WSL

The tweet that started it all https://x.com/Warlockobama/status/1067890915753132032?mx=2

Look inside of the directory, the full path usually looks like this

C:\Users\%USERNAME%\AppData\Local\Packages\CanonicalGroupLimited.UbuntuonWindows_79rhkp1fndgsc\LocalState\rootfs\

usually its somewhere there if its not then look here in this folder and look for anything that starts with CanonicalGroupLimited

C:\Users\%USERNAME%\AppData\Local\Packages

Now because we are root in the WSL, we need to remember that all we need to do is basically just look for credentials. go password hunting, so I did in the .bash_history

another alternative is Getting a python shell inside of it.

With root privileges Windows Subsystem for Linux (WSL) allows users to create a bind shell on any port (no elevation needed). Don't know the root password? No problem just set the default user to root W/ .exe --default-user root. Now start your bind shell or reverse.

wsl whoami./ubuntun1604.exe config --default-user rootwsl whoamiwsl python -c 'BIND_OR_REVERSE_SHELL_PYTHON_CODE'

Binary bash.exe can also be found in C:\Windows\WinSxS\amd64_microsoft-windows-lxssbash_[...]\bash.exe

Last updated