# LinEnum
For more information visit www.rebootuser.com
Note: Export functionality is currently in the experimental stage.
General usage:
version 0.7 (work in progress)
* Example: ./LinEnum.sh -k keyword -r report -e /tmp/ -t
OPTIONS:
* -k Enter keyword
* -e Enter export location
* -t Include thorough (lengthy) tests
* -r Enter report name
* -h Displays this help text
Running with no options = limited scans/no output file
* -e Requires the user enters an output location i.e. /tmp/export. If this location does not exist, it will be created.
* -r Requires the user to enter a report name. The report (.txt file) will be saved to the current working directory.
* -t Performs thorough (slow) tests. Without this switch default 'quick' scans are performed.
* -k An optional switch for which the user can search for a single keyword within many files (documented below).
See CHANGELOG.md for further details
High-level summary of the checks/tasks performed by LinEnum:
* Kernel and distribution release details
* System Information:
* Hostname
* Networking details:
* Current IP
* Default route details
* DNS server information
* User Information:
* Current user details
* Last logged on users
* Shows users logged onto the host
* List all users including uid/gid information
* List root accounts
* Extracts password policies and hash storage method information
* Checks umask value
* Checks if password hashes are stored in /etc/passwd
* Extract full details for ‘default’ uid’s such as 0, 1000, 1001 etc
* Attempt to read restricted files i.e. /etc/shadow
* List current users history files (i.e .bash_history, .nano_history etc.)
* Basic SSH checks
* Privileged access:
* Determine if /etc/sudoers is accessible
* Determine if the current user has Sudo access without a password
* Are known ‘good’ breakout binaries available via Sudo (i.e. nmap, vim etc.)
* Is root’s home directory accessible
* List permissions for /home/
* Environmental:
* Display current $PATH
* Displays env information
* Jobs/Tasks:
* List all cron jobs
* Locate all world-writable cron jobs
* Locate cron jobs owned by other users of the system
* Services:
* List network connections (TCP & UDP)
* List running processes
* Lookup and list process binaries and associated permissions
* List inetd.conf/xined.conf contents and associated binary file permissions
* List init.d binary permissions
* Version Information (of the following):
* Sudo
* MYSQL
* Postgres
* Apache
* Checks user config
* Shows enabled modules
* Default/Weak Credentials:
* Checks for default/weak Postgres accounts
* Checks for default/weak MYSQL accounts
* Searches:
* Locate all SUID/GUID files
* Locate all world-writable SUID/GUID files
* Locate all SUID/GUID files owned by root
* Locate ‘interesting’ SUID/GUID files (i.e. nmap, vim etc)
* List all world-writable files
* Find/list all accessible *.plan files and display contents
* Find/list all accessible *.rhosts files and display contents
* Show NFS server details
* Locate *.conf and *.log files containing keyword supplied at script runtime
* List all *.conf files located in /etc
* Locate mail
* Platform/software specific tests:
* Checks to determine if we're in a Docker container
* Checks to see if the host has Docker installed
没有合适的资源?快使用搜索试试~ 我知道了~
AWD-Web 工具资料集合.zip
共897个文件
t:87个
txt:83个
dll:59个
需积分: 21 9 下载量 166 浏览量
2022-11-24
20:57:44
上传
评论 3
收藏 320.48MB ZIP 举报
温馨提示
AWD一条龙 攻防常用脚本+不死马+crontab+防御方法,不死马,反弹shell,可扩展批量攻击脚本,文件监控,预留后门利用,常用密码,弱口令,反弹shell,goby,fuzz,awd-watchbird防御,Xftp-7.0.0054p,Xshell-7.0.0054p,源码简单检测,6000字常用awd_attack.py ------awd批量攻击主框架 利用主办方欲留后门进行攻击 rsa_client.php ------rsa加密后门客户端 加密攻击的payload并发送给种植在其他队伍服务器上的rsa_server.php rsa_server.php ------rsa加密后门服务端 解密攻击payload并返回执行结果 rsa_attack.py ------rsa木马测试 测试rsa客户端和服务端是否可以实现互相通信 nodie.php ------不死马 主要负责写入rsa不死马 crontab.py ------定时任务写入脚本 crontab.txt ------定时任务要写入的内容
资源推荐
资源详情
资源评论
收起资源包目录
AWD-Web 工具资料集合.zip (897个子文件)
libgksu2.so.0 68KB
libgksu2.so.0 68KB
libgksu2.so.0.0.2 68KB
libgksu2.so.0.0.2 68KB
configure.ac 26KB
Makefile.am 4KB
Makefile.am 4KB
Makefile.am 2KB
Makefile.am 2KB
Makefile.am 1KB
Makefile.am 404B
Makefile.am 389B
Makefile.am 229B
Makefile.am 31B
applet 24KB
applet 24KB
app.asar 178.24MB
electron.asar 259KB
.babelrc 726B
mdui-icon.woff2.base64 58KB
update.bat 5KB
build_dependencies.bat 4KB
build_release.bat 2KB
list_dependencies.bat 2KB
build_modsecurity.bat 2KB
download_files.bat 2KB
build_apache.bat 1KB
build_yajl.bat 1KB
build_pcre.bat 1KB
build_ssdeep.bat 1KB
build_lua.bat 1KB
build_curl.bat 1KB
build_msi.bat 983B
build_libxml2.bat 853B
build_zlib.bat 725B
build_cmake.bat 358B
v8_context_snapshot.bin 1.69MB
natives_blob.bin 171KB
rule.bin 3KB
editor.bin 115B
binary 6KB
re_operators.c 149KB
apache2_config.c 124KB
re_variables.c 118KB
re.c 117KB
re_actions.c 89KB
msc_logging.c 87KB
msc_util.c 76KB
mlogc.c 75KB
libinjection_sqli.c 70KB
mod_security2.c 60KB
msc_crypt.c 60KB
msc_multipart.c 50KB
ngx_http_modsecurity.c 42KB
apache2_io.c 39KB
alp2.c 39KB
msc_reqbody.c 38KB
config.c 35KB
server.c 32KB
msc_test.c 29KB
persist_dbm.c 28KB
modsecurity.c 26KB
re_tfns.c 24KB
msc_remote_rules.c 24KB
msc_tree.c 24KB
api.c 21KB
libinjection_html5.c 21KB
msc_geo.c 21KB
CVE-2016-8655_chocobo_root.c 20KB
acmp.c 17KB
CVE-2017-6074_poc.c 15KB
libinjection_xss.c 14KB
msc_status_engine.c 13KB
msc_lua.c 13KB
alp2_pp.c 12KB
apache2_util.c 12KB
msc_parsers.c 10KB
msc_json.c 9KB
filters.c 7KB
apr_bucket_nginx.c 6KB
mod_op_strstr.c 6KB
msc_pcre.c 6KB
ngx_pool_context.c 6KB
buckets.c 6KB
main.c 6KB
mod_reqbody_example.c 5KB
msc_unicode.c 5KB
msc_xml.c 4KB
regex.c 4KB
mod_var_remote_addr_port.c 4KB
msc_gsb.c 3KB
mod_tfn_reverse.c 3KB
CVE-2016-5195_dirtyc0w.c 3KB
sudo-CVE-2017-1000367.c 3KB
hooks.c 2KB
waf.c 2KB
msc_release.c 1KB
PingInfoView.cfg 2KB
CHANGES 75KB
compile 4KB
共 897 条
- 1
- 2
- 3
- 4
- 5
- 6
- 9
资源评论
hackerM07
- 粉丝: 1185
- 资源: 32
上传资源 快速赚钱
- 我的内容管理 展开
- 我的资源 快来上传第一个资源
- 我的收益 登录查看自己的收益
- 我的积分 登录查看自己的积分
- 我的C币 登录后查看C币余额
- 我的收藏
- 我的下载
- 下载帮助
安全验证
文档复制为VIP权益,开通VIP直接复制
信息提交成功