Hacking Linux: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
mNo edit summary
mNo edit summary
Line 2: Line 2:
These tools will quickly help you analyze a system for vulnerabilities that will aid in your privilege escalation and maintaining persistence.
These tools will quickly help you analyze a system for vulnerabilities that will aid in your privilege escalation and maintaining persistence.


== Rooting ==
=== Tools ===
=== Tools ===
* LinPeas: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS
* LinPeas: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS

Revision as of 14:48, 14 September 2023

Rooting

These tools will quickly help you analyze a system for vulnerabilities that will aid in your privilege escalation and maintaining persistence.

Tools

Stabilizing Shells

After gaining a reverse shell it's good practice to stabilize it for better usability and functionality.

python3 -c 'import pty;pty.spawn("/bin/bash");'
stty -a
stty rows <NUMBER> cols <NUMBER>
echo $SHELL
export SHELL=bash
echo $TERM
export TERM=xterm-256color
press CTRL+Z
stty raw -echo ; fg
reset

Evade Detection

For evading detection whilst you're hacking:

See Linux - Evasion.

Linux Persistence

For persisting your access on a Linux system:

See Linux - Persistence.

General tips and tricks: