How To Become e Incident Responder
How To Become e Incident Responder
URL https://www.attackdefense.com/challengedetails?cid=75
Important Note: This document illustrates all the important steps required to complete this lab.
This is by no means a comprehensive step-by-step solution for this exercise. This is only
provided as a reference to various commands needed to complete this exercise and for your
further research on this topic.
As mentioned in the challenge statement, the permissions of some files are not set properly
which can lead to problems. Search for such files and start from looking for world writable files.
A world writable file is the one for which every user has write permission/access.
Step 1: The following command will look for files (and not symlinks etc) which is world writable.
Commands:
ls -l /etc/shadow
cat /etc/shadow
Step 3: Observe that root password is not set. By adding a known password in shadow file, one
can escalate to root. Use openssl to generate a password entry.
Step 4: Copy the generate entry and add it to root record in /etc/shadow
Command: su
Commands:
cd /root
ls -l
cat flag
Flag: e62ab67ddff744d60cbb6232feaefc4d