photo lineviral_1.png

Find Linux Exploits Past Times Essence Version

Sometimes it’s actually difficult to honor the right exploit for the device that you lot are pentesting. I works life ii skillful references that may last helpful or to the lowest degree volition give you lot a skillful starting point. Both of these resources tin propose Linux exploits based on nitty-gritty version. The rootage 1 is available inwards Github too the instant 1 I believe I saw inwards Twitter too bookmarked the link (can’t think the Twitter handle, sorry, delight remind me too thence that I tin credit?).


s actually difficult to honor the right exploit for the device that you lot are pentesting Find Linux Exploits yesteryear Kernel version


Linux Exploit Suggester


Linux Exploit Suggester is a github projection to position exploits based on operating organization release number(or Kernel version). This computer program run without arguments volition perform a ‘uname -r’ to choose cause got of the Linux Operating Systems release version, too render a suggestive listing of possible exploits. Nothing fancy, too thence a patched/back-ported piece may fool this script. Additionally possible to render ‘-k’ flag to manually instruct inwards the Kernel Version/Operating System Release Version.


Github Project: https://github.com/PenturaLabs/Linux_Exploit_Suggester


Examples:


$ perl ./Linux_Exploit_Suggester.pl -k 3.0.0

Kernel local: 3.0.0

Possible Exploits:
[+] semtex
CVE-2013-2094
Source: www.exploit-db.com/download/25444/‎
[+] memodipper
CVE-2012-0056
Source: http://www.exploit-db.com/exploits/18411/
[+] perf_swevent
CVE-2013-2094
Source: http://www.exploit-db.com/download/26131

Flat file to honor Linux Exploits yesteryear Kernel version


I copied the whole page hither every bit the source page looks similar a piece of job inwards progress. This also seems to last based on the same Github Project entirely he’s added to a greater extent than (the writer tweeted almost that too). Kudos.



  1. Locate the Kernel version of the target machine(s) (e.g. uname -a or via nmap).

  2. Using this listing, locate exploit refereces that includes your version.

  3. Version numbers amongst 0’s betoken ALL subversions of that Kernel percentage (e.g. 2.4.0 = 2.4.1 – 2.4.36).

  4. Provided for inquiry only, Perform a through code review prior to use, operate entirely hosts you lot bring legal authorisation to pentest; no warranties or guarentees implied or provided!





































































































































































































































































































































































































































































































































































































































































































































































































































































































































Exploit NameKernel StartKernel EndExploit URLRemarks
hudo2.0.06.0.1https://github.com/FuzzySecurity/Unix-PrivEsc/blob/master/hudo.cSee contents for specific versions
ip6t_so_set(loc)2.0.04.6.2https://www.exploit-db.com/exploits/40489/
libfutex(loc)2.0.02.0.0https://www.exploit-db.com/exploits/35370/
setreuic(0,0)2.0.04.0.1https://www.exploit-db.com/exploits/14219/
tack2.0.02.6.0https://www.exploit-db.com/exploits/38685/
rds-fail2.1.02.6.0http://vulnfactory.org/exploits/rds-fail.c
ptrace2.2.02.4.0http://www.securiteam.com/exploits/5CP0Q0U9FY.html
rip2.2.02.2.0https://packetstormsecurity.com/files/22124/rip.c.html
viper Autoroot_v22.2.02.6.0http://www.exploit-id.com/tools/viper-auto-rootingWarning:Verify remote source earlier use
remap2.4.02.4.0https://www.exploit-db.com/exploits/160/
pipe.c_32bit2.4.42.4.37http://www.securityfocus.com/data/vulnerabilities/exploits/36901-1.c
sock_sendpage2.4.42.4.37http://www.exploit-db.com/exploits/9435Alt:Proto Ops
sock_sendpage22.4.42.4.37http://www.exploit-db.com/exploits/9436Alt:Proto Ops
brk2.4.102.4.10http://www.cyberwarrior.us/code/linux/brk_vma.c
expand_stack2.4.102.4.10https://www.exploit-db.com/exploits/778/
w00t2.4.102.4.21https://github.com/freebsd/freebsd/tree/master/tools/tools/net80211/w00t
expand_stack2.4.162.4.31https://www.exploit-db.com/exploits/778/
w00t2.4.162.4.21https://github.com/freebsd/freebsd/tree/master/tools/tools/net80211/w00t
newlocal2.4.172.4.19https://github.com/FuzzySecurity/Unix-PrivEsc/blob/master/newlocal.zip
uselib242.4.172.4.17https://packetstormsecurity.com/files/35920/uselib24.c.html
brk2.4.182.4.22http://www.cyberwarrior.us/code/linux/brk_vma.c
km22.4.182.4.22http://downloads.securityfocus.com/vulnerabilities/exploits/binfmt_elf.c
ave2.4.192.4.20** Unknown Source Repository at this time.. manual search required
mremap_pte2.4.202.4.20http://www.exploit-db.com/exploits/160/
loko2.4.222.4.24http://pastie.org/pastes/316474** Warning** Mod code for IRC contrary shell
uselib242.4.222.4.29https://packetstormsecurity.com/files/35920/uselib24.c.html
mremap_pte2.4.242.4.27http://www.exploit-db.com/exploits/160/
elfdump2.4.272.6.8https://www.exploit-db.com/exploits/624/
elflbl2.4.292.4.29http://www.exploit-db.com/exploits/744/
smpracer2.4.292.4.29https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack/blob/master/2005/expand_stack-SMP-race.c
smp_race_local2.4.292.4.29https://github.com/FuzzySecurity/Unix-PrivEsc/blob/master/expand_stack.c
stackgrow22.4.292.4.29https://dl.packetstormsecurity.net/0501-exploits/stackgrow2.c.html
american-sign-lang2.6.02.3.36https://www.exploit-db.com/exploits/15774/Alt:ASL
can_modharden2.6.02.6.0https://www.exploit-db.com/exploits/14814/
half_nelson2.6.02.6.36http://www.exploit-db.com/exploits/6851Alt:eConet
half_nelson12.6.02.6.36http://www.exploit-db.com/exploits/17787/Alt:eConet
pktcdvd2.6.02.6.36http://www.exploit-db.com/exploits/15150/
smpracer2.6.02.6.0https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack/blob/master/2005/expand_stack-SMP-race.c
sock_sendpage2.6.02.6.30http://www.exploit-db.com/exploits/9435Alt:Proto Ops
sock_sendpage22.6.02.6.30http://www.exploit-db.com/exploits/9436Alt:Proto Ops
vconsole2.6.02.6.0http://downloads.securityfocus.com/vulnerabilities/exploits/33672.c
video4linux2.6.02.6.33http://www.exploit-db.com/exploits/15024/
udp_sendmsg_32bit2.6.12.6.19http://downloads.securityfocus.com/vulnerabilities/exploits/36108.c
krad2.6.52.6.11https://www.exploit-db.com/exploits/15774/
krad32.6.52.6.11http://exploit-db.com/exploits/1397
ong_bak2.6.52.6.5https://github.com/FuzzySecurity/Unix-PrivEsc/blob/master/ong_bak.c
h00lyshit2.6.82.6.16http://www.exploit-db.com/exploits/2013/
stackgrow22.6.102.6.10https://dl.packetstormsecurity.net/0501-exploits/stackgrow2.c.html
uselib242.6.102.6.10https://packetstormsecurity.com/files/35920/uselib24.c.html
ftrex2.6.112.6.22http://www.exploit-db.com/exploits/6851
elfcd2.6.122.6.12https://www.exploit-db.com/exploits/25647/
py22.6.122.6.12https://www.exploit-db.com/exploits/1591/
kdump2.6.132.6.13https://www.exploit-db.com/exploits/17942/
local262.6.132.6.13https://www.exploit-db.com/exploits/160/
prctl2.6.132.6.17http://www.exploit-db.com/exploits/2004/
prctl22.6.132.6.17http://www.exploit-db.com/exploits/2005/
prctl32.6.132.6.17http://www.exploit-db.com/exploits/2006/
prctl42.6.132.6.17http://www.exploit-db.com/exploits/2011/
prctl_loc_priv2.6.132.6.17https://github.com/FuzzySecurity/Unix-PrivEsc/blob/master/exp.sh
raptor_prctl2.6.132.6.23http://www.exploit-db.com/exploits/2031/
pipe.c_32bit2.6.152.6.31http://www.securityfocus.com/data/vulnerabilities/exploits/36901-1.c
vmsplice12.6.172.6.24http://www.expliot-db.com/exploits/5092Alt:Jessica Biel
can_bcm2.6.182.6.36http://www.exploit-db.com/exploits/14814/
do_pages_move2.6.182.6.31https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/9627.tgzAlt:Sieve
gconv_translit_find2.6.182.6.18https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/34421.tar.gz
reiserfs2.6.182.6.34http://www.exploit-db.com/exploits/12130/
dirty_cow_proc_race2.6.223.8.0https://www.exploit-db.com/exploits/40847/
dirty_cow_ptrace2.6.223.8.0https://www.exploit-db.com/exploits/40839/
vmsplice22.6.232.6.24http://www.exploit-db.com/exploits/5093Alt:Dianne Lane
exit_notify2.6.252.6.29http://www.exploit-db.com/exploits/8369
udev2.6.252.6.29http://www.exploit-db.com/exploits/8478
ptrace_kmod22.6.262.6.34http://www.exploit-db.com/exploits/15023/Alt:ia32syscall
sctp2.6.262.6.26https://github.com/offensive-security/exploit-database/blob/master/platforms/linux/local/7618.c
rds2.6.302.6.36http://www.exploit-db.com/exploits/15285/
tomcat_privesc2.6.302.6.99https://www.exploit-db.com/exploits/40488/
gconv_translit_find2.6.322.6.32https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/34421.tar.gz
inode_Int_overflow2.6.323.16.0https://packetstormsecurity.com/files/139871/Linux-Kernel-2.6.32-642-3.16.0-4-Inode-Integer-Overflow.html
caps_to_root2.6.342.6.36http://www.exploit-db.com/exploits/15916/
semtex2.6.372.6.39http://www.exploit-db.com/download/25444/
memodipper2.6.392.6.39http://www.exploit-db.com/exploits/18411/
memodipper3.0.03.1.1http://www.exploit-db.com/exploits/18411/
perf_swevent3.0.03.8.9http://www.exploit-db.com/download/26131
rowhammer3.0.06.0.0https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/sploits/36310.tar.gz
semtex3.0.03.1.1http://www.exploit-db.com/download/25444/
death-star3.1.03.1.8http://downloads.securityfocus.com/vulnerabilities/exploits/52201.txt
timeoutpwn3.1.03.1.0https://www.kernel-exploits.com/media/timeoutpwn64.c
overlayFS3.2.03.2.0http://0day.today/exploit/23763
usb-creator_v0.23.2.03.2.0http://0day.today/exploit/23566
sock_diag3.3.03.8.0https://www.exploit-db.com/exploits/33336/
libtiff3.7.13.4.03.4.0https://www.exploit-db.com/exploits/14219/
recvmmsg3.4.03.12.1https://www.exploit-db.com/exploits/31347/
timeoutpwn3.4.03.4.0https://www.kernel-exploits.com/media/timeoutpwn64.c
libtiff3.7.13.5.13.5.7https://www.exploit-db.com/exploits/14219/
libtiff3.7.13.6.03.6.1https://www.exploit-db.com/exploits/14219/
libtiff3.7.13.7.03.7.4https://www.exploit-db.com/exploits/14219/
libtiff3.7.13.8.03.8.2https://www.exploit-db.com/exploits/14219/
libtiff3.7.13.9.03.9.3https://www.exploit-db.com/exploits/14219/
ifenslave3.10.03.10.0https://github.com/FuzzySecurity/Unix-PrivEsc/blob/master/ifenslave.c
tomcat_privesc3.10.03.10.99https://www.exploit-db.com/exploits/40488/
Apport_abrt3.13.03.13.0https://www.exploit-db.com/exploits/36746/
overlayfs3.13.03.13.1https://www.exploit-db.com/exploits/40688/
overlayFS3.13.03.19.0http://0day.today/exploit/23763
overlayfs_shell(loc)3.13.03.18.0https://www.exploit-db.com/exploits/37292/
usb-creator_v0.23.13.03.13.0http://0day.today/exploit/23566
recvmmsg_privesc3.13.13.13.1https://www.exploit-db.com/exploits/40503/
libfutex3.14.03.14.6http://downloads.securityfocus.com/vulnerabilities/exploits/67906.c
libfutex(loc)3.14.03.14.0https://www.exploit-db.com/exploits/35370/
Apport_abrt3.16.03.16.0https://www.exploit-db.com/exploits/36746/
overlayfs3.16.03.16.1https://www.exploit-db.com/exploits/40688/
usb-creator_v0.23.16.03.16.0http://0day.today/exploit/23566
af_packet_race3.19.03.19.1https://www.exploit-db.com/exploits/40871/
overlayfs3.19.03.19.1https://www.exploit-db.com/exploits/40688/
libtiff3.7.14.0.04.0.1https://www.exploit-db.com/exploits/14219/
overlayfs4.2.04.2.18https://www.exploit-db.com/exploits/40688/
overlayfs4.2.84.2.8https://www.exploit-db.com/exploits/40688/
overlayfs(loc)4.3.24.3.3https://www.exploit-db.com/exploits/39166/
bpf_loc_Priv_esc4.4.04.4.0https://www.exploit-db.com/exploits/40759/
perf_event_open4.4.04.4.0https://bugs.chromium.org/p/project-zero/issues/detail?id=807
refcnt_keyrings(loc)4.4.14.4.1https://www.exploit-db.com/exploits/39277/
logrotate_loc_Priv4.6.04.6.0https://www.exploit-db.com/exploits/40768/
netfilter_privesc(loc)4.6.34.6.3https://www.exploit-db.com/exploits/40435/
libtiff3.7.15.0.05.2.1https://www.exploit-db.com/exploits/14219/
libfutex6.0.06.0.0http://downloads.securityfocus.com/vulnerabilities/exploits/67906.c
libfutex(loc)6.0.06.0.0https://www.exploit-db.com/exploits/35370/
libfutex26.0.06.0.0https://www.exploit-db.com/exploits/35370/
netBSD_mail(loc)6.0.06.1.5https://packetstormsecurity.com/files/138021/NetBSD-mail.local-8-Local-Root.html
netBSD_mail(loc)7.0.07.1.1https://packetstormsecurity.com/files/138021/NetBSD-mail.local-8-Local-Root.html

Someone tin fork the original Github projection too proceed adding to a greater extent than to that every bit the original projection was made GPLv2 yesteryear the writer (thanks). Which means, you lot can:



  • copy too distribute the program’s unmodified source code

  • modify the program’s source code too distribute the modified source


You tin perhaps create the same affair using MetaSploit. Detailed steps on how to search exploits inwards MetaSploit tin last works life here.  Either way, bring a champaign 24-hour interval adding more, testing to a greater extent than too having fun. If you lot know of to a greater extent than exploits, propose them via comments section. As usual, I don’t strength whatever checks via comments department too it’s pretty open, too thence become ahead.


Buat lebih berguna, kongsi:
close