Skip to content
forked from liamg/traitor

Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins ⬆️ ☠️

License

Notifications You must be signed in to change notification settings

Mafia721/traitor

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

27 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Traitor

Linux privilege escalation made easy.

Packages up a bunch of methods to exploit local misconfigurations/vulns (including all of GTFOBins) in order to gain a root shell.

Demo

Usage

Run with no arguments to find potential vulnerabilities/misconfigurations which could allow privilege escalation.

traitor

Run with the -a/--any flag to find potential vulnerabilities, attempting to exploit each, stopping if a root shell is gained.

traitor -a

Run with the -e/--exploit flag to attempt to exploit a specific vulnerability and gain a root shell.

traitor -e docker:writable-socket

Getting Traitor

Grab a binary from the releases page, or use go:

go get -u github.com/liamg/traitor/cmd/traitor

If the machine you're attempting privesc on cannot reach GitHub to download the binary, and you have no way to upload the binary to the machine over SCP/FTP etc., then you can try base64 encoding the binary on your machine, and echoing the base64 encoded string to | base64 -d > /tmp/traitor on the target machine, remembering to chmod +x it once it arrives.

Included Methods

  • Writable docker.sock (no internet connection or local images required!)
  • sudo:CVE-2021-3156
  • Basic sudo
  • GTFOBins via weak sudo rules
  • Kernel exploits

About

Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins ⬆️ ☠️

Resources

License

Stars

Watchers

Forks

Packages

No packages published

Languages

  • Go 99.5%
  • Makefile 0.5%