Categories: Kali Linux

LinPwn : Interactive Post Exploitation Tool

LinPwn is a interactive tool created to assist you in post exploitation enumeration and privilege escalation.

Connection

  • Set your IP and port you want it to connect to in the Connection class.
  • Place the LinPwn binary on the target machine.
  • Run nc -lvp PORT on your machine and then run LinPwn on the target machine to get a connection.

Also Read – JSONBee : A Ready To Use JSONP Endpoints/Payloads To Help Bypass Content Security Policy Of Different Websites

Usage

  1. shell – This command Executes /bin/sh
    Example usage: (LinPwn: Shell) > id
    Type exit to return to LinPwn.
  2. readfile – This command will print the contents of a file.
    Example usage: (LinPwn: ReadFile)> /etc/passwd
    Type exit to return to LinPwn.
  3. enumerate – this command runs LinEnum.sh
    Example usage: (LinPwn) > enumerate
  4. download – This command downloads a file on the target machine
    Example usage: (LinPwn: Download) > https://exampleurl.com/file_to_download
  5. wificredz – This command gathers saved wifipasswords
  6. hashdump – This command gathers system password hashes

Compiling

I included a file called build.sh this is optional run bash build.sh to view the build options if you wish to use them.

R K

Recent Posts

How to Fix MyISAM Table Corruption in MySQL?

In MySQL Server 5.5 and earlier versions, the MyISAM was the default storage engine. So,…

11 hours ago

Microsoft Authenticator Flaw Could Leak Login Codes

A newly disclosed vulnerability in Microsoft Authenticator could expose one time sign in codes or…

20 hours ago

Modrinth – A Comprehensive Overview of Tools and Functions

Modrinth is a modern platform that’s rapidly changing the landscape of Minecraft modding, providing an…

2 days ago

BlackSanta Malware A Stealthy Threat Targeting Recruiters and HR Teams

A new, highly sophisticated malware campaign named BlackSanta has emerged, primarily targeting HR and recruitment…

2 days ago

Perplexity Launches Personal Computer Features

Perplexity has unveiled an exciting new feature, Personal Computer, which allows AI agents to seamlessly…

2 days ago

Cyberattack or Smoke and Mirrors? The Truth Behind the Alleged Dimona Nuclear Breach

In a recent cyber incident, a group named CARDINAL, associated with the label Russian Legion,…

2 days ago