博客
关于我
强烈建议你试试无所不能的chatGPT,快点击我
linux提权辅助脚本(更新exp列表)
阅读量:6517 次
发布时间:2019-06-24

本文共 20427 字,大约阅读时间需要 68 分钟。

#!/usr/bin/perluse strict;use warnings;use Getopt::Std;our $VERSION = '1.0';my %opts;getopt( 'k,h', \%opts );usage() if exists $opts{h};my ( $khost, $is_partial ) = get_kernel();print "\nKernel local: $khost\n\n";my %exploits = get_exploits();print 'Searching among ' . scalar keys(%exploits) . " exploits...\n\n";print "Possible Exploits:\n";EXPLOIT:foreach my $key ( sort keys %exploits ) {    foreach my $kernel ( @{ $exploits{$key}{vuln} } ) {        if (     $khost eq $kernel              or ( $is_partial and index($kernel,$khost) == 0 )        ) {            print "[+] $key";            print " ($kernel)" if $is_partial;            my $alt = $exploits{$key}{alt};            my $cve = $exploits{$key}{cve};            my $mlw = $exploits{$key}{mil};            if ( $alt or $cve ) {                print "\n";            }            if ( $alt ) { print "   Alt: $alt "; }            if ( $cve ) { print "   CVE-$cve"; }            if ( $mlw ) { print "\n   Source: $mlw"; }            print "\n";            next EXPLOIT;        }    }}exit;######################## extra functions  ########################sub get_kernel {    my $khost = '';    if ( exists $opts{k} ) {        $khost = $opts{k};    }    else {        $khost = `uname -r |cut -d"-" -f1`;        chomp $khost;    }    # partial kernels might be provided by the user,    # such as '2.4' or '2.6.'    my $is_partial = $khost =~ /^\d+\.\d+\.?\d?/ ? 0 : 1;    if ( $is_partial and substr($khost,-1) ne '.' ) {        $khost .= '.';    }    return ( $khost, $is_partial );}sub usage {    print <<"EOUSAGE";Linux Exploit Suggester $VERSIONUsage: \t$0  [-h] [-k kernel][-h] help (this message)[-k] kernel number eg. 2.6.28You can also provide a partial kernel version (eg. 2.4)to see all exploits available.EOUSAGE}sub get_exploits {  return (    'w00t' => {        vuln => [            '2.4.10', '2.4.16', '2.4.17', '2.4.18',            '2.4.19', '2.4.20', '2.4.21',        ]    },    'brk' => {        vuln => [ '2.4.10', '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ],    },    'ave' => { vuln => [ '2.4.19', '2.4.20' ] },    'elflbl' => {        vuln => ['2.4.29'],        mil  => 'http://www.exploit-db.com/exploits/744/',    },    'elfdump'      => { vuln => ['2.4.27'] },    'elfcd'        => { vuln => ['2.6.12'] },    'expand_stack' => { vuln => ['2.4.29'] },    'h00lyshit' => {        vuln => [            '2.6.8',  '2.6.10', '2.6.11', '2.6.12',            '2.6.13', '2.6.14', '2.6.15', '2.6.16',        ],        cve => '2006-3626',        mil => 'http://www.exploit-db.com/exploits/2013/',    },    'kdump' => { vuln => ['2.6.13'] },    'km2'   => { vuln => [ '2.4.18', '2.4.22' ] },    'krad' =>      { vuln => [ '2.6.5', '2.6.7', '2.6.8', '2.6.9', '2.6.10', '2.6.11' ] },    'krad3' => {        vuln => [ '2.6.5', '2.6.7', '2.6.8', '2.6.9', '2.6.10', '2.6.11' ],        mil => 'http://exploit-db.com/exploits/1397',    },    'local26' => { vuln => ['2.6.13'] },    'loko'    => { vuln => [ '2.4.22', '2.4.23', '2.4.24' ] },    'mremap_pte' => {        vuln => [ '2.4.20', '2.2.24', '2.4.25', '2.4.26', '2.4.27' ],        mil => 'http://www.exploit-db.com/exploits/160/',    },    'newlocal' => { vuln => [ '2.4.17', '2.4.19' ] },    'ong_bak'  => { vuln => ['2.6.5'] },    'ptrace' =>      { vuln => [ '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ] },    'ptrace_kmod' => {        vuln => [ '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ],        cve  => '2007-4573',    },    'ptrace_kmod2' => {        vuln => [            '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31',            '2.6.32', '2.6.33', '2.6.34',        ],        alt => 'ia32syscall,robert_you_suck',        mil => 'http://www.exploit-db.com/exploits/15023/',        cve => '2010-3301',    },    'ptrace24' => { vuln => ['2.4.9'] },    'pwned'    => { vuln => ['2.6.11'] },    'py2'      => { vuln => [ '2.6.9', '2.6.17', '2.6.15', '2.6.13' ] },    'raptor_prctl' => {        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],        cve  => '2006-2451',        mil => 'http://www.exploit-db.com/exploits/2031/',    },    'prctl' => {        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],        mil => 'http://www.exploit-db.com/exploits/2004/',    },    'prctl2' => {        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],        mil => 'http://www.exploit-db.com/exploits/2005/',    },    'prctl3' => {        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],        mil => 'http://www.exploit-db.com/exploits/2006/',    },    'prctl4' => {        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],        mil => 'http://www.exploit-db.com/exploits/2011/',    },    'remap'      => { vuln => ['2.4.'] },    'rip'        => { vuln => ['2.2.'] },    'stackgrow2' => { vuln => [ '2.4.29', '2.6.10' ] },    'uselib24' => {        vuln => [ '2.6.10', '2.4.17', '2.4.22', '2.4.25', '2.4.27', '2.4.29' ]    },    'newsmp'   => { vuln => ['2.6.'] },    'smpracer' => { vuln => ['2.4.29'] },    'loginx'   => { vuln => ['2.4.22'] },    'exp.sh'   => { vuln => [ '2.6.9', '2.6.10', '2.6.16', '2.6.13' ] },    'vmsplice1' => {        vuln => [            '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',            '2.6.23', '2.6.24', '2.6.24.1',        ],        alt => 'jessica biel',        cve => '2008-0600',        mil => 'http://www.exploit-db.com/exploits/5092',    },    'vmsplice2' => {        vuln => [ '2.6.23', '2.6.24' ],        alt  => 'diane_lane',        cve  => '2008-0600',        mil  => 'http://www.exploit-db.com/exploits/5093',    },    'vconsole' => {        vuln => ['2.6.'],        cve  => '2009-1046',    },    'sctp' => {        vuln => ['2.6.26'],        cve  => '2008-4113',    },    'ftrex' => {        vuln => [            '2.6.11', '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16',            '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',        ],        cve => '2008-4210',        mil => 'http://www.exploit-db.com/exploits/6851',    },    'exit_notify' => {        vuln => [ '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29' ],        mil => 'http://www.exploit-db.com/exploits/8369',    },    'udev' => {        vuln => [ '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29' ],        alt  => 'udev <1.4.1',        cve  => '2009-1185',        mil => 'http://www.exploit-db.com/exploits/8478',    },    'sock_sendpage2' => {        vuln => [            '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',            '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',            '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',            '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',            '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',            '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.0',  '2.6.1',            '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',  '2.6.7',            '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12', '2.6.13',            '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18', '2.6.19',            '2.6.20', '2.6.21', '2.6.22', '2.6.23', '2.6.24', '2.6.25',            '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30',        ],        alt => 'proto_ops',        cve => '2009-2692',        mil => 'http://www.exploit-db.com/exploits/9436',    },    'sock_sendpage' => {        vuln => [            '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',            '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',            '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',            '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',            '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',            '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.0',  '2.6.1',            '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',  '2.6.7',            '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12', '2.6.13',            '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18', '2.6.19',            '2.6.20', '2.6.21', '2.6.22', '2.6.23', '2.6.24', '2.6.25',            '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30',        ],        alt => 'wunderbar_emporium',        cve => '2009-2692',        mil => 'http://www.exploit-db.com/exploits/9435',    },    'udp_sendmsg_32bit' => {        vuln => [            '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',            '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12',            '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18',            '2.6.19',        ],        cve => '2009-2698',        mil =>          'http://downloads.securityfocus.com/vulnerabilities/exploits/36108.c',    },    'pipe.c_32bit' => {        vuln => [            '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',            '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',            '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',            '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',            '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',            '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.15', '2.6.16',            '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',            '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28',            '2.6.29', '2.6.30', '2.6.31',        ],        cve => '2009-3547',        mil =>          'http://www.securityfocus.com/data/vulnerabilities/exploits/36901-1.c',    },    'do_pages_move' => {        vuln => [            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',            '2.6.30', '2.6.31',        ],        alt => 'sieve',        cve => '2010-0415',        mil => 'Spenders Enlightenment',    },    'reiserfs' => {        vuln => [            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34',        ],        cve => '2010-1146',        mil => 'http://www.exploit-db.com/exploits/12130/',    },    'can_bcm' => {        vuln => [            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',            '2.6.36',        ],        cve => '2010-2959',        mil => 'http://www.exploit-db.com/exploits/14814/',    },    'rds' => {        vuln => [            '2.6.30', '2.6.31', '2.6.32', '2.6.33',            '2.6.34', '2.6.35', '2.6.36',        ],        mil => 'http://www.exploit-db.com/exploits/15285/',        cve => '2010-3904',    },    'half_nelson' => {        vuln => [            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',            '2.6.36',        ],        alt => 'econet',        cve => '2010-3848',        mil => 'http://www.exploit-db.com/exploits/6851',    },    'half_nelson1' => {        vuln => [            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',            '2.6.36',        ],        alt => 'econet',        cve => '2010-3848',        mil => 'http://www.exploit-db.com/exploits/17787/',    },    'half_nelson2' => {        vuln => [            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',            '2.6.36',        ],        alt => 'econet',        cve => '2010-3850',        mil => 'http://www.exploit-db.com/exploits/17787/',    },    'half_nelson3' => {        vuln => [            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',            '2.6.36',        ],        alt => 'econet',        cve => '2010-4073',        mil => 'http://www.exploit-db.com/exploits/17787/',    },    'caps_to_root' => {        vuln => [ '2.6.34', '2.6.35', '2.6.36' ],        cve  => 'n/a',        mil => 'http://www.exploit-db.com/exploits/15916/',    },    'american-sign-language' => {        vuln => [            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',            '2.6.36',        ],        cve => '2010-4347',        mil => 'http://www.securityfocus.com/bid/45408/',    },    'pktcdvd' => {        vuln => [            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',            '2.6.36',        ],        cve => '2010-3437',        mil => 'http://www.exploit-db.com/exploits/15150/',    },    'video4linux' => {        vuln => [            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',            '2.6.30', '2.6.31', '2.6.32', '2.6.33',        ],        cve => '2010-3081',        mil => 'http://www.exploit-db.com/exploits/15024/',    },    'memodipper' => {        vuln => [            '2.6.39', '3.0.0', '3.0.1', '3.0.2', '3.0.3', '3.0.4',            '3.0.5',  '3.0.6', '3.1.0',        ],        cve => '2012-0056',        mil => 'http://www.exploit-db.com/exploits/18411/',    },    'semtex' => {        vuln => [            '2.6.37', '2.6.38', '2.6.39', '3.0.0', '3.0.1', '3.0.2',            '3.0.3',  '3.0.4',  '3.0.5',  '3.0.6', '3.1.0',        ],        cve => '2013-2094',        mil => 'http://www.exploit-db.com/download/25444/‎',    },    'perf_swevent' => {        vuln => [            '3.0.0', '3.0.1', '3.0.2', '3.0.3', '3.0.4', '3.0.5',            '3.0.6', '3.1.0', '3.2',   '3.3',   '3.4.0', '3.4.1',            '3.4.2', '3.4.3', '3.4.4', '3.4.5', '3.4.6', '3.4.8',            '3.4.9', '3.5',   '3.6',   '3.7',   '3.8.0', '3.8.1',            '3.8.2', '3.8.3', '3.8.4', '3.8.5', '3.8.6', '3.8.7',            '3.8.8', '3.8.9',        ],        cve => '2013-2094',        mil => 'http://www.exploit-db.com/download/26131',    },    'perf_swevent_init' => {        vuln =>[            '3.2.0','3.3','3.4.0', '3.4.1',            '3.4.2', '3.4.3', '3.4.4', '3.4.5', '3.4.6', '3.4.8',            '3.4.9','3.5.0',            ],        cve => '2013-2094',        mil => 'https://www.exploit-db.com/exploits/33589/',    },    'msr' => {        vuln => [            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.27', '2.6.28',            '2.6.29', '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34',            '2.6.35', '2.6.36', '2.6.37', '2.6.38', '2.6.39', '3.0.0',            '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',  '3.0.5',  '3.0.6',            '3.1.0',  '3.2',    '3.3',    '3.4',    '3.5',    '3.6',            '3.7.0',  '3.7.6',        ],        cve => '2013-0268',        mil => 'http://www.exploit-db.com/exploits/27297/',    },    'timeoutpwn' => {        vuln => [            '3.4',  '3.5',    '3.6',    '3.7',   '3.8',   '3.8.9', '3.9', '3.10', 	        '3.11', '3.12',   '3.13',   '3.4.0', '3.5.0', '3.6.0', '3.7.0',            '3.8.0','3.8.5',  '3.8.6',  '3.8.9', '3.9.0', '3.9.6',             '3.10.0','3.10.6', '3.11.0','3.12.0','3.13.0','3.13.1'        ],        cve => '2014-0038',        mil => 'http://www.exploit-db.com/exploits/31346/',    },    'rawmodePTY' => {        vuln => [             '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35', '2.6.36', '2.6.37',             '2.6.38', '2.6.39', '3.14', '3.15'        ],        cve => '2014-0196',        mil => 'http://packetstormsecurity.com/files/download/126603/cve-2014-0196-md.c',    },    'netfilter' => {        vuln => [              '4.4.0',           ],        cve => 'N/A',        mil => 'https://www.exploit-db.com/exploits/40049/',    },    'REFCOUNT' => {        vuln => ['4.4.1'],        cve  => '2016-0728',        mil  => 'https://www.exploit-db.com/exploits/40003/',    },    'overlayfs' => {        vuln => [            '3.13.0','3.13.1','3.13.2','3.13.3','3.13.4','3.13.5','3.13.6',            '3.13.7','3.13.8','3.13.9','3.13.10','3.13.11',            '3.14.0','3.14.68','3.14.5','3.14.71','3.14.74','3.14.75',            '3.15.0','3.16.0','3.16.36',            '3.17.0','3.18.0','3.18.38','3.18.39',            '3.19.0',            ],        cve  => '2015-1328',        mil  => 'https://www.exploit-db.com/exploits/37292/',         },    'libfutex' => {        vuln => [            '3.14.5',        ],        cve  => '2014-3153',        mil  => 'https://www.exploit-db.com/exploits/35370/',    },    'RemountFUSE' => {        vuln => ['3.16.0'],        cve  => '2014-5207',        mil  => 'https://www.exploit-db.com/exploits/34923/',    },    'bpf' => {        vuln => ['4.4'],        cve  => '2016-4557',        mil  => 'https://www.exploit-db.com/exploits/39772/',    },     );}__END__=head1 NAMELinux_Exploit_Suggester.pl - A local exploit suggester for linux=head1 DESCRIPTIONThis perl script will enumerate the possible exploits available for a given kernel version=head1 USAGE	$ Local_Exploit_Checker [-h] [-k kernel]	[-h] help	[-k] kernel Eg. 2.6.28 You can also provide a partial kernel version (eg. 2.4)to see all exploits available.=head1 AUTHORAndy (c) 10-07-2009Thanks to Brian for bugfixes, and sploit additions.=head1 CHANGELOG19-04-2014 added cve-2014-0196 and bug fixes (Andy) 05-09-2013 code cleanup/optimizations and partial kernel feature (garu)28-08-2013 added msr driver (Andy)12-06-2013 added perf_swevent (Andy) 23-01-2012 added memodipper (Andy)14-11-2011 bug fix to cut kernel version, plus a few more sploits listed (Brian)=cut=head1 LICENSE Linux Exploit Suggester This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. This program is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License for more details.         You should have received a copy of the GNU General Public License along with this program; if not, write to the Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA. =cut

 测试截图:

转载于:https://www.cnblogs.com/persuit/p/5773074.html

你可能感兴趣的文章
Elixir Ecto: 使用 ExMachina 批量生成测试数据
查看>>
虚拟机类加载机制(读书笔记)
查看>>
PHP学习计划
查看>>
[稀土掘金日报] JavaScript 开发者必备的资源合集
查看>>
Win软件私家珍藏-常用软件工具使用总结
查看>>
iToolkit,推荐我们自己做的一套前端组件
查看>>
Junit源码阅读(一)
查看>>
JavaScript设计模式与开发实践 | 01 - 面向对象的JavaScript
查看>>
捷信达酒店管理系统使用说明
查看>>
使用java api 创建excel内容并发送邮件
查看>>
Unity3d删除无用的美术资源轻量级插件
查看>>
2018天猫双11|这就是阿里云!不止有新技术,更有温暖的社会力量
查看>>
Linux基础命令---umask
查看>>
Nginx 性能优化(学习笔记二十五)
查看>>
Strategy for Python Challenge(01)
查看>>
Spring事务异常回滚,try catch 捕获异常不回滚
查看>>
钢管识别项目1
查看>>
iOS的@try、@catch()
查看>>
中科院院士谭铁牛:人工智能发展需要理性务实
查看>>
真正的开源与人造开源之间的斗争愈演愈烈
查看>>