find
: The author provides several find
commands to locate writable directories, files with specific extensions, and files with the SUID bit set, which may lead to privilege escalation opportunities.
Automated Tooling: The author highlights the use of LinPeas and pspy to automate the enumeration process and monitor running processes, respectively.
The article emphasizes the importance of developing a personalized runbook and the need for consistent practice to succeed in the OSCP exam. The author also provides a link to their GitHub repository, where readers can access their unorganized notes from OSCP and other red-teaming exercises.
To Another Language
from source content
medium.com
Key Insights Distilled From
by Security Guy at medium.com 04-27-2024
https://medium.com/@Fanicia/oscp-prep-introducing-my-runbooks-rce-on-linux-44099b36aa34Deeper Inquiries