Kernel Exploit
Level: Easy
Challenge: Kernel Exploit
Q1: What is the name of the key file the intruder downloaded to elevate their privileges after gaining unauthorized access?

Upon inspecting the /tmp
directory, we discovered a suspicious file named exploit
. Upon analyzing it using VirusTotal, it was confirmed to be a malicious executable file.

Q2: When was the file used for privilege escalation first submitted on Virus Total?

By reviewing the History section on VirusTotal, we identified the first submission date of this file.
Q3: What is the Process ID (PID) of the operation launched by the attacker?

Using the Keyword Search, I found an interesting file named lsof_-nPl.txt
, which corresponds to a Linux command. Upon opening it, we can see a list of files currently opened by Linux processes.

Q4: What username was the malicious process running under?


By examining the running_processes_full_paths.txt
file, we can identify the username associated with the execution of this file.
Q5: What is the Parent Process ID (PPID) associated with the malicious process?

By examining the pstree_-p_-n.txt
file, we can identify the PID of the exploit
file and the PPID of its parent process.
Q6: What are the operating system and its version on the compromised server?


By reviewing the lsb-release
file, we can determine the operating system and its version. However, there seems to be a discrepancy because the release version in the uname
output differs. This mismatch likely indicates that the kernel version reported by uname
hasn't been updated to align with the OS version shown in lsb-release.

Q7 : What is the kernel version of the compromised system?


Another file worth checking is hostnamectl.txt
. This file contains information about the operating system and the kernel version.
Q8: What is the most recent CVE number associated with the vulnerabilities exploited in this attack?

By reviewing the Community section on VirusTotal, we can find reports and discussions, including references to CVEs related to the vulnerabilities exploited by this file.
Last updated
Was this helpful?