module "implant.pam" error
See original GitHub issueBug Description
when i execute the module "implant.pam him returns an error
pwncat version
$ pwncat-cs --version
0.5.4
Target System (aka “victim”)
the targets are the machine “admirertoo” in hackthebox and my own machine, in both i have the same error
my machine specifications
$ uname -a
Linux kali2 5.8.0-kali2-amd64 #1 SMP Debian 5.8.10-1kali1 (2020-09-22) x86_64 GNU/Linux
Steps to Reproduce
Steps to reproduce the behavior:
- after getting a root shell, execute:
run implant.pam password=s3cr3ts
- Get the error:
Expected Behavior
The execution of the module without error.
Screenshots
These screenshots are a continuation of the error commented on in topic 2 of “steps to reproduce”.
Issue Analytics
- State:
- Created 2 years ago
- Comments:7 (3 by maintainers)
Top Results From Across the Web
Issues · calebstewart/pwncat - GitHub
'authorized_keys' implant should check perms on the .ssh dir (and maybe chmod them) enhancement New feature or request. #260 opened on Jun 29...
Read more >3Shape Study Group | Can someone help with this error | Facebook
Pam Rehm. It's a 2020 glitch, when you finish and close out it doesn't ... I heard something about this being a new...
Read more >SiRFIDaL - Simple RFID authentication for Linux
But of course it means rewriting the PAM module and changing the ... the user is to set their implant UID to unlock...
Read more >Authentication token manipulation error - Softpanorama
Try to simplify PAM excluding modules one by one. pam_securid.so is known to cause this error is you put it in a wrong...
Read more >Hundreds May Need to Undergo Surgery to Have Faulty ...
These findings are alarming when compared to the expected failure rate for cochlear implants which is less than one percent.
Read more >Top Related Medium Post
No results found
Top Related StackOverflow Question
No results found
Troubleshoot Live Code
Lightrun enables developers to add logs, metrics and snapshots to live code - no restarts or redeploys required.
Start FreeTop Related Reddit Thread
No results found
Top Related Hackernoon Post
No results found
Top Related Tweet
No results found
Top Related Dev.to Post
No results found
Top Related Hashnode Post
No results found
Top GitHub Comments
sorry @calebstewart , probably i expressed of a manner in that i left some things out
the
/snap
shows because i retired thegrep
of the commandfind
to see if him returns something, when i did this, the/snap
has been shownthen, i understand that the
session.platform.run
is running In a way that the commandfind
don’t returns the/usr/lib/x86_64-linux-gnu/security
only the/snap/core18/2284/lib/x86_64-linux-gnu/security
what i go say now probably is wrong, because i don’t understand ed the functionality behind the code…
i guess that the problem is in how the
session.platform.run
thefind
command. because how i showed in the last commentary, when i execute the module (that execute the find withsession.platform.run
) he only returns the/snap/
, when i change to shell in pwncat the and execute thefind
in shell, the/usr/lib/x86_64-linux-gnu/security is showed
Sorry, I merged the PR, which auto-closed this issue. 👀
I’ll see if I can get this replicated on my end. For the record, the exit code you would get from that shell command would be the exit code from
grep
notfind
, but it should still be valid. I’m not sure why it’s failing. It’s even more odd that @sierghart 's output shows a/snap/
entry whengrep
should have filtered that out. Very weird.