All Projects → TH3xACE → Sudo_killer

TH3xACE / Sudo_killer

Licence: mit
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.

Programming Languages

44506 projects

Projects that are alternatives of or similar to Sudo killer

Awesome Privilege Escalation
A curated list of awesome privilege escalation
Stars: ✭ 413 (-61.51%)
Mutual labels:  pentest, ctf, oscp, privilege-escalation
Privilege Escalation
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Stars: ✭ 2,117 (+97.3%)
Mutual labels:  ctf, oscp, privilege-escalation
MSDAT: Microsoft SQL Database Attacking Tool
Stars: ✭ 621 (-42.12%)
Mutual labels:  pentest, pentest-tool, privilege-escalation
A tool to test security of json web token
Stars: ✭ 130 (-87.88%)
Mutual labels:  pentest, ctf, pentest-tool
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-93.66%)
Mutual labels:  ctf, privilege-escalation, sudo
Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
Stars: ✭ 154 (-85.65%)
Mutual labels:  ctf, cve, exploits
Oscp Pentest Methodologies
备考 OSCP 的各种干货资料/渗透测试干货资料
Stars: ✭ 166 (-84.53%)
Mutual labels:  ctf, pentest-tool, oscp
A very loud but fast recon scan and pentest template creator for use in CTF's/OSCP/Hackthebox...
Stars: ✭ 23 (-97.86%)
Mutual labels:  ctf, pentest, oscp
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Stars: ✭ 61 (-94.32%)
Mutual labels:  cve, pentest, privilege-escalation
A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Stars: ✭ 342 (-68.13%)
Mutual labels:  pentest, oscp, privilege-escalation
Thc Archive
All releases of the security research group (a.k.a. hackers) The Hacker's Choice
Stars: ✭ 474 (-55.82%)
Mutual labels:  pentest, pentest-tool, exploits
JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)
Stars: ✭ 450 (-58.06%)
Mutual labels:  pentest, pentest-tool, oscp
ODAT: Oracle Database Attacking Tool
Stars: ✭ 906 (-15.56%)
Mutual labels:  pentest, pentest-tool, privilege-escalation
Collection of things made during my OSCP journey
Stars: ✭ 709 (-33.92%)
Mutual labels:  oscp, privilege-escalation
Hacking Toolkit
Stars: ✭ 635 (-40.82%)
Mutual labels:  pentest, pentest-tool
Privilege Escalation Enumeration Script for Windows
Stars: ✭ 1,032 (-3.82%)
Mutual labels:  pentest-tool, privilege-escalation
Spoilerwall introduces a brand new concept in the field of network hardening. Avoid being scanned by spoiling movies on all your ports!
Stars: ✭ 754 (-29.73%)
Mutual labels:  pentest, ctf
Exploit Pack -The next generation exploit framework
Stars: ✭ 728 (-32.15%)
Mutual labels:  pentest-tool, exploits
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (-27.77%)
Mutual labels:  pentest, pentest-tool
Find exploit tool
Stars: ✭ 786 (-26.75%)
Mutual labels:  pentest-tool, exploits

.. raw:: html

.. image:: ./pictures/SUDO KILLER2.JPG :width: 700px :alt: Project

.. raw:: html


.. image:: :target: :alt: Last Commit

.. image:: :target: :alt: Docker Size

.. image:: :target: :alt: Docker Build Status

.. raw:: html

#sudo exploitation #Abusing sudo #Exploiting Sudo #Linux Privilege Escalation #OSCP

Linux Privilege Escalation through SUDO abuse.

  • If you like the tool and for my personal motivation so as to develop other tools please a +1 star

The tool can be used by pentesters, system admins, CTF players, students, System Auditors and trolls :).

.. contents:: :local: :depth: 1

============= INTRO

**WARNING: SUDO_KILLER is part of the KILLER project. SUDO_KILLER is still under development and there might be some issues, please create an issue if you found any. **

Other tool will be added to the KILLER project in the coming months so stay tuned up. Also ideas, bug reports, contributions are more than welcome !

** Stay tuned : Follow me on twitter @ **

============= Overview

SUDO_KILLER is a tool that can be used for privilege escalation on linux environment by abusing SUDO in several ways. The tool helps to identify misconfiguration within sudo rules, vulnerability within the version of sudo being used (CVEs and vulns) and the use of dangerous binary, all of these could be abused to elevate privilege to ROOT.

SUDO_KILLER will then provide a list of commands or local exploits which could be exploited to elevate privilege. It is worth noting that the tool does not perform any exploitation on your behalf, the exploitation will need to be performed manually and this is intended.

============= Features

Some of the checks/functionalities that are performed by the tool.

  • Misconfigurations
  • Dangerous Binaries
  • Vulnerable versions of sudo - CVEs
  • Dangerous Environment Variables
  • Credential Harvesting
  • Writable directories where scripts reside
  • Binaries that might be replaced
  • Identify missing scripts

What version 2 of SK includes:

  • New checks and/or scenarios
    1. CVE-2019-14287 - runas
    2. No CVE yet - sudoedit - absolute path
    3. CVE-2019-18634 - pwfeedback
    4. User Impersonation
    5. list of users in sudo group
  • Performance improved
  • Bugs corrected (checks, export, report,...)
  • Continous improvement of the way output presented
  • New videos will be added soon
  • Annonying password input several time removed
  • New functionality: offline mode - ability to extract the required info from audited system and run SK on host.
  • Testing environment : A docker to play with the tool and different scenarios, you can also train on PE.

New - 2021

  • Exploit for CVE-2021-3156 was added
  • Detection for CVE-2021-3156 was added
  • Detection for CVE-2021-23240 was added
  • Exploit for CVE-2019-18634 was added
  • Docker environment to test CVE-2019-18634 was added
  • Video showing exploitation of CVE-2019-18634 was added

============= Usage

Example Online mode

.. code-block:: console

./ -c -e -r report.txt -p /tmp

Example Offline mode

Run on system to be audited/victim machine. Copy the output from /tmp/sk_offline.txt on the system to be audited/victim machine to your host.

  • Note: Three checks are missing in the offline mode, still in dev... coming soon...

Run SK with the below parameter:

.. code-block:: console

./ -c -i /path/sk_offline.txt

Optional arguments

  • -c : include CVE checks with respect to sudo version
  • -i : import (offline mode) from
  • -e : include export of sudo rules / sudoers file
  • -r : report name (save the output)
  • -p : path where to save export and report
  • -s : supply user password for sudo checks (not recommended ++except for CTF)
  • -h : help

It is worth noting that when using the -c argument, the CVEs identified are only based on the sudo version in used. Very often, a sudo version might be vulnerable but specific condition must be met for exploitation.

SK also check if some conditions are met for several CVEs without the -c such as CVE-2014-0106, CVE-2015-5602, CVE-2017-1000367, CVE-2019-14287, CVE-2019-18634, CVE-2021-3156 and CVE-2021-23240

CVEs check

To update the CVE database : run the following script ./

Providing password (Important)

If you need to input a password to run sudo -l then the script will not work if you don't provide a password with the argument -s.

How to run SK on the targetted/audited machine

If you are on a machine that has internet connection, just git clone the tool and run it. If you are on a machine that does not have internet, then git clone on your host, compress the tool (tar) then transfert the compressed file via http/smb (apache web server / python simplehttpserver / smb server / nc) then uncompressed the file on the targeted system and enjoy!


**NOTE : sudo_killer does not exploit automatically by itself, it was designed like this on purpose but check for misconguration and vulnerabilities and then propose you the following (if you are lucky the route to root is near!) :

  • a list of commands to exploit
  • a list of exploits
  • some description on how and why the attack could be performed

============= Why is it possible to run "sudo -l" without a password?

By default, if the NOPASSWD tag is applied to any of the entries for a user on a host, you will be able to run "sudo -l" without a password. This behavior may be overridden via the verifypw and listpw options.

However, these rules only affect the current user, so if user impersonation is possible (using su) sudo -l should be launched from this user as well.

Sometimes the file /etc/sudoers can be read even if sudo -l is not accessible without password.

============ Docker - Vulnerable testing environment

**IMPORTANT: The recommended way to test the tool is to use the docker image created on purpose for the testing. The image contained several vulnerabilities and misconfigurations related to the usage of SUDO.

Everything is tested from the Docker container available on Docker Hub !**

.. image::

A Docker image is available on Docker Hub and automatically re-built at each update: . It is initially based on official debian:jessie Docker image (debian:jessie).

.. image:: ?style=plastic :target: :alt: Docker Size

  1. Pull SUDO_KILLER_DEMO Docker Image from the docker hub :

    .. code-block:: console

     service docker start 

    docker pull th3xace/sudo_killer_demo docker run --rm -it th3xace/sudo_killer_demo

  2. Build locally from Dockerfile (This version maybe a bit more up-to-date):

    .. code-block:: console

     service docker start 

    git clone cd SUDO_KILLER docker build -t th3xace/sudo_killer_demo . docker run --rm -it th3xace/sudo_killer_demo

  3. Pull SUDO_KILLER_DEMO2 Docker Image from the docker hub : (if you want to test CVE-2019-18634 (pwfeedback))

    .. code-block:: console

     service docker start 

    docker pull th3xace/sudo_killer_demo2 docker run --user 1000 --rm -it th3xace/sudo_killer_demo2

    Then follow guidance from the tool, It should be noted that the version 1.8.25 was used for the demo and that for other versions slight changes should be made.Refer to the readme in the exploit folder for more info. There is also a video for the exploitation. Credits to the POC exploit's developper refer to notes.

Note: It is important to note that the docker is just an environment that can be used to play with the tool since it contains several vulns to exploit. The tool is meant to be used on its own.

============ Demos

Several videos are provided below with different scenarios of exploitation.

The playlist url:

+----------------------------------------------------------+----------------------------------------------------------+ |* Video 1 : Docker - Setup vuln environment |* Video 8: Scenario 7 - Environment Variable | |.. raw:: html |.. raw:: html | | | | | | | | | | | | | +----------------------------------------------------------+----------------------------------------------------------+ |* Video 2 : Scenario 1 - CVE exploitation |* Video 9: Scenario 8 - CVE-2019-14287 - runas | |.. raw:: html |.. raw:: html | | | | | | | | | | | | | +----------------------------------------------------------+----------------------------------------------------------+ |* Video 3 : Scenario 2 - Dangerous Bins |* Video 10: Scenario 9 - sudoedit - absolute path | |.. raw:: html |.. raw:: html | | | | | | | | | | | | | +----------------------------------------------------------+----------------------------------------------------------+ |* Video 4 : Scenario 3 - Misconfig (Wildcard) |* Video 11: Scenario 10 - User impersonation I [X2] | |.. raw:: html |.. raw:: html | | | | | | | | | | | | | +----------------------------------------------------------+----------------------------------------------------------+ |* Video 5 : scenario 4 - Misconfig (Excessive Rights) |* Video 12: Scenario 10 - User impersonation II | |.. raw:: html |.. raw:: html | | | | | | | | | | | | | +----------------------------------------------------------+----------------------------------------------------------+ |* Video 6 : Scenario 5 - Misconfig (Missing scripts) |* Video 13: offline mode | |.. raw:: html |.. raw:: html | | | | | | | | | | | | | +----------------------------------------------------------+----------------------------------------------------------+ |* Video 7 : Scenario 6 - Credentials Harvesting |* Video: Scenario 11 - CVE-2019-18634 - pwfeedback | |.. raw:: html |.. raw:: html | | | | | | | | | | | | | +----------------------------------------------------------+----------------------------------------------------------+

============= Coming functionality and improvement

  • Detection of CVE-2021-3156 - done

  • Adding CVE-2021-3156 scenario to docker - done

  • Detection of CVE-2021-23240 - done

  • Adding CVE-2021-23240 scenario to docker + exploit - coming

  • Credentials harvesting - done

  • Improve the way information on potential vuln and exploit are presented - done

  • Adding scenario + detection exploit for CVE-2019-14287 - done

  • Ability to extract data and do analysis offline - on your machine - partially done

  • Sudo token abuse - done

  • Dealing with aliases

  • Extracting sudo rules remotely via SSH (fully automated)

  • Blind SUDO - This is a new sub-project (whenever you need a password to run sudo -l but you don't have it)

  • Audit mode (need to have read access to /etc/sudoers)

  • If you want me to add any other one... please submit an issue

============= Support - Stargazers over time

Thank you all for your support! I will release another tool from my own arsenal in the coming weeks (for Lateral movement and PE on Windows Domain Environment).

|Ask Me Anything !|

.. |Ask Me Anything !| image:: :target:

============= Credits

The script was developed by myself with the help of online resources found on github and in the wild. Credits also to the authors of the exploits related to CVEs. The authors information and links can be found in the exploit and in the notes provided when running the tool. Special kudos to Vincent Puydoyeux, who gave me the idea to develop this tool and Koutto, for helping me with the docker thing and for improving the tool.

============= Disclaimer

This script is for Educational purpose ONLY. Do not use it without permission of the owner of the system you are running it. The usual disclaimer applies, especially the fact that me (TH3xACE) is not liable for any damages caused by direct or indirect use of the information or functionality provided by these programs. The author or any Internet provider bears NO responsibility for content or misuse of these programs or any derivatives thereof. By using these programs you accept the fact that any damage (dataloss, system crash, system compromise, etc.) caused by the use of the script is not my responsibility.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected]