ctfnote
search
Ctrlk
  • /home/ret2basic.eth
  • Web3 Security Research
    • πŸ‘‘Web3 Security Research Trivia
    • DeFichevron-right
    • πŸ‘‘Secureumchevron-right
    • βœ…Soliditychevron-right
    • βœ…Foundrychevron-right
    • EVMchevron-right
    • Vulnerabilitieschevron-right
  • Game Hacking
    • βœ…C++
    • Ghidra
    • Cheat Engine
    • Proxy
    • DLL injection
    • Keygen
    • Aimbot
  • Red Teaming
    • βœ…Enumerationchevron-right
    • βœ…Exploitationchevron-right
    • βœ…Buffer Overflowchevron-right
    • βœ…Privilege Escalationchevron-right
      • Linux Privilege Escalationchevron-right
        • Linux Permissions
        • Manual Enumeration
        • Automated Tools
        • Kernel Exploits
        • Passwords and File Permissions
        • SSH Keys
        • Sudo
        • SUID
        • Capabilities
        • Cron Jobs
        • NFS Root Squashing
        • Docker
        • GNU C Library
        • Exim
        • Linux Privilege Escalation Course Capstone
      • Windows Privilege Escalationchevron-right
    • βœ…Post Exploitationchevron-right
    • βœ…Pivotingchevron-right
    • Active Directory (AD)chevron-right
    • Command & Control (C2)chevron-right
    • Malware Developmentchevron-right
  • Cryptography
    • Hash Functions
    • MAC
    • AESchevron-right
    • Diffie-Hellman
    • RSAchevron-right
    • ECC
    • Digital Signature
    • JWT
    • PRNG
    • SSL/TLS
    • Researchchevron-right
  • Computer Science
    • Linuxchevron-right
    • Pythonchevron-right
    • HTML, CSS, JavaScript, and Reactchevron-right
    • Data Structures and Algorithmschevron-right
    • The Linux Programming Interfacechevron-right
    • Computer Systemschevron-right
    • Databaseschevron-right
    • Distributed Systemschevron-right
    • Static Analysischevron-right
  • Web
    • βœ…Prerequisiteschevron-right
    • File Uploadchevron-right
    • SQL Injection (SQLi)chevron-right
    • Cross-Site Scripting (XSS)chevron-right
    • CSRF and SSRFchevron-right
    • XML External Entities (XXE)
    • Insecure Deserializationchevron-right
    • HTTP Request Smuggling
    • OS Command Injectionchevron-right
    • βœ…Directory Traversal
    • HTTP Parameter Pollution
    • Server-Side Template Injection (SSTI)
    • LDAP Injection
    • Redischevron-right
  • Pwn
    • Linux Exploitationchevron-right
    • Windows Exploitationchevron-right
    • Fuzzingchevron-right
  • Reverse
    • Bytecodechevron-right
    • πŸ‘‘Z3 solver
    • angrchevron-right
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Red Teamingchevron-right
  2. βœ…Privilege Escalationchevron-right
  3. Linux Privilege Escalation

Automated Tools

LinPEAS!

hashtag
My Hack The Box Pwnbox Setup Script

This user_init script sets up all the automated tools needed for Linux privilege escalation tasks:

LogoGitHub - ret2basic/Hack-The-Box-Pwnbox-Setup: Hack The Box Pwnbox setup scriptGitHubchevron-right
Hack The Box Pwnbox Setup

hashtag
LinPEAS

LogoPEASS-ng/linPEAS at master Β· peass-ng/PEASS-ngGitHubchevron-right
LinPEAS

Output to file:

Read with colors:

hashtag
LinEnum

LogoGitHub - rebootuser/LinEnum: Scripted Local Linux Enumeration & Privilege Escalation ChecksGitHubchevron-right
LinEnum

hashtag
Linux Exploit Suggester

LogoGitHub - The-Z-Labs/linux-exploit-suggester: Linux privilege escalation auditing toolGitHubchevron-right
Linux Exploit Suggester

hashtag
Linux Priv Checker

LogoGitHub - sleventyeleven/linuxprivchecker: linuxprivchecker.py -- a Linux Privilege Escalation Check ScriptGitHubchevron-right
Linux Priv Checker
PreviousManual Enumerationchevron-leftNextKernel Exploitschevron-right

Last updated 3 years ago

Was this helpful?

  • My Hack The Box Pwnbox Setup Script
  • LinPEAS
  • LinEnum
  • Linux Exploit Suggester
  • Linux Priv Checker

Was this helpful?

/tmp/linpeas.sh -a > /dev/shm/linpeas.txt
less -r /dev/shm/linpeas.txt