View Issue Details
|ID||Project||Category||View Status||Date Submitted||Last Update|
|0004572||Kali Linux||Kali Websites & Docs||public||2018-03-01 10:34||2021-12-14 22:41|
|Summary||0004572: Update tools.kali.org : linux-exploit-suggester.sh - Updated/Forked Version|
I'm aware that Kali already contains Linux_Exploit_Suggester (https://tools.kali.org/exploitation-tools/linux-exploit-suggester). Unfortunately AFAIK this tool is not maintained anymore and is out of date (last added exploits are from 2014).
linux-exploit-suggester.sh (https://github.com/mzet-/linux-exploit-suggester) is up to date and regularly updated. It contains all the exploits that are present in Linux_Exploit_Suggester (excluding those that are applicable solely for kernels 2.4 and older) plus all the latest (as of early 2018) publicly known Linux kernel exploits.
linux-exploit-suggester.sh is inspired on Linux_Exploit_Suggester so basic philosophy and use case is the same. However it also comes with some additional features:
Currently linux-exploit-suggester.sh contains:
For more details please see README.md at https://github.com/mzet-/linux-exploit-suggester.
Thanks for consideration.
To help speed up the process of evaluating the tool, please make sure to include the following information (the more information you include, the more beneficial it will for us):
Below are informations you requested, please let me know if something is missing or unclear.
Version 0.9 of the tool should be used.
latest (development) version:
linux-exploit-suggester.sh tool is meant to assist security analyst in identifying possible privilege escalation attack vectors on target Linux machine by suggesting possible exploits.
Tool is implemented as a single Bash script. It requires Bash in version >= 4.0 in order to run.
Similar to (and inspired by) https://github.com/InteliSecureLabs/Linux_Exploit_Suggester.
Project has started on 6 Oct 2016. Yes, it is actively being developed and maintained.
No compilation is involved - the tool is implemented as a single Bash script.
After downloading the tool (in version 0.9) from https://github.com/mzet-/linux-exploit-suggester/archive/v0.9.tar.gz the tool is ready to run.
Basic usage (see more examples at: https://github.com/mzet-/linux-exploit-suggester#usage):
checks for possible kernel space (and for Ubuntu, Debian, RHEL/CentOS, Fedora distros also for user space) exploits based on kernel (package) version and other settings like (kernels CONFIG_* compile time settings and sysctl entries):
enumerates kernel and hardware protection mechanisms (KASLR, SMEP, SMAP, etc.):
lists possible exploits for Linux kernel in version 3.3.*:
checks for possible kernel space and user space exploits based on output from given 'uname -a' command output and based on provided package file listing (output from 'dpkg -l' or 'rpm -qa' commands):
to see help:
Any update on this?
Please reconsider adding LES tool to the Kali. The tool has matured, is up to date, has excellent '--checksec' functionality in summary it is much more then its predecessor (https://tools.kali.org/exploitation-tools/linux-exploit-suggester) I believe. See detailed paper (in a form of blog post) here: https://mzet-.github.io/2019/05/10/les-paper.html for details about the tool inner workings and novel techniques it uses to limit false positives when generating list of candidate exploits.
Please see below for (updated) information about the tool:
Thanks for consideration.
The old one doesn't exists any more ~ https://github.com/PenturaLabs?tab=repositories
I would recommend we switch
Cool. Let me know if you need any additional info from me.
@kali-team, please could this be packaged up.
@kali-team, please note that new release has just been published: https://github.com/mzet-/linux-exploit-suggester/archive/v1.1.tar.gz
If we're going to add it to Kali, can we queue it for ver. 2020.2 (https://bugs.kali.org/changelog_page.php?version_id=25)?
Do we add it or not? It was acknowledged, let's push it.
Please let me know if you need any additional information.
I have uploaded the new version 1.1.-0kali1
Site https://tools.kali.org/exploitation-tools/linux-exploit-suggester still describes the all version of the tool. It should be updated as well.
Any update on this?
Is there anything I can help with with updating the https://tools.kali.org/exploitation-tools/linux-exploit-suggester site? This is obviously out of date - the new tool was added to Kali in May 2020, we should sync up the https://tools.kali.org site to reflect this. Here's the proposed draft of the page:
LES tool is designed to assist in detecting security deficiencies for a given Linux kernel/Linux-based machine. It provides following functionality:
Tools included in the linux-exploit-suggester package
(no modifications are needed here I believe)
linux-exploit-suggester Usage Example
Assess an exposure of the Linux box on publicly known privilege escalation exploits:
Show state of Linux kernel security features on the Linux box:
Assess an exposure of Linux kernel on publicly known exploits based on the provided 'uname' string (i.e. output of uname -a command):
We have the new site now!
|2018-03-01 10:34||mzet||New Issue|
|2018-03-01 11:26||g0tmi1k||Product Version||kali-dev =>|
|2018-03-01 11:26||g0tmi1k||Summary||Please consider adding linux-exploit-suggester.sh to Kali Linux => linux-exploit-suggester.sh - Updated/Forked Version|
|2018-04-10 11:42||g0tmi1k||Note Added: 0009020|
|2018-04-13 21:26||mzet||Note Added: 0009037|
|2018-04-25 20:05||mzet||Note Added: 0009066|
|2019-05-14 12:55||mzet||Note Added: 0010579|
|2019-10-28 13:19||g0tmi1k||Note Added: 0011233|
|2019-10-28 13:19||g0tmi1k||Category||New Tool Requests => Queued Tool Addition|
|2019-10-28 16:01||g0tmi1k||Status||new => assigned|
|2019-11-11 10:12||mzet||Note Added: 0011292|
|2020-01-06 13:07||g0tmi1k||Status||assigned => acknowledged|
|2020-01-06 13:20||g0tmi1k||Note Added: 0011817|
|2020-01-07 15:00||mzet||Note Added: 0011829|
|2020-02-04 16:18||mzet||Note Added: 0012008|
|2020-05-12 13:25||mzet||Note Added: 0012773|
|2020-05-18 14:11||sbrun||Assigned To||=> sbrun|
|2020-05-18 14:11||sbrun||Status||acknowledged => resolved|
|2020-05-18 14:11||sbrun||Resolution||open => fixed|
|2020-05-18 14:11||sbrun||Note Added: 0012805|
|2020-09-11 07:01||mzet||Status||resolved => feedback|
|2020-09-11 07:01||mzet||Resolution||fixed => reopened|
|2020-09-11 07:01||mzet||Note Added: 0013415|
|2020-09-11 07:47||sbrun||Assigned To||sbrun =>|
|2020-09-11 07:47||sbrun||Status||feedback => new|
|2020-09-11 07:47||sbrun||Category||Queued Tool Addition => Kali Websites & Docs|
|2020-09-11 07:47||sbrun||Summary||linux-exploit-suggester.sh - Updated/Forked Version => Update tools.kali.org : linux-exploit-suggester.sh - Updated/Forked Version|
|2020-10-07 07:56||mzet||Note Added: 0013541|
|2021-01-04 10:38||mzet||Note Added: 0014031|
|2021-12-14 22:41||g0tmi1k||Note Added: 0015534|
|2021-12-14 22:41||g0tmi1k||Assigned To||=> g0tmi1k|
|2021-12-14 22:41||g0tmi1k||Status||new => resolved|
|2021-12-14 22:41||g0tmi1k||Resolution||reopened => fixed|