Saturday, September 7, 2024
HomeExploitation ToolsLinux Exploit Suggester - A Kali Linux Tool to Find the...

Linux Exploit Suggester – A Kali Linux Tool to Find the Linux OS Kernel Exploits

Published on

According to Kali Tool list, Linux Exploit Suggester provide just a simple script to keep track of vulnerabilities and suggest possible exploits to gain ‘root‘ on a legitimate penetration test or governing examining body.

This Script will perform by “uname ” -r to find the Linux OS Released Kernel Version.

Additionally possible to provide ‘-k’ flag to manually enter the Kernel Version/Operating System Release Version.

- Advertisement - EHA

Linux Exploit Suggester Tool 

Step 1:

If you don’t Find Linux Exploit Suggester by Default in Kali Linux, from then Download the clone Repositorfrom Github

Once you Download the tool then Extract the Zip and Install itLinux Exploit Suggester -simple script to keep track of vulnerabilities

Step 2:

To find the Linux Kernal Version user uname -v

Linux Exploit Suggester -simple script to keep track of vulnerabilities

Step 3:

Here we could see the possible Exploit of lInux kernal Verson 2.6.28 .

Use ” Perl ./Linux_Exploit_suggester.pl -k

Here K Used for Manually enter the Version of OS Kernal.

Here 2.2.28 Linux Kernal version Have some Vulnerabilities to Exploit

Ex : CVE-2010-4347 – American-Sign-Language

Also Read  XSSer automated framework to detect, exploit and report XSS vulnerabilities

Linux Exploit Suggester -simple script to keep track of vulnerabilities

Here we tested the Kernel Version 2.6.37.This tool has been discovered some Possible Exploit.

Linux Exploit Suggester a simple script to keep track of vulnerabilities

Here we can see some other Exploit for the kernal version 2.6.39

Linux Exploit Suggester -simple script to keep track of vulnerabilities

By Using same Method  you can Keep searching the Exploits for another Versions.

Author : Aidy

Also Read Exploitation Framework for Embedded devices – RouterSploit

Balaji
Balaji
BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

Latest articles

BBTok Abuses Legitimate Windows Utility Command Tool to Stay Undetected

Cybercriminals in Latin America have increased their use of phishing scams targeting business transactions...

Predator Spyware Exploiting “one-click” & “zero-click” Flaws

Recent research indicates that the Predator spyware, once thought to be inactive due to...

Tropic Trooper Attacks Government Organizations to Steal Sensitive Data

Tropic Trooper (aka KeyBoy, Pirate Panda, and APT23) is a sophisticated cyberespionage APT group,...

NoiseAttack is a Novel Backdoor That Uses Power Spectral Density For Evasion

NoiseAttack is a new method of secretly attacking deep learning models. It uses triggers...

Free Webinar

Decoding Compliance | What CISOs Need to Know

Non-compliance can result in substantial financial penalties, with average fines reaching up to $4.5 million for GDPR breaches alone.

Join us for an insightful panel discussion with Chandan Pani, CISO - LTIMindtree and Ashish Tandon, Founder & CEO – Indusface, as we explore the multifaceted role of compliance in securing modern enterprises.

Discussion points

The Role of Compliance
The Alphabet Soup of Compliance
Compliance
SaaS and Compliance
Indusface's Approach to Compliance

More like this

Hackers Toolkit Unveiled, Comprehensive Tools For Various Cyber Attacks

Hackers always keep updating their tools and add new ones to adapt to evolving...

TAG-100 Actors Using Open-Source Tools To Attack Gov & Private Orgs

Hackers exploit open-source tools to execute attacks because they are readily available, well-documented, and...

EgressBuster – A Pentesting Tool to Compromise Victim via Command & Control using Firewall

Network Firewalls acts as a fortification to keep the internal corporate network secure. Many...