Penetration Testing 13
OSCP Machine
Setup the VM
Just double-click the oscp.ova file
Run an arp-scan to reveal the IP of the target machine.
Found us a secret.txt file in that nmap scan with some Base64 encoded fun.
Decode the Base64 for the Private Key
Get the linPEAS script over to the target.
https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS
-p Turned on whenever the real and effective user ids do not match.
Disables processing of the $ENV file and importing of shell functions.
Looks like bash has misconfigured permissions.
sudo sh -c ‘cp $(which bash) .; chmod +s ./bash’