1
0
mirror of https://github.com/calebstewart/pwncat.git synced 2024-11-27 19:04:15 +01:00
pwncat/docs/source/privesc.rst

48 lines
1.8 KiB
ReStructuredText
Raw Normal View History

Automated Privilege Escalation
==============================
pwncat has the ability to locate and exploit privilege escalation vulnerabilities. The vulnerabilities
are identified through enumeration, and can be exploited through the ``escalate`` command. Internally,
pwncat has two types of escalation objects. Firstly, there are abilities. These are actions
which we are able to perform with the permissions of a different user on the target. The second type
of objects are escalations. Escalations utilize one or more abilities to achieve a session as the
targeted user.
As an example, abilities could be things such as:
* File Write
* File Read
* Binary execution
Escalations could be things such as:
* Executing a shell (the simplest option)
* Reading user private keys and ssh-ing to localhost
* Writing private keys
* Implanting a backdoor user in /etc/passwd (if file-write as root is available)
Invoking Privilege Escalation
-----------------------------
There are two ``escalate`` subcommands. In order to locate direct escalation vectors, you can use the
``list`` subcommand. This will use the enumeration framework to locate any escalations that may be
possible as the active user.
.. code-block:: bash
# List direct escalations for any user
(local) pwncat$ escalate list
# List direct escalations to the specified user
(local) pwncat$ escalate list -u root
Escalation can be triggered with the ``run`` subcommand. This command will first attempt to escalate
directly to the requested user. If no direct escalations are possible, it will try to recursively
escalate through other users based on the available direct escalations.
.. code-block:: bash
# Escalate to root
(local) pwncat$ escalate run
# Escalate to a specified user
(local) pwncat$ escalate run -u john