这是indexloc提供的服务,不要输入任何密码
Skip to content
Merged
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
55 changes: 26 additions & 29 deletions linuxprivchecker.sh
Original file line number Diff line number Diff line change
@@ -1,38 +1,35 @@
#!/bin/bash

###################################80 Columns###################################
# Linux Privilege Escalation Check Script
#
# [Details:]
## Originally forked from the linuxprivchecker.py (Mike Czumak), this script
## is intended to be executed locally on a Linux box to enumerate basic system
## info and search for common privilege escalation vectors such as word
## writable files, misconfigurations, clear-text password and applicable
## exploits.
#
# [Original Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift
# [Contributors]:
## Mike Merrill (linted) -- https://github.com/linted
## James Hogan (5aru) -- https://github.com/5aru
#
# [Modification, Distribution, and Attribution]:
## Permission is herby granted, free of charge, to any person obtaining a copy
## of this software and the associated documentation files (the "Software"),
## to use, copy, modify, merge, publish, distribute, and/or sublicense copies
## of the Software, and to permit persons to whom the Software is furnished to
## do so, subject to the following conditions:
###############################################################################################################
## [Title]: linuxprivchecker.sh -- a Linux Privilege Escalation Check Script
## [Author]: Mike Czumak (T_v3rn1x) -- @SecuritySift
## [Contributors]: Mike Merrill (linted) -- https://github.com/linted
## James Hogan (5aru) -- https://github.com/5aru
##-------------------------------------------------------------------------------------------------------------
## [Details]:
## Similar functions to Mike Czumak's linuxprivchecker.py Linux Privilege Escalation Check Script.
## This script is intended to be executed locally on a Linux box to enumerate basic system info and
## search for common privilege escalation vectors such as world writable files, misconfigurations, clear-text
## passwords and applicable exploits.
##-------------------------------------------------------------------------------------------------------------
## [Warning]:
## This script comes as-is with no promise of functionality or accuracy.
##-------------------------------------------------------------------------------------------------------------
## [Modification, Distribution, and Attribution]:
## Permission is herby granted, free of charge, to any person obtaining a copy of this software and the
## associated documentation files (the "Software"), to use, copy, modify, merge, publish, distribute, and/or
## sublicense copies of the Software, and to permit persons to whom the Software is furnished to do so, subject
## to the following conditions:
##
## The software must maintain original author attribution and may not be sold
## or incorporated into any commercial offering.
##
## THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
## IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
## FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
## AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES, OR OTHER
## LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING
## FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER
## DEALINGS IN THE SOFTWARE.
##################################80 Columns####################################
## THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR ## IMPLIED, INCLUDING BUT NOT
## LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO
## EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES, OR OTHER LIABILITY, WHETHER
## IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE
## USE OR OTHER DEALINGS IN THE SOFTWARE.
###############################################################################################################

### Useful functions

Expand Down