zoukankan      html  css  js  c++  java
  • linux提权辅助工具(二):linux-exploit-suggester-2.pl

    来自:https://github.com/jondonas/linux-exploit-suggester-2/blob/master/linux-exploit-suggester-2.pl

    #!/usr/bin/perl
    use strict;
    use warnings;
    use Getopt::Std;
    
    our $VERSION = '1.1';
    
    my %opts;
    getopt( 'k,h', \%opts );
    usage() if exists $opts{h};
    
    my ( $khost, $is_partial ) = get_kernel();
    print "
    e[00;33m  #############################e[00m
    ";
    print "e[00;31m    Linux Exploit Suggester 2e[00m
    ";
    print "e[00;33m  #############################e[00m
    ";
    print "
      Local Kernel: $khost
    ";
    
    my %exploits = get_exploits();
    print '  Searching among ' . scalar keys(%exploits) . " exploits...
    
    ";
    print "  e[00;35mPossible Exploits:e[00m
    ";
    
    EXPLOIT:
    foreach my $key ( sort keys %exploits ) {
        foreach my $kernel ( @{ $exploits{$key}{vuln} } ) {
    
            if (     $khost eq $kernel
                  or ( $is_partial and index($kernel,$khost) == 0 )
            ) {
                print "e[00;33m[e[00me[00;31m+e[00me[00;33m]e[00m ";
                print "e[00;33m$keye[00m";
                print " e[00;33m($kernel)e[00m" if $is_partial;
    
                my $alt = $exploits{$key}{alt};
                my $cve = $exploits{$key}{cve};
                my $mlw = $exploits{$key}{mil};
                if ( $alt or $cve ) {
                    print "
    ";
                }
                if ( $alt ) { print "     Alt: $alt "; }
                if ( $cve ) { print "     CVE-$cve"; }
                if ( $mlw ) { print "
         Source: $mlw"; }
                print "
    ";
                next EXPLOIT;
            }
        }
    }
    print "
    ";
    exit;
    
    
    ######################
    ## extra functions  ##
    ######################
    
    sub get_kernel {
        my $khost = '';
    
        if ( exists $opts{k} ) {
            $khost = $opts{k};
        }
        else {
            $khost = `uname -r |cut -d"-" -f1`;
            chomp $khost;
        }
    
        # partial kernels might be provided by the user,
        # such as '2.4' or '2.6.'
        my $is_partial = $khost =~ /^d+.d+.d?/ ? 0 : 1;
        return ( $khost, $is_partial );
    }
    
    sub usage {
        print <<"EOUSAGE";
    Linux Exploit Suggester $VERSION
    Usage: 	$0  [-h] [-k kernel]
    
    [-h] help (this message)
    [-k] kernel number eg. 2.6.28
    
    You can also provide a partial kernel version (eg. 2.4)
    to see all exploits available.
    
    EOUSAGE
    }
    
    sub get_exploits {
      return (
        'w00t' => {
            vuln => [
                '2.4.10', '2.4.16', '2.4.17', '2.4.18',
                '2.4.19', '2.4.20', '2.4.21',
            ]
        },
        'brk' => {
            vuln => [ '2.4.10', '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ],
        },
        'ave' => { vuln => [ '2.4.19', '2.4.20' ] },
    
        'elflbl' => {
            vuln => ['2.4.29'],
            mil  => 'http://www.exploit-db.com/exploits/744/',
        },
    
        'elfdump'      => { vuln => ['2.4.27'] },
        'elfcd'        => { vuln => ['2.6.12'] },
        'expand_stack' => { vuln => ['2.4.29'] },
    
        'h00lyshit' => {
            vuln => [
                '2.6.8',  '2.6.10', '2.6.11', '2.6.12',
                '2.6.13', '2.6.14', '2.6.15', '2.6.16',
            ],
            cve => '2006-3626',
            mil => 'http://www.exploit-db.com/exploits/2013/',
        },
    
        'kdump' => { vuln => ['2.6.13'] },
        'km2'   => { vuln => [ '2.4.18', '2.4.22' ] },
        'krad' =>
          { vuln => [ '2.6.5', '2.6.7', '2.6.8', '2.6.9', '2.6.10', '2.6.11' ] },
    
        'krad3' => {
            vuln => [ '2.6.5', '2.6.7', '2.6.8', '2.6.9', '2.6.10', '2.6.11' ],
            mil => 'http://exploit-db.com/exploits/1397',
        },
    
        'local26' => { vuln => ['2.6.13'] },
        'loko'    => { vuln => [ '2.4.22', '2.4.23', '2.4.24' ] },
    
        'mremap_pte' => {
            vuln => [ '2.4.20', '2.2.24', '2.4.25', '2.4.26', '2.4.27' ],
            mil => 'http://www.exploit-db.com/exploits/160/',
        },
    
        'newlocal' => { vuln => [ '2.4.17', '2.4.19' ] },
        'ong_bak'  => { vuln => ['2.6.5'] },
        'ptrace' =>
          { vuln => [ '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ] },
        'ptrace_kmod' => {
            vuln => [ '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ],
            cve  => '2007-4573',
        },
        'ptrace_kmod2' => {
            vuln => [
                '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31',
                '2.6.32', '2.6.33', '2.6.34',
            ],
            alt => 'ia32syscall,robert_you_suck',
            mil => 'http://www.exploit-db.com/exploits/15023/',
            cve => '2010-3301',
        },
        'ptrace24' => { vuln => ['2.4.9'] },
        'pwned'    => { vuln => ['2.6.11'] },
        'py2'      => { vuln => [ '2.6.9', '2.6.17', '2.6.15', '2.6.13' ] },
        'raptor_prctl' => {
            vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
            cve  => '2006-2451',
            mil => 'http://www.exploit-db.com/exploits/2031/',
        },
        'prctl' => {
            vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
            mil => 'http://www.exploit-db.com/exploits/2004/',
        },
        'prctl2' => {
            vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
            mil => 'http://www.exploit-db.com/exploits/2005/',
        },
        'prctl3' => {
            vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
            mil => 'http://www.exploit-db.com/exploits/2006/',
        },
        'prctl4' => {
            vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
            mil => 'http://www.exploit-db.com/exploits/2011/',
        },
        'remap'      => { vuln => ['2.4'] },
        'rip'        => { vuln => ['2.2'] },
        'stackgrow2' => { vuln => [ '2.4.29', '2.6.10' ] },
        'uselib24' => {
            vuln => [ '2.6.10', '2.4.17', '2.4.22', '2.4.25', '2.4.27', '2.4.29' ]
        },
        'newsmp'   => { vuln => ['2.6'] },
        'smpracer' => { vuln => ['2.4.29'] },
        'loginx'   => { vuln => ['2.4.22'] },
        'exp.sh'   => { vuln => [ '2.6.9', '2.6.10', '2.6.16', '2.6.13' ] },
        'vmsplice1' => {
            vuln => [
                '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',
                '2.6.23', '2.6.24', '2.6.24.1',
            ],
            alt => 'jessica biel',
            cve => '2008-0600',
            mil => 'http://www.exploit-db.com/exploits/5092',
        },
        'vmsplice2' => {
            vuln => [ '2.6.23', '2.6.24' ],
            alt  => 'diane_lane',
            cve  => '2008-0600',
            mil  => 'http://www.exploit-db.com/exploits/5093',
        },
        'vconsole' => {
            vuln => ['2.6'],
            cve  => '2009-1046',
        },
        'sctp' => {
            vuln => ['2.6.26'],
            cve  => '2008-4113',
        },
        'ftrex' => {
            vuln => [
                '2.6.11', '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16',
                '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',
            ],
            cve => '2008-4210',
            mil => 'http://www.exploit-db.com/exploits/6851',
        },
        'exit_notify' => {
            vuln => [ '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29' ],
            mil => 'http://www.exploit-db.com/exploits/8369',
        },
        'udev' => {
            vuln => [ '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29' ],
            alt  => 'udev <1.4.1',
            cve  => '2009-1185',
            mil => 'http://www.exploit-db.com/exploits/8478',
        },
    
        'sock_sendpage2' => {
            vuln => [
                '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',
                '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',
                '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',
                '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',
                '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',
                '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.0',  '2.6.1',
                '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',  '2.6.7',
                '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12', '2.6.13',
                '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18', '2.6.19',
                '2.6.20', '2.6.21', '2.6.22', '2.6.23', '2.6.24', '2.6.25',
                '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30',
            ],
            alt => 'proto_ops',
            cve => '2009-2692',
            mil => 'http://www.exploit-db.com/exploits/9436',
        },
    
        'sock_sendpage' => {
            vuln => [
                '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',
                '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',
                '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',
                '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',
                '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',
                '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.0',  '2.6.1',
                '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',  '2.6.7',
                '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12', '2.6.13',
                '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18', '2.6.19',
                '2.6.20', '2.6.21', '2.6.22', '2.6.23', '2.6.24', '2.6.25',
                '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30',
            ],
            alt => 'wunderbar_emporium',
            cve => '2009-2692',
            mil => 'http://www.exploit-db.com/exploits/9435',
        },
        'udp_sendmsg_32bit' => {
            vuln => [
                '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',
                '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12',
                '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18',
                '2.6.19',
            ],
            cve => '2009-2698',
            mil =>
              'http://downloads.securityfocus.com/vulnerabilities/exploits/36108.c',
        },
        'pipe.c_32bit' => {
            vuln => [
                '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',
                '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',
                '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',
                '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',
                '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',
                '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.15', '2.6.16',
                '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',
                '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28',
                '2.6.29', '2.6.30', '2.6.31',
            ],
            cve => '2009-3547',
            mil =>
              'http://www.securityfocus.com/data/vulnerabilities/exploits/36901-1.c',
        },
        'do_pages_move' => {
            vuln => [
                '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
                '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
                '2.6.30', '2.6.31',
            ],
            alt => 'sieve',
            cve => '2010-0415',
            mil => 'Spenders Enlightenment',
        },
        'reiserfs' => {
            vuln => [
                '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
                '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
                '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34',
            ],
            cve => '2010-1146',
            mil => 'http://www.exploit-db.com/exploits/12130/',
        },
        'can_bcm' => {
            vuln => [
                '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
                '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
                '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
                '2.6.36',
            ],
            cve => '2010-2959',
            mil => 'http://www.exploit-db.com/exploits/14814/',
        },
        'rds' => {
            vuln => [
                '2.6.30', '2.6.31', '2.6.32', '2.6.33',
                '2.6.34', '2.6.35', '2.6.36',
            ],
            mil => 'http://www.exploit-db.com/exploits/15285/',
            cve => '2010-3904',
        },
        'half_nelson' => {
            vuln => [
                '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
                '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
                '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
                '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
                '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
                '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
                '2.6.36',
            ],
            alt => 'econet',
            cve => '2010-3848',
            mil => 'http://www.exploit-db.com/exploits/6851',
        },
        'half_nelson1' => {
            vuln => [
                '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
                '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
                '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
                '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
                '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
                '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
                '2.6.36',
            ],
            alt => 'econet',
            cve => '2010-3848',
            mil => 'http://www.exploit-db.com/exploits/17787/',
        },
        'half_nelson2' => {
            vuln => [
                '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
                '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
                '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
                '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
                '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
                '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
                '2.6.36',
            ],
            alt => 'econet',
            cve => '2010-3850',
            mil => 'http://www.exploit-db.com/exploits/17787/',
        },
        'half_nelson3' => {
            vuln => [
                '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
                '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
                '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
                '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
                '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
                '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
                '2.6.36',
            ],
            alt => 'econet',
            cve => '2010-4073',
            mil => 'http://www.exploit-db.com/exploits/17787/',
        },
        'caps_to_root' => {
            vuln => [ '2.6.34', '2.6.35', '2.6.36' ],
            cve  => 'n/a',
            mil => 'http://www.exploit-db.com/exploits/15916/',
        },
        'american-sign-language' => {
            vuln => [
                '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
                '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
                '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
                '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
                '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
                '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
                '2.6.36',
            ],
            cve => '2010-4347',
            mil => 'http://www.securityfocus.com/bid/45408/',
        },
        'pktcdvd' => {
            vuln => [
                '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
                '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
                '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
                '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
                '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
                '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
                '2.6.36',
            ],
            cve => '2010-3437',
            mil => 'http://www.exploit-db.com/exploits/15150/',
        },
        'video4linux' => {
            vuln => [
                '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
                '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
                '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
                '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
                '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
                '2.6.30', '2.6.31', '2.6.32', '2.6.33',
            ],
            cve => '2010-3081',
            mil => 'http://www.exploit-db.com/exploits/15024/',
        },
        'memodipper' => {
            vuln => [
                '2.6.39', '3.0.0', '3.0.1', '3.0.2', '3.0.3', '3.0.4',
                '3.0.5',  '3.0.6', '3.1.0',
            ],
            cve => '2012-0056',
            mil => 'http://www.exploit-db.com/exploits/18411/',
        },
        'semtex' => {
            vuln => [
                '2.6.37', '2.6.38', '2.6.39', '3.0.0', '3.0.1', '3.0.2',
                '3.0.3',  '3.0.4',  '3.0.5',  '3.0.6', '3.1.0',
            ],
            cve => '2013-2094',
            mil => 'http://www.exploit-db.com/download/25444/‎',
        },
        'perf_swevent' => {
            vuln => [
                '3.0.0', '3.0.1', '3.0.2', '3.0.3', '3.0.4', '3.0.5',
                '3.0.6', '3.1.0', '3.2.0', '3.3.0', '3.4.0', '3.4.1',
                '3.4.2', '3.4.3', '3.4.4', '3.4.5', '3.4.6', '3.4.8',
                '3.4.9', '3.5.0', '3.6.0', '3.7.0', '3.8.0', '3.8.1',
                '3.8.2', '3.8.3', '3.8.4', '3.8.5', '3.8.6', '3.8.7',
                '3.8.8', '3.8.9',
            ],
            cve => '2013-2094',
            mil => 'http://www.exploit-db.com/download/26131',
        },
        'msr' => {
            vuln => [
                '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
                '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.27', '2.6.28',
                '2.6.29', '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34',
                '2.6.35', '2.6.36', '2.6.37', '2.6.38', '2.6.39', '3.0.0',
                '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',  '3.0.5',  '3.0.6',
                '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',  '3.5.0',  '3.6.0',
                '3.7.0',  '3.7.6',
            ],
            cve => '2013-0268',
            mil => 'http://www.exploit-db.com/exploits/27297/',
        },
        'timeoutpwn' => {
            vuln => [
                '3.4.0',  '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.9', 
                '3.9.0',  '3.10.0', '3.11.0', '3.12.0', '3.13.0', '3.4.0',
                '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.5',  '3.8.6',  
                '3.8.9',  '3.9.0',  '3.9.6',  '3.10.0', '3.10.6', '3.11.0',
                '3.12.0', '3.13.0', '3.13.1'
            ],
            cve => '2014-0038',
            mil => 'http://www.exploit-db.com/exploits/31346/',
        },
        'rawmodePTY' => {
            vuln => [
                '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35', '2.6.36',
                '2.6.37', '2.6.38', '2.6.39', '3.14.0', '3.15.0'
            ],
            cve => '2014-0196',
            mil => 'http://packetstormsecurity.com/files/download/126603/cve-2014-0196-md.c',
        },
        'overlayfs' => {
            vuln => [
                '3.13.0', '3.16.0', '3.19.0'
            ],
            cve => '2015-8660',
            mil => 'https://www.exploit-db.com/exploits/39230/',
        },
        'pp_key' => {
            vuln => [
                '3.4.0',  '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.1',  
                '3.8.2',  '3.8.3',  '3.8.4',  '3.8.5',  '3.8.6',  '3.8.7',  
                '3.8.8',  '3.8.9',  '3.9.0',  '3.9.6',  '3.10.0', '3.10.6', 
                '3.11.0', '3.12.0', '3.13.0', '3.13.1'
            ],
            cve => '2016-0728',
            mil => 'https://www.exploit-db.com/exploits/39277/',
        },
        'dirty_cow' => {
            vuln => [
                '2.6.22', '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27', 
                '2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31', '2.6.32', 
                '2.6.33', '2.6.34', '2.6.35', '2.6.36', '2.6.37', '2.6.38', 
                '2.6.39', '3.0.0',  '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',  
                '3.0.5',  '3.0.6',  '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',  
                '3.5.0',  '3.6.0',  '3.7.0',  '3.7.6',  '3.8.0',  '3.9.0', 
                '3.10.0', '3.11.0', '3.12.0', '3.13.0', '3.14.0', '3.15.0', 
                '3.16.0', '3.17.0', '3.18.0', '3.19.0', '4.0.0',  '4.1.0', 
                '4.2.0',  '4.3.0',  '4.4.0',  '4.5.0',  '4.6.0',  '4.7.0'
            ],
            cve => '2016-5195',
            mil => 'https://www.exploit-db.com/exploits/40616/',
        },
        'af_packet' => {
            vuln => ['4.4.0' ],
            cve => '2016-8655',
            mil => 'https://www.exploit-db.com/exploits/40871/',
        },
        'packet_set_ring' => {
            vuln => ['4.8.0' ],
            cve => '2017-7308',
            mil => 'https://www.exploit-db.com/exploits/41994/',
        },
        'clone_newuser' => {
            vuln => [
                '3.3.5', '3.3.4', '3.3.2', '3.2.13', '3.2.9', '3.2.1', 
                '3.1.8', '3.0.5', '3.0.4', '3.0.2', '3.0.1', '3.2', '3.0.1', '3.0'
            ],
            cve => 'NA',
            mil => 'https://www.exploit-db.com/exploits/38390/',
        },
        'get_rekt' => {
            vuln => [
                '4.4.0', '4.8.0', '4.10.0', '4.13.0'
            ],
            cve => '2017-16695',
            mil => 'https://www.exploit-db.com/exploits/45010',
        },
        'exploit_x' => {
            vuln => [
                '2.6.22', '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27',
                '2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31', '2.6.32',
                '2.6.33', '2.6.34', '2.6.35', '2.6.36', '2.6.37', '2.6.38',
                '2.6.39', '3.0.0',  '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',
                '3.0.5',  '3.0.6',  '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',
                '3.5.0',  '3.6.0',  '3.7.0',  '3.7.6',  '3.8.0',  '3.9.0',
                '3.10.0', '3.11.0', '3.12.0', '3.13.0', '3.14.0', '3.15.0',
                '3.16.0', '3.17.0', '3.18.0', '3.19.0', '4.0.0',  '4.1.0',
                '4.2.0',  '4.3.0',  '4.4.0',  '4.5.0',  '4.6.0',  '4.7.0'
            ],
            cve => '2018-14665',
            mil => 'https://www.exploit-db.com/exploits/45697',
        },
      );
    }
    
    __END__
    =head1 NAME
    
    linux_exploit_suggester-2.pl - A local exploit suggester for linux
    
    =head1 DESCRIPTION
    
    This perl script will enumerate the possible exploits available for a given kernel version
    
    =head1 USAGE
        $ Local_Exploit_Checker [-h] [-k kernel]
    
        [-h] help
    
    You can also provide a partial kernel version (eg. 2.4)
    to see all exploits available.
    
    =head1 AUTHOR
    
    Jonathan Donas (c) 2018
    
    =head1 CHANGELOG
    31-12-2018 added exploit_x
    
    30-11-2018 added get_rekt
    
    15-04-2018 added clone_newuser
    
    23-11-2017 added packet_set_ring
    
    05-11-2017 added af_packet
    
    28-04-2017 added dirty_cow
    
    25-07-2016 added overlayfs and pp_key
    
    =cut
    
    =head1 LICENSE
    
     Linux Exploit Suggester 2
    
     This program is free software; you can redistribute it and/or modify
     it under the terms of the GNU General Public License as published by
     the Free Software Foundation; either version 2 of the License, or
     (at your option) any later version.
    
     This program is distributed in the hope that it will be useful,
     but WITHOUT ANY WARRANTY; without even the implied warranty of
     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
     GNU General Public License for more details.
            
     You should have received a copy of the GNU General Public License along
     with this program; if not, write to the Free Software Foundation, Inc.,
     51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.
    
    =cut
  • 相关阅读:
    【EF学习笔记05】----------操作内存中的数据
    【EF学习笔记05】----------DBContext基础查询
    【EF学习笔记04】----------EF简单增删改查
    【EF学习笔记03】----------使用原生Sql语句
    EntityFramework追踪Sql语句
    博客园自定义样式(标题 h1 h2 h3)
    SQLserver2012 修改数据库架构
    IIS7 配置URL_REWRITE
    maven项目使用mybatis-generator自动生成代码
    myeclipse关闭properties文件自动转义
  • 原文地址:https://www.cnblogs.com/zlgxzswjy/p/10249197.html
Copyright © 2011-2022 走看看