Roothelper will aid in the process of privilege escalation on a Linux system that has been compromised. The latest version downloads nine scripts. From enumeration to exploit suggestion to exploit deployment. RootHelper ensures you have access to the best tools for the job.
The credits for the scripts it fetches go to their original authors.
RootHelper now supports command line arguments/flags.
--quiet flag supresses the
usage print function on execution. Therefore you can now simply pass
-q and be taken directly to the menu.
--fast flag immediately starts the execution of the script's
download option. If time is of the essence the
-f flag will hurry things along.
Linux Smart Enumeration Is the latest addition to the tools available with RootHelper. It's a tool based on LinEnum but with a heavy focus on the privilege escalation aspect and those possibilities enumeration tools provide.
SBD or Static Binary Deployer has been added to the tools available for download with RootHelper. For details on this utility find my repo here
Auto-Root-Exploit Is now available through RootHelper.
BashArk; a post-exploitation tool. Is now available for download with RootHelper.
A new version of
Linux Exploit Suggester has been released. It is an updated version based on the old one by PenturaLabs. The author of this tool and all others available through RootHelper are accredited for their excellent work below.
Shellscript that enumerates the system configuration.
Linux Smart Enumeration
LinEnum fork with a heavy focus on the privilege escalation.
Shellscript that enumerates the system configuration and runs some privilege escalation checks as well.
A python implementation to suggest exploits particular to the system that's been compromised.
A perl script that that does the same as the one mentioned above.
SBD Makes it possible to deploy static binaries of common (and less common) Linux utilities that might otherwise be unavailable.
Auto-Root-Exploit is a shell script that downloads and executes all known publically available exploits from Exploit-DB for the system and kernel version you specify via the tool's command-line arguments.
BashArk is post exploitation tool written in Bash.
Shellscript that gathers useful information by searching the mounted firmware filesystem. For things such as SSL and web server related files, config files, passwords, common binaries and more.
To use the script you will need to get it on the system you've compromised with utilities such as
wget depending on what is available to you on that particular system. From there you need to make it executable with
chmod +x roothelper.sh After which run it and it will show you the options available and an informational message regarding the options. For clarity i have posted it below as well.
The 'Help' option displays this informational message. The 'Download' option fetches the relevant files and places them in the /tmp/ directory. The option 'Download and unzip' downloads all files and extracts the contents of zip archives to their individual subdirectories respectively, please note; if the 'mkdir' command is unavailable however, the operation will not succeed and the 'Download' option should be used instead The 'Clean up' option removes all downloaded files and 'Quit' exits roothelper.
There's another script on my Github that follows the general principles of this script however it aims to be more comprehensive with regards to it's capabilities. Besides downloading scripts that aid in privilege escalation on a Linux system it also comes with functionality to enumerate the system in question without first having to download any other external tools. It can also search for cleartext credentials and more. It could be considered RootHelper's sister script with an increased richness of features, it can be found by clicking here. If you prefer a minimalist approach, I got you covered, since both scripts will continue to be maintained and updated for the foreseeable future.
Special thanks to DiegoTreitos for his efforts in optimizing RootHelper's source code.
Credits for scripts RootHelper fetches go to their original authors.