17.Miscellaneous-techniques
Passive Traffic Capture:
Capture Traffic
Analyze Capture with net-creds (if installed)
Analyze Capture with PCredz (if installed)
Analyze Capture with tshark (part of Wireshark)
Analyze Capture with Wireshark (GUI)
Weak NFS Privileges:
Show NFS Exports
View NFS Exports Configuration
Mount NFS Share (requires sudo)
Create SUID Binary (C Code Example)
Copy SUID Binary to NFS Mount
Set SUID Bit
Execute SUID Binary (on Target System)
Unmount NFS Share (requires sudo)
Hijacking Tmux Sessions:
Find Running tmux Processes
Check tmux Socket Permissions
Attach to tmux Session
Create a New Shared tmux Session (example)
Change the Ownership of the tmux Socket (example)
1. Passive Traffic Capture:
Concept:
Using
tcpdump
or similar tools to capture network traffic.Analyzing the captured traffic for sensitive information (credentials, hashes).
Vulnerabilities:
Cleartext protocols (HTTP, FTP, etc.).
Weak encryption.
Capture of hashes (Net-NTLMv2, Kerberos).
Tools:
tcpdump
net-creds
PCredz
Mitigation:
Use encrypted protocols (HTTPS, SSH).
Implement network segmentation.
Restrict access to
tcpdump
and similar tools.Use tools that prevent cleartext credential transmission.
2. Weak NFS Privileges:
Concept:
Exploiting misconfigurations in NFS exports.
Specifically, the
no_root_squash
option.
Vulnerabilities:
no_root_squash
allows remote root users to write files as root on the NFS server.
Exploitation:
Mount the NFS share.
Create a SUID root binary.
Execute the binary to gain root privileges.
Mitigation:
Use
root_squash
(default).Restrict NFS exports.
Properly secure the NFS server.
Commands:
showmount -e <nfs_server_ip>
cat /etc/exports
mount -t nfs <nfs_server_ip>:/<export_path> /mnt
chmod u+s <binary>
3. Hijacking Tmux Sessions:
Concept:
Exploiting weak permissions on
tmux
sessions.Attaching to a root-owned
tmux
session.
Vulnerabilities:
World-writable or group-writable
tmux
sockets.Root-owned
tmux
sessions.
Exploitation:
Identify running
tmux
processes.Check permissions on the
tmux
socket.Attach to the session.
Mitigation:
Set appropriate permissions on
tmux
sockets.Avoid running privileged
tmux
sessions.Use strong permissions on the tmux socket.
Commands:
ps aux | grep tmux
ls -la <tmux_socket>
tmux -S <tmux_socket> attach
Key Improvements and Considerations:
Clarity: The explanations are clear and concise.
Security Best Practices: The mitigations are practical and relevant.
Command Examples: The command examples are helpful.
Real-World Relevance: These techniques are commonly used in penetration testing.
NFS Security: More emphasis on the importance of NFS security best practices.
Tmux Security: More emphasis on the importance of Tmux socket permissions.
Traffic Capture: More emphasis on the importance of encrypted protocols.
Detection: More emphasis on the importance of detecting these attacks.
More tools: more tools for traffic capture could be mentioned, such as wireshark, and tshark.
NFS Version: Mention the security differences between NFS version 3 and 4.
Last updated