Using 0xsp Mongoose you will be able to scan targeted operating system for any possible way for privilege escalation attacks,starting from collecting information stage unitl reporting information through 0xsp Web Application API .
User will be able to scan different linux os system at same time with high perfromance , with out spending time looking inside the terminal or text file for what is found , mongoose shorten this way by allowing you to send these information directly into web application friendly interface through easy API endpoint .
Project is divided into two sections server & agent .
Server has been coded with PHP(codeigniter) you need to install this application into your preffered environment , you can use it online or on your localhost . user is free to choice .also contribution to enhance features are most welcomed .
Agent has been coded as ELF with Lazarus Free Pascal will be released with ( 32 , 64 bit) , while executing Agent on targeted system with all required parameters . user is free to decided whether willing to communicate with Server App to store results and explore them easily . or he can also run this tool with out Web Api Connection .
Also Read – Scapy : Python-Based Interactive Packet Manipulation Program & Library
Agent Usage
chmod +x agent-k –check kernel for common used privilige escalations exploits.
-u –Getting information about Users , groups , releated information.
-c –check cronjobs.
-n –Retrieve Network information,interfaces …etc.
-w –Enumerate for Writeable Files , Dirs , SUID ,
-i –Search for Bash,python,Mysql,Vim..etc History files.
-f –search for Senstive config files accessible & private stuff.
-o –connect to 0xsp Web Application.
-p –Show All process By running under Root,Check For Vulnerable Packages.
-e –Kernel inspection Tool, it will help to search through tool databases for kernel vulnerabilities.
-x –secret Key to authorize your connection with WebApp API (default is 0xsp).
-a –Display README.
Server Web App
php 5.6 or abovemysql 5.6/ with folder name 0xsp as [ http://localhost/0xsp/] , Agent will not connect to it in case not configured correctly . the agent will connect only as following case :./agent {SCAN OPTION} -o localhost -x secretkey
Examples With WebApi
./agent -c -o localhost -x 0xsp { enumerate for CRON Tasks and Transfer results into Web Api}
./agent -e -o localhost -x 0xsp { intelligent Exploits Detector }
./agent -c -e localhost -x 0sxp { will run two scans together and send found results directly }
./agent -m -o 10.10.13.1 -x 0xsp { RUN all Scans together and export it to Web API}
./agent -c -k -p { this will run 3 scans at the same time with out sending results into Web Api }
Demo Tutorial
General Working of a Web Application Firewall (WAF) A Web Application Firewall (WAF) acts as…
How to Send POST Requests Using curl in Linux If you work with APIs, servers,…
If you are a Linux user, you have probably seen commands like chmod 777 while…
Vim and Vi are among the most powerful text editors in the Linux world. They…
Working with compressed files is a common task for any Linux user. Whether you are…
In the digital era, an email address can reveal much more than just a contact…