Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix a few typos #7

Open
wants to merge 3 commits into
base: master
Choose a base branch
from
Open
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Jump to
Jump to file
Failed to load files.
Diff view
Diff view
10 changes: 5 additions & 5 deletions README.md
Original file line number Diff line number Diff line change
Expand Up @@ -3,7 +3,7 @@
# Linuxprivchecker.py
## A Linux Privilege Escalation Check Script
[![Known Vulnerabilities](https://snyk.io/test/github/sleventyeleven/linuxprivchecker/badge.svg?targetFile=requirements.txt)](https://snyk.io/test/github/sleventyeleven/linuxprivchecker?targetFile=requirements.txt)
### Orginal Author: Mike Czumak (T_v3rn1x) -- @SecuritySift
### Original Author: Mike Czumak (T_v3rn1x) -- @SecuritySift
### Current Maintainer: Michael Contino (@Sleventyeleven)

This script is intended to be executed locally on a Linux box to enumerate basic system info and
Expand All @@ -14,7 +14,7 @@ Linuxprivchecker is designed to identify potential areas to investigate further,
This is to help users further learn how these privilege escalations work and keep it in line with the rules,
for self directed exploitation, laid out for the OSCP, HTB, and other CTFs/exams.

We will try our best to addtional information and reference where possible. As the current Maintainer,
We will try our best to provide additional information and reference where possible. As the current Maintainer,
I also plan to accompany new feature adds, with a post on my blog (hackersvanguard.com) to further explain
each potential area for privilege escalation and what criteria may be required.

Expand All @@ -33,7 +33,7 @@ To run the python 3 version, just utilize pip.

`pip install linuxprivchecker`

Then just run via commandline if runpy is available.
Then just run via command line if runpy is available.

`linuxprivchecker -w -o linuxprivchecker.log`

Expand All @@ -54,9 +54,9 @@ Try to gather system information and find likely exploits
optional arguments:
-h, --help show this help message and exit

-s, --searches Skip time consumming or resource intensive searches
-s, --searches Skip time consuming or resource intensive searches

-w, --write Wether to write a log file, can be used with -0 to
-w, --write Whether to write a log file, can be used with -0 to
specify name/location

-o OUTFILE, --outfile OUTFILE
Expand Down
8 changes: 4 additions & 4 deletions linuxprivchecker.py
Original file line number Diff line number Diff line change
Expand Up @@ -18,8 +18,8 @@
###############################################################################################################
TODO:
Add search for writable and/or missing library files
Add detection and enumeratation for systemd
Add search for accessiable ssh sockets
Add detection and enumeration for systemd
Add search for accessible ssh sockets
Add search for ssh keys
Add search for know access tokens
Expand Sudo support to include rules in sudoers.d
Expand Down Expand Up @@ -561,8 +561,8 @@ def find_likely_exploits(sysinfo, devtools, pkgsandprocs, driveinfo):

# Parse out all of the command line arguments
parser = argparse.ArgumentParser(description='Try to gather system information and find likely exploits')
parser.add_argument('-s', '--searches', help='Skip time consumming or resource intensive searches', required=False, action='store_true')
parser.add_argument('-w', '--write', help='Wether to write a log file, can be used with -0 to specify name/location ', required=False, action='store_true')
parser.add_argument('-s', '--searches', help='Skip time consuming or resource intensive searches', required=False, action='store_true')
parser.add_argument('-w', '--write', help='Whether to write a log file, can be used with -0 to specify name/location ', required=False, action='store_true')
parser.add_argument('-o', '--outfile', help='The file to write results (needs to be writable for current user)', required=False, default='linuxprivchecker.log')
args = parser.parse_args()

Expand Down