Gain access to any Linux system with this exploit

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
there is a new exploit for linux a lot of exploits been happening as linux has become a bit more popular and well it's pretty interesting to see some of these instead of showing you some articles saying this is the exploit i like to pull up an old linux instance show you the exploit in action update that instance and see if the exploit is still happening this specific exploit is basically to where you can elevate your user to root and delete the whole system if you want it so like let's say i wanted to delete the root folder you know like this and just do like a recursive force it's going to say permission denied because well i don't have permissions to remove the root folder because i'm not root however we can elevate this i'm using centos 7 for this because it was a pretty big in production you should obviously not be using centos anymore use go to like alma or rocky linux if you're using a rail-based system but also update your system i've already tried this exploit in the latest version of arch and also the latest version of ubuntu and both basically failed which is good but i want to show you a success story so we're using an older version of linux we're going to first just do a wget and grab our script to basically hack into linux and we're going to do this with hacks.in files and then i think it was blasty versus p k p exec dot c now this is a a c file and i'm just gonna cap that just to make sure i got the right one oh it actually did not grab it because of the certificate all right now let's cat blasty and you'll see this is just a c program so let's compile this we'll use gcc so far the only two dependencies we have are pretty much on every linux system out there uh most linux systems have uh pk exec which is what we're gonna exploit uh they have wget to grab stuff from the internet and they have gcc to compile c programs so we're going to do gcc blast dc dash o for output and then we'll just call this make me root and then if we do it all listing you'll see make me root and we'll just run that oh boy oh boy look at that we are now root in our little user home but let's try and go to the root directory can we do stuff let's uh just make a file blow up system ls oh boy so we just elevated without any pseudo without anything into the root user and from that root prompt we can just have fun with this system now mind you this is a local elevation exploit meaning you have to be logged into the system so it's not as bad as like a lot of windows executables or exploits where people will do remote execution which is extremely vulnerable that's why a lot of windows stuff is as a hacker it would be much more appealing to go after windows systems because i haven't really seen too many remote executables actually i don't know if i've ever seen one in a linux system so uh that just a quick explanation so let's uh let's change this let's update our system we're gonna go ahead and exit this we'll clear it out and we're just going to do a pseudo yum update and we'll do that with a yes and what this is going to do is it's going to grab the latest version of everything update the centos 7 system and let's just see if this is any better than what it is now all right it looks like we finally got our system update it took a couple minutes and we're just gonna do a reboot and uh see what happens on our reboot looks like we got a new kernel um some new firmware more up-to-date packages uh so let's install that we're in the hacker um and let's take a look here first let's just try and do make me root see what happens ah look at that cool so it did patch that uh if we do pk exec i think that was an older version of pk exec and if we do dash dash version yeah this is 0.112 i know on arch it's a little bit different so obviously patcher systems is what this is telling me uh and let's let's change this up a little bit more and from here let's go ahead and i want to just show you my system here and we can do the same thing i actually think i've already downloaded uh make me root and did all that let's just remove that and i'll just grab that blasty do a gcc blasty c output that to root and let's just say root and yeah does the same thing um and it will just deny you that in the pk exec on this one dash dash version you'll see is a 1.120 which is a little bit different from our centos version but it's good to see this actually patched and i've actually uh run this a couple times with different scenarios i did a blanket ubuntu server install just to see what would happen and ubuntu server now basically bakes in security patches directly into their installer and you can't even cancel the updates to it because i tried to install it on ubuntu and it just wouldn't let me do it in a native form now obviously if i had an old version of ubuntu already spun up that was offline or not getting updates i could still run this exploit and do it but it's just nice to see that the linux community is always so far ahead of this and i think at one time i bashed a security researcher and for that i apologize but it's really nice to see these security researchers putting this stuff out here so we can try it but it also tells you how important updates are because you can actually take this stuff from these security researchers try it out on your system and then you can see the vulnerability yourself you don't have to take your advice from some internet personality on youtube you can actually try it and then figure it out yourself so this is kind of a cool little exploit uh definitely try it on some systems make sure you're patched run your updates as you probably hear so often but this is why you run your updates as you can see but from my example but with all that said let me know your thoughts down in the comments section and i'll see you in the next one
Info
Channel: Chris Titus Tech
Views: 55,869
Rating: undefined out of 5
Keywords: chris titus tech, Gain access to any Linux system with this exploit, ethical hacking, hacking, kali linux, hacker, metasploit, penetration testing, cracker, cracking, kali, ethical hacker, penetration tester, owasp, linux, how to, how to hack, hacking tutorial, hackers, kali linux tutorial, cybersecurity, hydra, password hacking, tutorial, rat, remote access tool, netcat, ncat, network chuck, networkchuck, hak5, reverse shell, reverse powershell, how to hack system, ubuntu hacking, hack linux
Id: N_KI1_TXpk4
Channel Id: undefined
Length: 6min 57sec (417 seconds)
Published: Sat Jan 29 2022
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.