Privilege Escalation: Vulnerability Probe. (Linux system)

Escalation of Privilege: Vulnerability Probes.

Privilege escalation is referred to as privilege escalation . Since the operating system is a multi-user operating system , users have permission control . For example, the permissions obtained through Web vulnerabilities are Web process permissions. Often, Web services are started with an account with very low permissions. Therefore, some operations through the Webshell will be restricted, which requires it to be elevated to administrative or even System privileges. Privileges are usually escalated through operating system vulnerabilities or misconfigurations of the operating system, or through third-party software services, such as database or FTP software vulnerabilities.


Table of contents:

Escalation of Privilege: Vulnerability Probes.

Use the linux-exploit-suggester-master tool:

Step 1: Download the tool, then upload the tool to the tmp directory.

Step 2: Switch to the tmp directory, and then execute the linux-exploit-suggester.sh file.

Step 3: In the tmp directory, open the bgxg.txt file.

 Use the linux-exploit-suggester2 tool:

Step 1: Download the tool, then upload the tool to the tmp directory.

Step 2: Switch to the tmp directory, and then execute the linux-exploit-suggester-2.pl file.

Step 3: In the tmp directory, open the bgxg.txt file.


Disclaimer:

It is strictly forbidden to use the technology mentioned in this article to carry out illegal attacks, otherwise the consequences will be at your own risk, and the uploader will not bear any responsibility.


Use the linux-exploit-suggester-master tool:

Step 1: Download the tool, then upload the tool to the tmp directory.

下载 linux-exploit-suggester-master 工具:GitHub - The-Z-Labs/linux-exploit-suggester: Linux privilege escalation auditing tool


Step 2: Switch to the tmp directory, and then execute the linux-exploit-suggester.sh file.

cd /tmp                        //切换 tmp 目录.
 
chmod +x linux-exploit-suggester.sh       //复制一个可执行权限.
 
./linux-exploit-suggester.sh > bgxg.txt   //执行文件,把文件保存在bgxg.txt文件中


Step 3: In the tmp directory, open the bgxg.txt file.


Use the linux-exploit-suggester2 tool:

Step 1: Download the tool, then upload the tool to the tmp directory.

Download  the linux-exploit-suggester2  tool: GitHub - jondonas/linux-exploit-suggester-2: Next-Generation Linux Kernel Exploit Suggester


Step 2: Switch to the tmp directory, and then execute the linux-exploit-suggester-2.pl file.

cd /tmp                        //切换 tmp 目录.
 
chmod +x linux-exploit-suggester-2.pl       //复制一个可执行权限.
 
./linux-exploit-suggester-2.pl > bgxg.txt   //执行文件,把文件保存在bgxg.txt文件中


Step 3: In the tmp directory, open the bgxg.txt file.

      

       

    

Learning Link: Day 63: Privilege Escalation - Linux Dirty Cow Kernel Vulnerability & SUID & Information Collection_哔哩哔哩_bilibili

Guess you like

Origin blog.csdn.net/weixin_54977781/article/details/130465423
Recommended