Ecosyste.ms: Awesome
An open API service indexing awesome lists of open source software.
https://github.com/liamg/traitor
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
https://github.com/liamg/traitor
cve-2021-3560 cve-2022-0847 dirtypipe exploit gtfobins hackthebox infosec privesc privilege-escalation redteam-tools security-tools
Last synced: 2 days ago
JSON representation
:arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock
- Host: GitHub
- URL: https://github.com/liamg/traitor
- Owner: liamg
- License: mit
- Created: 2021-01-24T10:50:15.000Z (almost 4 years ago)
- Default Branch: main
- Last Pushed: 2024-03-12T21:01:14.000Z (9 months ago)
- Last Synced: 2024-11-26T06:05:21.700Z (16 days ago)
- Topics: cve-2021-3560, cve-2022-0847, dirtypipe, exploit, gtfobins, hackthebox, infosec, privesc, privilege-escalation, redteam-tools, security-tools
- Language: Go
- Homepage:
- Size: 4.41 MB
- Stars: 6,698
- Watchers: 124
- Forks: 578
- Open Issues: 20
-
Metadata Files:
- Readme: README.md
- Funding: .github/FUNDING.yml
- License: LICENSE
Awesome Lists containing this project
- awesome-cybersec - Automatic Linux privesc via exploitation of low-hanging fruit
- awesome-hacking-lists - liamg/traitor - :arrow_up: :skull_and_crossbones: :fire: Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock (Go)
README
# Traitor
Automatically exploit low-hanging fruit to pop a root shell. Linux privilege escalation made easy!
Traitor packages up a bunch of methods to exploit local misconfigurations and vulnerabilities in order to pop a root shell:
- Nearly all of [GTFOBins](https://gtfobins.github.io/)
- Writeable docker.sock
- CVE-2022-0847 (Dirty pipe)
- CVE-2021-4034 (pwnkit)
- CVE-2021-3560![Demo](demo.gif)
It'll exploit most sudo privileges listed in GTFOBins to pop a root shell, as well as exploiting issues like a writable `docker.sock`, or the recent dirty pipe (CVE-2022-0847). More routes to root will be added over time too.
## Usage
Run with no arguments to find potential vulnerabilities/misconfigurations which could allow privilege escalation. Add the `-p` flag if the current user password is known. The password will be requested if it's needed to analyse sudo permissions etc.
```bash
traitor -p
```Run with the `-a`/`--any` flag to find potential vulnerabilities, attempting to exploit each, stopping if a root shell is gained. Again, add the `-p` flag if the current user password is known.
```bash
traitor -a -p
```Run with the `-e`/`--exploit` flag to attempt to exploit a specific vulnerability and gain a root shell.
```bash
traitor -p -e docker:writable-socket
```## Supported Platforms
Traitor will run on all Unix-like systems, though certain exploits will only function on certain systems.
## Getting Traitor
Grab a binary from the [releases page](https://github.com/liamg/traitor/releases), or use go:
```
CGO_ENABLED=0 go get -u github.com/liamg/traitor/cmd/traitor
```For go1.18:
```
CGO_ENABLED=0 go install github.com/liamg/traitor/cmd/traitor@latest
```If the machine you're attempting privesc on cannot reach GitHub to download the binary, and you have no way to upload the binary to the machine over SCP/FTP etc., then you can try base64 encoding the binary on your machine, and echoing the base64 encoded string to `| base64 -d > /tmp/traitor` on the target machine, remembering to `chmod +x` it once it arrives.
## In The News
- 20/06/21: [Console 58](https://console.substack.com/p/console-58) - Awesome newsletter featuring tools and beta releases for developers.
- 28/04/21: [Intigriti Bug Bytes #120](https://blog.intigriti.com/2021/04/28/bug-bytes-120-macos-pwned-homebrew-rce-the-worlds-shortest-backdoor/) - Recommended tools
- 09/03/21: [Hacker News thread](https://news.ycombinator.com/item?id=26224719)