PrivilegeEsc-Linux – Open Source Script for Enumeration on Linux

  • 160
  •  
  •  
  •  
  •  
  •  
  •  
    160
    Shares

PrivilegeEsc-Linux is a simple script which checks the security on a Linux machine. It can run many different options, such as for checking the OS version, the environment , the apps and services, the upload options and more. Mainly focus is to enumerate everything it can in a Linux Machine and with this information you can then escalate to root.

Installing PrivilegeEsc-Linux

The repository contains just the script, so clone it and you are good to go.

git clone https://github.com/J4c3kRz3znik/PrivilegeEsc-Linux.git

Running PrivilegeEsc-Linux

Type the commands below to run the script.

cd PrivilegeEsc-Linux/

chmod +x Priv_enum.sh

./Priv_enum.sh

Remember that this script should be used after you have exploited a Linux Machine. So assume that we have already access to a machine and we have uploaded this script into it. To find a writable directory to upload this script, simply type the command below to your victim’s machine.

find / -writable -type d 2>/dev/null

The interface is simple and contains all the options you can run. Just type ‘All‘ to enumerate everything to your victim’s machine. After the scan is finished it shows a vast amount of information about the target. The first thing to have in mind with this tool is that all it does is enumerate the target, not to suggest exploits. So, use this data wisely, and search more based on the information you got.

What Bunny rating does it get?

PrivilegeEsc-Linux is a great script, it can help you a lot with your Privilege Escalation process. Simple and easy, it shows you a lot of different information you can use. Especially, if you are an OSCP student you will understand that this tool is a must have for your work.  I’m giving it 4 out of 5 bunnies.

Want to learn more about ethical hacking?

We have a  networking hacking course that is of a similar level to OSCP, get an exclusive 95% discount HERE

Do you know of another GitHub related hacking tool?

Get in touch with us via the contact form if you would like us to look at any other GitHub ethical hacking tools.

The following two tabs change content below.
Avatar

Unallocated Author

Please note that the article you are reading has an unallocated author as the original author is no longer employed at latesthackingnews.com, this has been put in place to adhere with general data protection regulations (GDPR). If you have any further queries, please contact: [email protected]
Avatar

Unallocated Author

Please note that the article you are reading has an unallocated author as the original author is no longer employed at latesthackingnews.com, this has been put in place to adhere with general data protection regulations (GDPR). If you have any further queries, please contact: [email protected]

Do NOT follow this link or you will be banned from the site!