Weak File Permission - /etc/shadow Readable and Writable

The /etc/shadow file plays a critical role in system security as it contains user password hashes, which are essential for verifying user credentials during login. Due to its sensitive nature, the /etc/shadow file is typically configured to be readable only by the root user.

#Exploit Only Limited to /etc/shadow Readable

However, in our target machine, the /etc/shadow file misconfigured to be readable by all users in the system.

ls -la /etc/shadow            #to view the permission of /etc/shadow
cat /etc/shadow          #to view the shadow file

After obtaining the hash value of the root user using the ‘cat’ command, we need to copy that hash and paste it into a new file. I named this file ‘hash.txt’ and then utilized the ‘John the Ripper’ (John) password cracking tool to crack the password and obtain the plaintext password.

john --format=sha512crypt --wordlist=/usr/share/wordlists/rockyou.txt hash.txt

After obtaining the plaintext password, we can use the ‘su’ (switch user) Linux command to switch to the root user.

su root                         #login with cracked password 'password123'
whoami;id;pwd

#Exploit Only Limited to /etc/shadow Writable

We need to identify whether /etc/shadow is writable by all users by using the command ‘ls -la /etc/shadow’.

ls -la /etc/shadow

If writable permissions are enabled for all users, we need to generate a new password hash value using the ‘mkpasswd’ utility with the SHA-512 algorithm, as Linux passwords are stored in /etc/shadow using SHA-512 encryption.

mkpasswd -m sha-512 sekkio123

Next, we need to overwrite the custom-generated password hash value into the root user’s password field in `/etc/shadow`.

nano /etc/shadow

Once overwrite the custom-generate password into the /etc/shadow file, we can use the ‘su’ (switch user) Linux command to switch to the root user.

su root                           #login with custom password 'sekkio123'
whoami;id;pwd

㊙️Follow us on our below official handles for future updates:

sekkio_LinkedIn, sekkio_X, sekkio_Insta, sekkio_Medium, sekkio_Gitbook

Last updated