O
O
OSCP Notes
Search…
⌃K
Introduction
Port scanning
Passive Information Gathering
Ports enum:
Recon Tools
Tech Skills Needed
msfvenom
meterpreter commands
Web Apps
python scripts
Windows hacks
Port Forwarding
Reverse shells
Binary exploitation
Transfering Modules
Buffer Overflow
Cracking!
shellshock
Active Directory
Antivirus Evasion
Windows Priv Esc
Linux Priv Esc
Active Directory Case Studies
Pivoting
C program analysis
Misc
Steg
Memory Dump
Oracle exploitation:
Notes
default credentials
New Empire!
Scripts I built
Got creds? do this
How to add path variables
Good Passwords & Username file locations on kali
fcrackzip (crack common zip pass)
Extracting file from the target and analyze it with ltrace
Hack the box Write-ups
THM Offensive Security Path
Proving Ground
Cyber Sec Labs
Powered By GitBook

Extracting file from the target and analyze it with ltrace

Now let's transfer the file over to kali and analyze it.
  1. 1.
    base64 -w0 /usr/bin/viewuser this will encode the file into base64. -w0 eliminates line wrapping.
  2. 2.
    base64 textfile.txt --decode
  3. 3.
    use "ltrace" to analyze it.
​executing /tmp/listusersif we replace this file with a shell, we can get a root.replaced the content with ​👍
#!/bin/bash
/bin/bash
​
​
​ran the viewuser app
Previous
fcrackzip (crack common zip pass)
Next
Hack the box Write-ups
Last modified 8mo ago
Copy link