Update README.md
This commit is contained in:
parent
8b444ba674
commit
55faa3b5e8
@ -106,25 +106,36 @@ This script has **several lists** included inside of it to be able to **color th
|
|||||||
```
|
```
|
||||||
Enumerate and search Privilege Escalation vectors.
|
Enumerate and search Privilege Escalation vectors.
|
||||||
This tool enum and search possible misconfigurations (known vulns, user, processes and file permissions, special file permissions, readable/writable files, bruteforce other users(top1000pwds), passwords...) inside the host and highlight possible misconfigurations with colors.
|
This tool enum and search possible misconfigurations (known vulns, user, processes and file permissions, special file permissions, readable/writable files, bruteforce other users(top1000pwds), passwords...) inside the host and highlight possible misconfigurations with colors.
|
||||||
-h To show this message
|
Checks:
|
||||||
-q Do not show banner
|
-o Only execute selected checks (system_information,container,cloud,procs_crons_timers_srvcs_sockets,network_information,users_information,software_information,interesting_files,api_keys_regex). Select a comma separated list.
|
||||||
|
-s Stealth & faster (don't check some time consuming checks)
|
||||||
-e Perform extra enumeration
|
-e Perform extra enumeration
|
||||||
-s SuperFast (don't check some time consuming checks) - Stealth mode
|
-t Automatic network scan & Internet conectivity checks - This option writes to files
|
||||||
-a All checks except regexes - Noisy mode, for CTFs mainly
|
-r Enable Regexes (this can take from some mins to hours)
|
||||||
-r Activate Regexes (this can take from some mins to several hours)
|
|
||||||
-f </FOLDER/PATH> Execute linpeas to search passwords/file permissions misconfigs inside a folder
|
|
||||||
-w Wait execution between big blocks of checks
|
|
||||||
-N Do not use colours
|
|
||||||
-D Debug mode
|
|
||||||
-P Indicate a password that will be used to run 'sudo -l' and to bruteforce other users accounts via 'su'
|
-P Indicate a password that will be used to run 'sudo -l' and to bruteforce other users accounts via 'su'
|
||||||
-o Only execute selected checks (system_information,container,procs_crons_timers_srvcs_sockets,network_information,users_information,software_information,interesting_files,api_keys_regex). Select a comma separated list.
|
-D Debug mode
|
||||||
-L Force linpeas execution.
|
|
||||||
-M Force macpeas execution.
|
Network recon:
|
||||||
|
-t Automatic network scan & Internet conectivity checks - This option writes to files
|
||||||
-d <IP/NETMASK> Discover hosts using fping or ping. Ex: -d 192.168.0.1/24
|
-d <IP/NETMASK> Discover hosts using fping or ping. Ex: -d 192.168.0.1/24
|
||||||
-p <PORT(s)> -d <IP/NETMASK> Discover hosts looking for TCP open ports (via nc). By default ports 22,80,443,445,3389 and another one indicated by you will be scanned (select 22 if you don't want to add more). You can also add a list of ports. Ex: -d 192.168.0.1/24 -p 53,139
|
-p <PORT(s)> -d <IP/NETMASK> Discover hosts looking for TCP open ports (via nc). By default ports 22,80,443,445,3389 and another one indicated by you will be scanned (select 22 if you don't want to add more). You can also add a list of ports. Ex: -d 192.168.0.1/24 -p 53,139
|
||||||
-i <IP> [-p <PORT(s)>] Scan an IP using nc. By default (no -p), top1000 of nmap will be scanned, but you can select a list of ports instead. Ex: -i 127.0.0.1 -p 53,80,443,8000,8080
|
-i <IP> [-p <PORT(s)>] Scan an IP using nc. By default (no -p), top1000 of nmap will be scanned, but you can select a list of ports instead. Ex: -i 127.0.0.1 -p 53,80,443,8000,8080
|
||||||
-t Automatic network scan (host discovery and port scanning) - This option writes to files
|
|
||||||
Notice that if you specify some network scan (options -d/-p/-i but NOT -t), no PE check will be performed
|
Notice that if you specify some network scan (options -d/-p/-i but NOT -t), no PE check will be performed
|
||||||
|
|
||||||
|
Port forwarding:
|
||||||
|
-F LOCAL_IP:LOCAL_PORT:REMOTE_IP:REMOTE_PORT Execute linpeas to forward a port from a local IP to a remote IP
|
||||||
|
|
||||||
|
Firmware recon:
|
||||||
|
-f </FOLDER/PATH> Execute linpeas to search passwords/file permissions misconfigs inside a folder
|
||||||
|
|
||||||
|
Misc:
|
||||||
|
-h To show this message
|
||||||
|
-w Wait execution between big blocks of checks
|
||||||
|
-L Force linpeas execution
|
||||||
|
-M Force macpeas execution
|
||||||
|
-q Do not show banner
|
||||||
|
-N Do not use colours
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|
||||||
## Hosts Discovery and Port Scanning
|
## Hosts Discovery and Port Scanning
|
||||||
|
Loading…
Reference in New Issue
Block a user