RootHelper

授权协议 GPL-3.0 License
开发语言 SHELL
所属分类 应用工具、 终端/远程登录
软件类型 开源软件
地区 不详
投 递 者 西门梓
操作系统 跨平台
开源组织
适用人群 未知
 软件概览

RootHelper

Roothelper will aid in the process of privilege escalation on a Linux system that has been compromised. The latest version totals eleven scripts. From enumeration to exploit suggestion to exploit deployment. RootHelper ensures you have access to the best tools for the job.

The credits for the scripts it fetches go to their original authors.

Update

Latest update has added a brand new Helper script. Details below.

RootHelper now supports command line arguments/flags.

The -q or --quiet flag supresses the usage print function on execution. Therefore you can now simply pass -q and be taken directly to the menu.

The -f or --fast flag immediately starts the execution of the script's download option. If time is of the essence the -f flag will hurry things along.

Latest Helper Scripts

The latest addition to the scripts available through RootHelper is rootend.py. It's a python3 implementation that automatesenumeration and privilege escalation operations.

RedGhost Is from now on available with RootHelper, it's a Linux post-exploitation framework and payload generator.

Linux Smart Enumeration Is available with RootHelper. It's a tool based on LinEnum but with a heavy focus on the privilege escalation aspect that enumeration tools provide.

SBD or Static Binary Deployer has been added to the tools available for download with RootHelper. For details on this utility find my repo here

Auto-Root-Exploit Is now available through RootHelper.

BashArk; a post-exploitation tool. Is now available for download with RootHelper.

A new version of Linux Exploit Suggester has been released. It is an updated version based on the old one by PenturaLabs. The author of this tool and all others available through RootHelper are accredited for their excellent work below.

Priv-Esc scripts

LinEnum

Shellscript that enumerates the system configuration.

Linux Smart Enumeration

LinEnum fork with a heavy focus on privilege escalation.

unix-privesc-check 

Shellscript that enumerates the system configuration and runs some privilege escalation checks as well.

linuxprivchecker

A python implementation to suggest exploits particular to the system that's been compromised.

Linux_Exploit_Suggester

A perl script that that does the same as the one mentioned above.

SBD

SBD Makes it possible to deploy static binaries of common (and less common) Linux utilities that might otherwise be unavailable.

Auto-Root-Exploit

Auto-Root-Exploit is a shell script that downloads and executes all known publically available exploits from Exploit-DB for the system and kernel version you specify via the tool's command-line arguments.

BashArk

BashArk is post exploitation tool written in Bash.

Firmwalker

Shellscript that gathers useful information by searching the mounted firmware filesystem. For things such as SSL and web server related files, config files, passwords, common binaries and more.

RedGhost

Linux post exploitation framework designed to assist in persistence, reconnaissance, privilege escalation and leaving no trace.

rootend

Rootend automates enumeration and privilege escalation operations by targetting a wide range of potential exploitation catagories. It does so by looking for SUID bit enabled binaries. Weak permissions on security critical components, finding PHP Configuration files and much more.

Usage

To use the script you will need to get it on the system you've compromised with utilities such as git or wget depending on what is available to you on that particular system. From there you need to make it executable with chmod +x roothelper.sh After which run it and it will show you the options available and an informational message regarding the options. For clarity i have posted it below as well.

The 'Help' option displays this informational message.

The 'Download' option fetches the relevant files and places them in the /tmp/ directory.

The option 'Download and unzip' downloads all files and extracts the contents of zip archives to their individual subdirectories respectively, please
note; if the 'mkdir' command is unavailable however, the operation will not succeed and the 'Download' option should be used instead

The 'Clean up' option removes all downloaded files and 'Quit' exits roothelper.

Acknowledgements

Special thanks to DiegoTreitos for his efforts in optimizing RootHelper's source code.

Credits for scripts RootHelper fetches go to their original authors.

rootend by nickvourd and Maldevel from TwelveSec.

RedGhost by d4rk007

linux-smart-enumeration by DiegoTreitos

LinEnum by RebootUser

Firmwalker by Craigz28

Auto-Root-Exploit by nilotpalbiswas

BashArk by TheSecondSun

Linux Priv Checker by SecuritySift

Linux Exploit Suggester by Jondonas

Unix Priv-Esc Check by Pentestmonkey

相关阅读

相关文章

相关问答

相关文档