Network Security Internet Technology Development Database Servers Mobile Phone Android Software Apple Software Computer Software News IT Information

In addition to Weibo, there is also WeChat

Please pay attention

WeChat public account

Shulou

How to use unix-privesc-check, a fast detection tool for Unix/Linux lifting vulnerabilities

2025-02-22 Update From: SLTechnology News&Howtos shulou NAV: SLTechnology News&Howtos > Network Security >

Share

Shulou(Shulou.com)05/31 Report--

Editor to share with you how to use unix-privesc-check, a tool for rapid detection of Unix/Linux loopholes. I hope you will get something after reading this article. Let's discuss it together.

Unix-privesc-check, a fast detection tool for lifting vulnerabilities in Unix/Linux

Unix-privesc-check is a vulnerability detection tool that comes with Kali Linux. It is an Shell file that detects misconfigurations on your system to find vulnerabilities that can be used to elevate rights. The tool is suitable for scenarios such as security audit, penetration testing and system maintenance. It can detect the read and write permissions of all kinds of files related to permissions, such as authentication-related files, important configuration files, exchange files, cron job files, device files, other users' home directories, files being executed, and so on. If a vulnerability is found that can be exploited, a prompt warning is given.

Unix-privesc-check does not detect the potential of all claims vulnerabilities. It only detects quickly and gives suggestions related to lifting vulnerabilities in a concise way, which greatly reduces the amount of boring work of users in file rights detection.

(1) upload the unix-privesc-check to the target host or directly on the local machine.

(2) execute the following command to detect vulnerabilities.

Unix-privesc-check standard

After reading this article, I believe you have a certain understanding of "how to use unix-privesc-check, a tool for rapid detection of Unix/Linux lifting vulnerabilities". If you want to know more about it, you are welcome to follow the industry information channel. Thank you for reading!

Welcome to subscribe "Shulou Technology Information " to get latest news, interesting things and hot topics in the IT industry, and controls the hottest and latest Internet news, technology news and IT industry trends.

Views: 0

*The comments in the above article only represent the author's personal views and do not represent the views and positions of this website. If you have more insights, please feel free to contribute and share.

Share To

Network Security

Wechat

© 2024 shulou.com SLNews company. All rights reserved.

12
Report