mirror of
https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite.git
synced 2025-12-16 13:29:00 +00:00
Compare commits
8 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
a5ca003383 | ||
|
|
502e561445 | ||
|
|
98e2318838 | ||
|
|
27bc0ba5cc | ||
|
|
2f7d8ea583 | ||
|
|
f1f321be44 | ||
|
|
dec10cded1 | ||
|
|
5fa0e76b69 |
@@ -32,7 +32,7 @@ fi
|
|||||||
|
|
||||||
#-- SY) CVE-2021-3560
|
#-- SY) CVE-2021-3560
|
||||||
polkitVersion=$(systemctl status polkit.service 2>/dev/null | grep version | cut -d " " -f 9)
|
polkitVersion=$(systemctl status polkit.service 2>/dev/null | grep version | cut -d " " -f 9)
|
||||||
if [ "$(apt list --installed 2>/dev/null | grep polkit | grep -c 0.105-26)" -ge 1 ] || [ "$(yum list installed 2>/dev/null | grep polkit | grep -c 0.117-2)" ]; then
|
if [ "$(apt list --installed 2>/dev/null | grep polkit | grep -c 0.105-26)" -ge 1 ] || [ "$(yum list installed 2>/dev/null | grep polkit | grep -c 0.117-2)" -ge 1 ]; then
|
||||||
echo "Vulnerable to CVE-2021-3560" | sed -${E} "s,.*,${SED_RED_YELLOW},"
|
echo "Vulnerable to CVE-2021-3560" | sed -${E} "s,.*,${SED_RED_YELLOW},"
|
||||||
echo ""
|
echo ""
|
||||||
fi
|
fi
|
||||||
|
|||||||
@@ -142,7 +142,7 @@ checkProcSysBreakouts(){
|
|||||||
|
|
||||||
mkdir /tmp/cgroup_3628d4
|
mkdir /tmp/cgroup_3628d4
|
||||||
mount -t cgroup -o memory cgroup /tmp/cgroup_3628d4 2>/dev/null
|
mount -t cgroup -o memory cgroup /tmp/cgroup_3628d4 2>/dev/null
|
||||||
if [ $? -eq 0 ]; then release_agent_breakout12="Yes"; else release_agent_breakout2="No"; fi
|
if [ $? -eq 0 ]; then release_agent_breakout2="Yes"; else release_agent_breakout2="No"; fi
|
||||||
rm -rf /tmp/cgroup_3628d4 2>/dev/null
|
rm -rf /tmp/cgroup_3628d4 2>/dev/null
|
||||||
|
|
||||||
core_pattern_breakout="$( (echo -n '' > /proc/sys/kernel/core_pattern && echo Yes) 2>/dev/null || echo No)"
|
core_pattern_breakout="$( (echo -n '' > /proc/sys/kernel/core_pattern && echo Yes) 2>/dev/null || echo No)"
|
||||||
|
|||||||
@@ -826,8 +826,8 @@ tcp_recon (){
|
|||||||
for port in $PORTS; do
|
for port in $PORTS; do
|
||||||
for j in $(seq 1 254)
|
for j in $(seq 1 254)
|
||||||
do
|
do
|
||||||
if [ "$FOUND_BASH" ]; then
|
if [ "$FOUND_BASH" ] && [ "$$TIMEOUT" ]; then
|
||||||
$FOUND_BASH -c "(echo </dev/tcp/$IP3.$j/$port) 2>/dev/null && echo -e \"\n[+] Open port at: $IP3.$j:$port\"" &
|
$TIMEOUT 5 $FOUND_BASH -c "(echo </dev/tcp/$IP3.$j/$port) 2>/dev/null && echo -e \"\n[+] Open port at: $IP3.$j:$port\"" &
|
||||||
elif [ "$NC_SCAN" ]; then
|
elif [ "$NC_SCAN" ]; then
|
||||||
($NC_SCAN "$IP3"."$j" "$port" 2>&1 | grep -iv "Connection refused\|No route\|Version\|bytes\| out" | sed -${E} "s,[0-9\.],${SED_RED},g") &
|
($NC_SCAN "$IP3"."$j" "$port" 2>&1 | grep -iv "Connection refused\|No route\|Version\|bytes\| out" | sed -${E} "s,[0-9\.],${SED_RED},g") &
|
||||||
fi
|
fi
|
||||||
|
|||||||
@@ -598,7 +598,7 @@ namespace winPEAS.Checks
|
|||||||
if (Checks.CurrentAdDomainName.Length > 0)
|
if (Checks.CurrentAdDomainName.Length > 0)
|
||||||
{
|
{
|
||||||
Beaprint.BadPrint(" The system is inside a domain (" + Checks.CurrentAdDomainName + ") so it could be vulnerable.");
|
Beaprint.BadPrint(" The system is inside a domain (" + Checks.CurrentAdDomainName + ") so it could be vulnerable.");
|
||||||
Beaprint.InfoPrint("You can try https://github.com/DecOne/KrbRelayUp to escalate privileges");
|
Beaprint.InfoPrint("You can try https://github.com/Dec0ne/KrbRelayUp to escalate privileges");
|
||||||
}
|
}
|
||||||
else
|
else
|
||||||
{
|
{
|
||||||
|
|||||||
Reference in New Issue
Block a user