From 8a3bb14ce433520be1a5f81249e0bf2d2029e43d Mon Sep 17 00:00:00 2001 From: kali Date: Fri, 25 Dec 2020 17:45:23 -0500 Subject: [PATCH] linpeasv2.9.9 --- linPEAS/linpeas.sh | 10 +++++++++- 1 file changed, 9 insertions(+), 1 deletion(-) diff --git a/linPEAS/linpeas.sh b/linPEAS/linpeas.sh index 526f56d..ad3b7d9 100755 --- a/linPEAS/linpeas.sh +++ b/linPEAS/linpeas.sh @@ -1,6 +1,6 @@ #!/bin/sh -VERSION="v2.9.8" +VERSION="v2.9.9" ADVISORY="This script should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own networks and/or with the network owner's permission." ########################################### @@ -1182,6 +1182,14 @@ if [ "`echo $CHECKS | grep ProCronSrvcsTmrsSocks`" ]; then fi echo "" + #-- PCS) Files opened by processes belonging to other users + if ! [ "$IAMROOT" ]; then + printf $Y"[+] "$GREEN"Files opened by processes belonging to other users\n"$NC + printf $B"[i] "$Y"This is usually empty because of the lack of privileges to read other user processes information\n"$NC + lsof 2>/dev/null | grep -v "$USER" | grep -iv "permission denied" | sed -E "s,$sh_usrs,${C}[1;96m&${C}[0m," | sed "s,$USER,${C}[1;95m&${C}[0m," | sed -E "s,$nosh_usrs,${C}[1;34m&${C}[0m," | sed "s,root,${C}[1;31m&${C}[0m," + echo "" + fi + #-- PCS) Processes with credentials inside memory printf $Y"[+] "$GREEN"Processes with credentials in memory (root req)\n"$NC printf $B"[i] "$Y"https://book.hacktricks.xyz/linux-unix/privilege-escalation#credentials-from-process-memory\n"$NC