Hacking Linux: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
(Hacking Linux)
 
Line 1: Line 1:
== Rooting ==  
== Rooting ==  
For different techniques and tools for getting root on a target:
These tools will quickly help you analyze a system for vulnerabilities that will aid in your privilege escalation and maintaining persistence.


See [[Rooting linux]].
== Rooting ==
=== Tools ===
* LinPeas: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS
* LinEnum: https://github.com/rebootuser/LinEnum
* LES (Linux Exploit Suggester): https://github.com/mzet-/linux-exploit-suggester
* Linux Smart Enumeration: https://github.com/diego-treitos/linux-smart-enumeration
* Linux Priv Checker: https://github.com/linted/linuxprivchecker
* Nix* binary exploitation: https://gtfobins.github.io
* [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Linux%20-%20Privilege%20Escalation.md Linux - Privilege Escalation]


== Stabilizing Shells ==
== Stabilizing Shells ==

Revision as of 14:46, 14 September 2023

Rooting

These tools will quickly help you analyze a system for vulnerabilities that will aid in your privilege escalation and maintaining persistence.

Rooting

Tools

Stabilizing Shells

For stabilizing your shells to be more functional:

See Stabilizing shells.

Evade Detection

For evading detection whilst you're hacking:

See Linux - Evasion.

Linux Persistence

For persisting your access on a Linux system:

See Linux - Persistence.

General tips and tricks: