2024-07-18 22:14:33 +00:00
# Orodha ya Ukaguzi - Kuinua Haki za Linux
2022-04-28 16:01:33 +00:00
2024-07-18 22:14:33 +00:00
{% hint style="success" %}
Jifunze na fanya mazoezi ya AWS Hacking:< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > [**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > \
Jifunze na fanya mazoezi ya GCP Hacking: < img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > [**HackTricks Training GCP Red Team Expert (GRTE)**< img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > ](https://training.hacktricks.xyz/courses/grte)
2022-04-28 16:01:33 +00:00
2024-07-18 22:14:33 +00:00
< details >
2022-04-28 16:01:33 +00:00
2024-07-18 22:14:33 +00:00
< summary > Support HackTricks< / summary >
2024-01-05 11:06:33 +00:00
2024-07-18 22:14:33 +00:00
* Angalia [**mpango wa usajili** ](https://github.com/sponsors/carlospolop )!
* **Jiunge na** 💬 [**kikundi cha Discord** ](https://discord.gg/hRep4RUj7f ) au [**kikundi cha telegram** ](https://t.me/peass ) au **tufuatilie** kwenye **Twitter** 🐦 [**@hacktricks\_live** ](https://twitter.com/hacktricks\_live )**.**
* **Shiriki mbinu za udukuzi kwa kuwasilisha PRs kwa** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) na [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) github repos.
2022-04-28 16:01:33 +00:00
2022-10-27 23:22:18 +00:00
< / details >
2024-07-18 22:14:33 +00:00
{% endhint %}
2022-04-28 16:01:33 +00:00
2024-05-05 22:47:30 +00:00
< figure > < img src = "../.gitbook/assets/image (380).png" alt = "" > < figcaption > < / figcaption > < / figure >
2023-02-27 09:28:45 +00:00
2024-07-18 22:14:33 +00:00
Jiunge na [**HackenProof Discord** ](https://discord.com/invite/N3FrSbmwdy ) server kuwasiliana na wahacker wenye uzoefu na wawindaji wa makosa!
2023-02-27 09:28:45 +00:00
2024-07-18 22:14:33 +00:00
**Maoni ya Udukuzi**\
Shiriki na maudhui yanayoangazia msisimko na changamoto za udukuzi
2023-07-14 14:20:34 +00:00
2024-07-18 22:14:33 +00:00
**Habari za Udukuzi kwa Wakati Halisi**\
Baki na habari za kisasa kuhusu ulimwengu wa udukuzi kupitia habari na maoni ya wakati halisi
2023-07-14 14:20:34 +00:00
2024-07-18 22:14:33 +00:00
**Matangazo ya Hivi Punde**\
Baki na taarifa kuhusu makosa mapya yanayoanzishwa na masasisho muhimu ya jukwaa
2023-07-14 14:20:34 +00:00
2024-07-18 22:14:33 +00:00
**Jiunge nasi kwenye** [**Discord** ](https://discord.com/invite/N3FrSbmwdy ) na anza kushirikiana na wahacker bora leo!
2022-04-28 16:01:33 +00:00
2024-07-18 22:14:33 +00:00
### **Zana bora ya kutafuta vektori vya kuinua haki za ndani za Linux:** [**LinPEAS**](https://github.com/carlospolop/privilege-escalation-awesome-scripts-suite/tree/master/linPEAS)
2022-04-28 16:01:33 +00:00
2024-07-18 22:14:33 +00:00
### [Taarifa za Mfumo](privilege-escalation/#system-information)
2020-07-15 15:43:14 +00:00
2024-02-11 02:13:58 +00:00
* [ ] Pata **taarifa za OS**
* [ ] Angalia [**PATH** ](privilege-escalation/#path ), kuna **folda inayoweza kuandikwa** ?
2024-07-18 22:14:33 +00:00
* [ ] Angalia [**env variables** ](privilege-escalation/#env-info ), kuna maelezo nyeti yoyote?
* [ ] Tafuta [**kernel exploits** ](privilege-escalation/#kernel-exploits ) **ukitumia scripts** (DirtyCow?)
* [ ] **Angalia** kama [**toleo la sudo** lina udhaifu ](privilege-escalation/#sudo-version )
* [ ] [**Dmesg** uthibitisho wa saini umeshindwa ](privilege-escalation/#dmesg-signature-verification-failed )
* [ ] Zaidi ya mfumo wa enum ([tarehe, takwimu za mfumo, taarifa za cpu, printers](privilege-escalation/#more-system-enumeration))
* [ ] [Tathmini ulinzi zaidi ](privilege-escalation/#enumerate-possible-defenses )
2020-07-15 15:43:14 +00:00
2024-07-18 22:14:33 +00:00
### [Diski](privilege-escalation/#drives)
2020-08-24 16:38:31 +00:00
2024-07-18 22:14:33 +00:00
* [ ] **Orodhesha diski zilizowekwa**
* [ ] **Kuna diski isiyowekwa?**
* [ ] **Kuna akreditif katika fstab?**
2020-08-24 16:38:31 +00:00
2024-07-18 22:14:33 +00:00
### [**Programu Zilizowekwa**](privilege-escalation/#installed-software)
2020-08-24 16:41:51 +00:00
2024-07-18 22:14:33 +00:00
* [ ] **Angalia** [**programu muhimu** ](privilege-escalation/#useful-software ) **zilizowekwa**
* [ ] **Angalia** [**programu zenye udhaifu** ](privilege-escalation/#vulnerable-software-installed ) **zilizowekwa**
2020-08-24 16:41:51 +00:00
2024-07-18 22:14:33 +00:00
### [Mchakato](privilege-escalation/#processes)
2020-07-15 15:43:14 +00:00
2024-07-18 22:14:33 +00:00
* [ ] Je, kuna **programu isiyojulikana inayoendesha** ?
* [ ] Je, kuna programu inayoendesha kwa **haki zaidi kuliko inavyopaswa kuwa** ?
* [ ] Tafuta **exploits za michakato inayoendesha** (hasa toleo linaloendesha).
* [ ] Je, unaweza **kubadilisha binary** ya mchakato wowote unaoendesha?
* [ ] **Fuatilia michakato** na angalia kama kuna mchakato wa kuvutia unaoendesha mara kwa mara.
* [ ] Je, unaweza **kusoma** baadhi ya **kumbukumbu za mchakato** (ambapo nywila zinaweza kuhifadhiwa)?
2020-07-15 15:43:14 +00:00
2024-07-18 22:14:33 +00:00
### [Kazi za Ratiba/Cron?](privilege-escalation/#scheduled-jobs)
2020-07-15 15:43:14 +00:00
2024-07-18 22:14:33 +00:00
* [ ] Je, [**PATH** ](privilege-escalation/#cron-path ) inabadilishwa na cron fulani na unaweza **kuandika** ndani yake?
* [ ] Kuna [**wildcard** ](privilege-escalation/#cron-using-a-script-with-a-wildcard-wildcard-injection ) katika kazi ya cron?
* [ ] Baadhi ya [**script inayoweza kubadilishwa** ](privilege-escalation/#cron-script-overwriting-and-symlink ) inatekelezwa au iko ndani ya **folda inayoweza kubadilishwa** ?
* [ ] Je, umepata kuwa baadhi ya **script** zinaweza au zinafanywa [**kutekelezwa mara kwa mara** ](privilege-escalation/#frequent-cron-jobs )? (kila dakika 1, 2 au 5)
2020-08-24 16:56:30 +00:00
2024-07-18 22:14:33 +00:00
### [Huduma](privilege-escalation/#services)
2020-08-24 16:56:30 +00:00
2024-07-18 22:14:33 +00:00
* [ ] Kuna **faili ya .service inayoweza kuandikwa** ?
* [ ] Kuna **binary inayoweza kuandikwa** inayotekelezwa na **huduma** ?
* [ ] Kuna **folda inayoweza kuandikwa katika mfumo wa PATH** ?
2020-08-24 16:56:30 +00:00
2024-07-18 22:14:33 +00:00
### [Wakati](privilege-escalation/#timers)
2020-08-24 16:56:30 +00:00
2024-07-18 22:14:33 +00:00
* [ ] Kuna **timer inayoweza kuandikwa** ?
2020-08-24 16:56:30 +00:00
2024-07-18 22:14:33 +00:00
### [Sockets](privilege-escalation/#sockets)
2020-07-15 15:43:14 +00:00
2024-07-18 22:14:33 +00:00
* [ ] Kuna **faili ya .socket inayoweza kuandikwa** ?
* [ ] Je, unaweza **kuwasiliana na socket yoyote** ?
* [ ] **HTTP sockets** zikiwa na habari za kuvutia?
2020-07-15 15:43:14 +00:00
2022-05-01 13:25:53 +00:00
### [D-Bus](privilege-escalation/#d-bus)
2020-08-24 16:56:30 +00:00
2024-02-11 02:13:58 +00:00
* [ ] Je, unaweza **kuwasiliana na D-Bus yoyote** ?
2020-08-24 16:56:30 +00:00
2024-02-11 02:13:58 +00:00
### [Mtandao](privilege-escalation/#network)
2020-08-24 16:56:30 +00:00
2024-07-18 22:14:33 +00:00
* [ ] Tathmini mtandao ili kujua uko wapi
* [ ] **Port zilizofunguliwa ambazo huwezi kufikia kabla** ya kupata shell ndani ya mashine?
* [ ] Je, unaweza **kusniff trafiki** ukitumia `tcpdump` ?
2024-04-07 03:36:12 +00:00
### [Watumiaji](privilege-escalation/#users)
2024-07-18 22:14:33 +00:00
* [ ] Orodha ya watumiaji/vikundi **kuhesabu**
* [ ] Je, una **UID kubwa sana** ? Je, **mashine** ina **udhaifu** ?
* [ ] Je, unaweza [**kuinua haki kwa sababu ya kundi** ](privilege-escalation/interesting-groups-linux-pe/ ) unalotegemea?
* [ ] **Data za Clipboard** ?
2024-04-07 03:36:12 +00:00
* [ ] Sera ya Nywila?
2024-07-18 22:14:33 +00:00
* [ ] Jaribu **kutumia** kila **nywila inayojulikana** uliyogundua awali kuingia **na kila** **mtumiaji** anayeweza. Jaribu kuingia pia bila nywila.
2024-04-07 03:36:12 +00:00
2024-07-18 22:14:33 +00:00
### [PATH inayoweza kuandikwa](privilege-escalation/#writable-path-abuses)
2024-04-07 03:36:12 +00:00
2024-07-18 22:14:33 +00:00
* [ ] Ikiwa una **haki za kuandika juu ya folda fulani katika PATH** unaweza kuwa na uwezo wa kuinua haki
2024-04-07 03:36:12 +00:00
2024-07-18 22:14:33 +00:00
### [SUDO na amri za SUID](privilege-escalation/#sudo-and-suid)
2024-04-07 03:36:12 +00:00
2024-07-18 22:14:33 +00:00
* [ ] Je, unaweza kutekeleza **amri yoyote na sudo** ? Je, unaweza kuitumia KUSOMA, KUANDIKA au KUTEKELEZA chochote kama root? ([**GTFOBins**](https://gtfobins.github.io))
* [ ] Je, kuna **binary ya SUID inayoweza kutumika** ? ([**GTFOBins**](https://gtfobins.github.io))
* [ ] Je, [**amri za sudo** **zimepunguzika** na **path**? Je, unaweza **kuzidi** vizuizi ](privilege-escalation/#sudo-execution-bypassing-paths )?
* [ ] [**Sudo/SUID binary bila njia iliyotajwa** ](privilege-escalation/#sudo-command-suid-binary-without-command-path )?
* [ ] [**SUID binary ikitaja njia** ](privilege-escalation/#suid-binary-with-command-path )? Pita
* [ ] [**LD\_PRELOAD vuln** ](privilege-escalation/#ld\_preload )
* [ ] [**Ukosefu wa maktaba ya .so katika binary ya SUID** ](privilege-escalation/#suid-binary-so-injection ) kutoka folda inayoweza kuandikwa?
* [ ] [**SUDO tokens zinazopatikana** ](privilege-escalation/#reusing-sudo-tokens )? [**Je, unaweza kuunda token ya SUDO** ](privilege-escalation/#var-run-sudo-ts-less-than-username-greater-than )?
* [ ] Je, unaweza [**kusoma au kubadilisha faili za sudoers** ](privilege-escalation/#etc-sudoers-etc-sudoers-d )?
* [ ] Je, unaweza [**kubadilisha /etc/ld.so.conf.d/** ](privilege-escalation/#etc-ld-so-conf-d )?
2024-05-05 22:47:30 +00:00
* [ ] [**OpenBSD DOAS** ](privilege-escalation/#doas ) amri
2024-07-18 22:14:33 +00:00
### [Mamlaka](privilege-escalation/#capabilities)
2020-08-24 16:56:30 +00:00
2024-04-07 03:36:12 +00:00
* [ ] Je, kuna binary yoyote yenye **uwezo usiotarajiwa** ?
2020-07-15 15:43:14 +00:00
2022-05-01 13:25:53 +00:00
### [ACLs](privilege-escalation/#acls)
2020-07-15 15:43:14 +00:00
2024-07-18 22:14:33 +00:00
* [ ] Je, kuna faili yoyote yenye **ACL isiyotegemewa** ?
2020-07-15 15:43:14 +00:00
2024-07-18 22:14:33 +00:00
### [Sessions za Shell Zilizofunguliwa](privilege-escalation/#open-shell-sessions)
2020-07-15 15:43:14 +00:00
2022-02-23 22:01:26 +00:00
* [ ] **screen**
* [ ] **tmux**
2020-07-15 15:43:14 +00:00
2022-05-01 13:25:53 +00:00
### [SSH](privilege-escalation/#ssh)
2020-07-15 15:43:14 +00:00
2022-02-23 22:01:26 +00:00
* [ ] **Debian** [**OpenSSL Predictable PRNG - CVE-2008-0166** ](privilege-escalation/#debian-openssl-predictable-prng-cve-2008-0166 )
2024-07-18 22:14:33 +00:00
* [ ] [**SSH Thamani za usanidi za Kuvutia** ](privilege-escalation/#ssh-interesting-configuration-values )
2020-07-15 15:43:14 +00:00
2024-04-07 03:36:12 +00:00
### [Faili za Kuvutia](privilege-escalation/#interesting-files)
2020-07-15 15:43:14 +00:00
2024-07-18 22:14:33 +00:00
* [ ] **Faili za Profaili** - Soma data nyeti? Andika kwa privesc?
* [ ] **faili za passwd/shadow** - Soma data nyeti? Andika kwa privesc?
* [ ] **Angalia folda zinazovutia kwa kawaida** kwa data nyeti
* [ ] **Mahali/Picha za Ajabu,** unaweza kuwa na ufikiaji au kubadilisha faili zinazoweza kutekelezwa
* [ ] **Imebadilishwa** katika dakika za mwisho
* [ ] **Faili za Sqlite DB**
* [ ] **Faili zilizofichwa**
* [ ] **Script/Binaries katika PATH**
* [ ] **Faili za Mtandao** (nywila?)
* [ ] **Nakala za Hifadhi** ?
* [ ] **Faili zinazojulikana ambazo zina nywila** : Tumia **Linpeas** na **LaZagne**
2024-02-11 02:13:58 +00:00
* [ ] **Utafutaji wa Kawaida**
2020-07-15 15:43:14 +00:00
2024-02-11 02:13:58 +00:00
### [**Faili Zinazoweza Kuandikwa**](privilege-escalation/#writable-files)
2020-07-15 15:43:14 +00:00
2024-07-18 22:14:33 +00:00
* [ ] **Badilisha maktaba ya python** ili kutekeleza amri zisizo za kawaida?
* [ ] Je, unaweza **kubadilisha faili za log** ? **Logtotten** exploit
* [ ] Je, unaweza **kubadilisha /etc/sysconfig/network-scripts/** ? Centos/Redhat exploit
2024-02-11 02:13:58 +00:00
* [ ] Je, unaweza [**kuandika katika faili za ini, int.d, systemd au rc.d** ](privilege-escalation/#init-init-d-systemd-and-rc-d )?
2020-07-15 15:43:14 +00:00
2024-02-11 02:13:58 +00:00
### [**Mbinu Nyingine**](privilege-escalation/#other-tricks)
2020-07-15 15:43:14 +00:00
2024-07-18 22:14:33 +00:00
* [ ] Je, unaweza [**kudhulumu NFS ili kuinua haki** ](privilege-escalation/#nfs-privilege-escalation )?
* [ ] Je, unahitaji [**kutoroka kutoka shell yenye vizuizi** ](privilege-escalation/#escaping-from-restricted-shells )?
2024-05-05 22:47:30 +00:00
< figure > < img src = "../.gitbook/assets/image (380).png" alt = "" > < figcaption > < / figcaption > < / figure >
2024-07-18 22:14:33 +00:00
Jiunge na [**HackenProof Discord** ](https://discord.com/invite/N3FrSbmwdy ) server kuwasiliana na wahacker wenye uzoefu na wawindaji wa makosa!
**Maoni ya Udukuzi**\
Shiriki na maudhui yanayoangazia msisimko na changamoto za udukuzi
**Habari za Udukuzi kwa Wakati Halisi**\
Baki na habari za kisasa kuhusu ulimwengu wa udukuzi kupitia habari na maoni ya wakati halisi
2024-05-05 22:47:30 +00:00
2024-07-18 22:14:33 +00:00
**Matangazo ya Hivi Punde**\
Baki na taarifa kuhusu makosa mapya yanayoanzishwa na masasisho muhimu ya jukwaa
2024-05-05 22:47:30 +00:00
2024-07-18 22:14:33 +00:00
**Jiunge nasi kwenye** [**Discord** ](https://discord.com/invite/N3FrSbmwdy ) na anza kushirikiana na wahacker bora leo!
2024-05-05 22:47:30 +00:00
2024-07-18 22:14:33 +00:00
{% hint style="success" %}
Jifunze na fanya mazoezi ya AWS Hacking:< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > [**HackTricks Training AWS Red Team Expert (ARTE)**](https://training.hacktricks.xyz/courses/arte)< img src = "/.gitbook/assets/arte.png" alt = "" data-size = "line" > \
Jifunze na fanya mazoezi ya GCP Hacking: < img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > [**HackTricks Training GCP Red Team Expert (GRTE)**< img src = "/.gitbook/assets/grte.png" alt = "" data-size = "line" > ](https://training.hacktricks.xyz/courses/grte)
2024-05-05 22:47:30 +00:00
2024-07-18 22:14:33 +00:00
< details >
< summary > Support HackTricks< / summary >
* Angalia [**mpango wa usajili** ](https://github.com/sponsors/carlospolop )!
* **Jiunge na** 💬 [**kikundi cha Discord** ](https://discord.gg/hRep4RUj7f ) au [**kikundi cha telegram** ](https://t.me/peass ) au **tufuatilie** kwenye **Twitter** 🐦 [**@hacktricks\_live** ](https://twitter.com/hacktricks\_live )**.**
* **Shiriki mbinu za udukuzi kwa kuwasilisha PRs kwa** [**HackTricks** ](https://github.com/carlospolop/hacktricks ) na [**HackTricks Cloud** ](https://github.com/carlospolop/hacktricks-cloud ) github repos.
< / details >
{% endhint %}