Tools which will make your life easier in a search for privilege escalation paths
Name | Unix | Windows | Solaris | MacOS |
---|---|---|---|---|
PEASS | sh | exe and bat | - | sh |
BeRoot | py | exe | - | py |
Unix privesc check | sh | - | - | - |
Windows Exploit Suggester | - | systeminfo | - | - |
Linux Exploit Suggester | perl | - | - | - |
Solaris Exploit Suggester | - | - | showrev | - |
LinEnum | sh | - | - | - |
Nishang | - | ps | - | - |
SharpUp | - | exe | - | - |
Seatbelt | - | exe | - | - |
JAWS | - | ps | - | - |
Watson | - | exe | - | - |
PowerUp | - | ps | - | - |
srvcheck3 | - | exe | - | - |
PEASS - Privilege Escalation Awesome Scripts SUITE
Link: https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/blob/master/README.md
These tools search for possible local privilege escalation paths that you could exploit and print them to you with nice colors so you can recognize the misconfigurations easily.
BeRoot Project is a post exploitation tool to check common misconfigurations to find a way to escalate our privilege. It has been added to the pupy project as a post exploitation module (so it will be executed in memory without touching the disk).
Link: https://github.com/AlessandroZ/BeRoot
Windows pre compiled versions: https://github.com/AlessandroZ/BeRoot/releases
Linux: https://github.com/AlessandroZ/BeRoot/tree/master/Linux
Unix-privesc-checker is a script that runs on Unix systems (tested on Solaris 9, HPUX 11, Various Linuxes, FreeBSD 6.2). It tries to find misconfigurations that could allow local unprivileged users to escalate privileges to other users or to access local apps (e.g. databases).