Skip to content

⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock

License

Notifications You must be signed in to change notification settings

pentestfunctions/traitor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

10 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Traitor

Linux privilege escalation made easy.

Packages up a bunch of methods to exploit local misconfigurations/vulns (including all of GTFOBins) in order to gain a root shell.

Usage

Run with no arguments to find potential vulnerabilities/misconfigurations which could allow privilege escalation.

traitor

Run with the -a/--any flag to find potential vulnerabilities, attempting to exploit each, stopping if a root shell is gained.

traitor -a

Run with the -e/--exploit flag to attempt to exploit a specific vulnerability and gain a root shell.

traitor -e docker:writable-socket

Getting Traitor

Grab a binary from the releases page, or use go:

go get -u github.com/liamg/traitor/cmd/traitor

If the machine you're attempting privesc on cannot reach GitHub to download the binary, and you have no way to upload the binary to the machine over SCP/FTP etc., then you can try base64 encoding the binary on your machine, and echoing the base64 encoded string to | base64 -d > /tmp/traitor on the target machine, remembering to chmod +x it once it arrives.

Included Methods

  • Writable docker.sock (no internet connection or local images required!)
  • sudo:CVE-2021-3156
  • Basic sudo
  • GTFOBins via weak sudo rules
  • Kernel exploits

About

⬆️ ☠️ 🔥 Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins, pwnkit, dirty pipe, +w docker.sock

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Go 99.9%
  • Makefile 0.1%