Paranoid

  1. What account was compromised? (2 points)

btlo

  1. What attack type was used to gain initial access? (2 points)

brute force

  1. What is the attacker's IP address? (2 points)

192.168.4.155

  1. What tool was used to perform system enumeration? (2 points)

linpeas

  1. What is the name of the binary and pid used to gain root? (3 points)

evil, 829992

  1. What CVE was exploited to gain root access? (Do your research!) (3 points)

CVE-2021-3156

The following line gave me the crucial information I needed to track down the exploit:

type=EXECVE msg=audit(1633393630.049:481001): argc=20 a0="/usr/lib/gcc/x86_64-linux-gnu/9/cc1" a1="-quiet" a2="-imultiarch" a3="x86_64-linux-gnu" a4="hax.c" a5="-quiet" a6="-dumpbase" a7="hax.c" a8="-mtune=generic" a9="-march=x86-64" a10="-auxbase" a11="hax" a12="-fasynchronous-unwind-tables" a13="-fstack-protector-strong" a14="-Wformat" a15="-Wformat-security" a16="-fstack-clash-protection" a17="-fcf-protection" a18="-o" a19="/tmp/ccXFk5Iz.s"

Searching up "hax.c" led me to the actual file, which was actually created by a guy I've ran across a few times on Twitter for making a super neat Pwn2Own enter for a printer display.

  1. What type of vulnerability is this? (3 points)

heap-based buffer overflow

  1. What file was exfiltrated once root was gained? (3 points)

/etc/shadow


Tags

  1. medium (Private)
  2. 20 points (Private)
  3. log files (Private)