From f4ae93bd1fbafdf5f377beb24e7a0eba5564739e Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Wed, 11 Sep 2019 01:14:55 +0200 Subject: [PATCH 1/3] Update README.md --- README.md | 8 +++++--- 1 file changed, 5 insertions(+), 3 deletions(-) diff --git a/README.md b/README.md index eb853dc..7a3dd13 100644 --- a/README.md +++ b/README.md @@ -5,7 +5,7 @@ Also valid for **Unix systems** **LinPEAS performs the linux privilege escalation checks explained in [book.hacktricks.xyz](https://book.hacktricks.xyz/linux-unix/privilege-escalation)** -[![asciicast](https://asciinema.org/a/266928.png)](https://asciinema.org/a/266928) +[![asciicast](https://asciinema.org/a/250532.png)](https://asciinema.org/a/266928) ## Quick Start @@ -41,7 +41,7 @@ This script has **several lists** included inside of it to be able to **color th LinPEAS also **exports a new PATH** variable if common folders aren't present in the original PATH variable. It also **exports** unset and export several environmental commands so no command executed during the session will be saved in the history file (you can avoid this actions using the parameter **-n**). -You can see the [checks performed by linPEAS here](https://github.com/carlospolop/linux-privilege-escalation-awsome-script/tree/master/checks) +You can see the *[checks performed by linPEAS here](https://github.com/carlospolop/linux-privilege-escalation-awsome-script/tree/master/checks)* ## Colors @@ -106,8 +106,10 @@ file="/tmp/linPE";RED='\033[0;31m';Y='\033[0;33m';B='\033[0;34m';NC='\033[0m';rm ## Todo - Add more checks +- Mantain updated the list of vulnerable SUID binaries +- Mantain update all the blacklists used to color the output -If you want to add a new check you can suggest it using github issues or you can submit a pull request. +If you want to help with any of this, youu can do it using github issues or you can submit a pull request. If you find any issue, please report it using the github issues. From 0b11eaca43352f992b87fd246c7eecc0812f900f Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Wed, 11 Sep 2019 01:16:03 +0200 Subject: [PATCH 2/3] Update README.md --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 7a3dd13..1fe6b8c 100644 --- a/README.md +++ b/README.md @@ -107,7 +107,7 @@ file="/tmp/linPE";RED='\033[0;31m';Y='\033[0;33m';B='\033[0;34m';NC='\033[0m';rm - Add more checks - Mantain updated the list of vulnerable SUID binaries -- Mantain update all the blacklists used to color the output +- Mantain updated all the blacklists used to color the output If you want to help with any of this, youu can do it using github issues or you can submit a pull request. From b78a1a017b514dd1457caf25cb085ee9880702a2 Mon Sep 17 00:00:00 2001 From: Carlos Polop Date: Thu, 12 Sep 2019 21:32:31 +0200 Subject: [PATCH 3/3] Update README.md --- README.md | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 1fe6b8c..272d96f 100644 --- a/README.md +++ b/README.md @@ -1,6 +1,6 @@ # LinPEAS - Linux Privilege Escalation Awsome Script (with colors!!) -Also valid for **Unix systems** +Also valid for other **Unix systems** (tested in Debian, CentOS, FreeBSD and OpenBSD) **LinPEAS performs the linux privilege escalation checks explained in [book.hacktricks.xyz](https://book.hacktricks.xyz/linux-unix/privilege-escalation)** @@ -108,6 +108,7 @@ file="/tmp/linPE";RED='\033[0;31m';Y='\033[0;33m';B='\033[0;34m';NC='\033[0m';rm - Add more checks - Mantain updated the list of vulnerable SUID binaries - Mantain updated all the blacklists used to color the output +- Support for MacOS If you want to help with any of this, youu can do it using github issues or you can submit a pull request.