1
mirror of https://github.com/carlospolop/PEASS-ng synced 2025-02-28 12:03:02 +01:00

Merge cf1fbd59b61771722a9e32a43282341f3d5de34f into 33b89dabbf850456c329f6f713208cbdc4787067

This commit is contained in:
Carlos Polop 2021-10-24 07:03:06 -05:00 committed by GitHub
commit ad7e616072
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 164 additions and 132 deletions

View File

@ -6,7 +6,7 @@ ADVISORY="This script should be used for authorized penetration testing and/or e
###########################################
#-------) Checks pre-everything (---------#
###########################################
if [ "$(/usr/bin/id -u)" -eq "0" ]; then
if ([ -f /usr/bin/id ] && [ "$(/usr/bin/id -u)" -eq "0" ]) || [ "`whoami 2>/dev/null`" = "root" ]; then
IAMROOT="1"
MAXPATH_FIND_W="3"
else
@ -1189,6 +1189,7 @@ if echo $CHECKS | grep -q SysI; then
if [ "$(command -v bash 2>/dev/null)" ]; then
print_2title "Executing Linux Exploit Suggester"
print_info "https://github.com/mzet-/linux-exploit-suggester"
les_b64="peass{LES}"
echo $les_b64 | base64 -d | bash
echo ""
@ -1196,11 +1197,19 @@ if echo $CHECKS | grep -q SysI; then
if [ "$(command -v perl 2>/dev/null)" ]; then
print_2title "Executing Linux Exploit Suggester 2"
print_info "https://github.com/jondonas/linux-exploit-suggester-2"
les2_b64="peass{LES2}"
echo $les2_b64 | base64 -d | perl
echo ""
fi
if [ "$(command -v brew 2>/dev/null)" ]; then
print_2title "Brew Doctor Suggestions"
brew doctor
echo ""
fi
#-- SY) AppArmor
print_2title "Protections"
@ -2982,6 +2991,13 @@ if echo $CHECKS | grep -q IntFiles; then
done
echo ""
print_2title "Broken links in path"
echo $PATH | tr ":" "\n" | while read d; do
find "$d" -type l 2>/dev/null | xargs file 2>/dev/null | grep broken | sed -${E} "s,broken,${SED_RED},";
done
echo ""
if [ "$MACPEAS" ]; then
print_2title "Unsigned Applications"
macosNotSigned /System/Applications

File diff suppressed because one or more lines are too long