Cron Jobs Gone Wild (ine)

In this lab, we have compromised a machine but we only have access as the low privileged user called student. This means that if we try to enumerate cronjobs using techniques such as looking at the crontable, we will not see those which have been scheduled to run as root. We therefore need to enumerate the cronjobs in different ways. One way is to use the pspy tool. This shows running processes including cronjobs scheduled by root. Another way is to enumerate the box looking for interesting files and tar archives. We want to look for files which we can write to just in case they are being used by a cronjob and we can amend them. The command to use is: find / -path /proc -prune o -type f -perm -o+w 2>/dev/null We want to look into interesting tar archives as they might be backing up directories via a cronjob using the * wildcard. This can be exploited to elevate our privileges. In order to unarchive and unzip a tar.gz file, we can use: tar -zxvf monitor.tar.gz Whilst enumeratin...