In addition to Weibo, there is also WeChat
Please pay attention
WeChat public account
Shulou
2025-02-22 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >
Share
Shulou(Shulou.com)05/31 Report--
Editor to share with you how to use unix-privesc-check, a tool for rapid detection of Unix/Linux loopholes. I hope you will get something after reading this article. Let's discuss it together.
Unix-privesc-check, a fast detection tool for lifting vulnerabilities in Unix/Linux
Unix-privesc-check is a vulnerability detection tool that comes with Kali Linux. It is an Shell file that detects misconfigurations on your system to find vulnerabilities that can be used to elevate rights. The tool is suitable for scenarios such as security audit, penetration testing and system maintenance. It can detect the read and write permissions of all kinds of files related to permissions, such as authentication-related files, important configuration files, exchange files, cron job files, device files, other users' home directories, files being executed, and so on. If a vulnerability is found that can be exploited, a prompt warning is given.
Unix-privesc-check does not detect the potential of all claims vulnerabilities. It only detects quickly and gives suggestions related to lifting vulnerabilities in a concise way, which greatly reduces the amount of boring work of users in file rights detection.
(1) upload the unix-privesc-check to the target host or directly on the local machine.
(2) execute the following command to detect vulnerabilities.
Unix-privesc-check standard
After reading this article, I believe you have a certain understanding of "how to use unix-privesc-check, a tool for rapid detection of Unix/Linux lifting vulnerabilities". If you want to know more about it, you are welcome to follow the industry information channel. Thank you for reading!
Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.
Views: 0
*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.
Continue with the installation of the previous hadoop.First, install zookooper1. Decompress zookoope
"Every 5-10 years, there's a rare product, a really special, very unusual product that's the most un
© 2024 shulou.com SLNews company. All rights reserved.