Categories: Exploitation Tools

Linux Exploit Suggester – A Kali Linux Tool to Find the Linux OS Kernel Exploits

According to Kali Tool list, Linux Exploit Suggester provide just a simple script to keep track of vulnerabilities and suggest possible exploits to gain ‘root‘ on a legitimate penetration test or governing examining body.

This Script will perform by “uname ” -r to find the Linux OS Released Kernel Version.

Additionally possible to provide ‘-k’ flag to manually enter the Kernel Version/Operating System Release Version.

Linux Exploit Suggester Tool

Step 1:

If you don’t Find Linux Exploit Suggester by Default in Kali Linux, from then Download the clone Repositorfrom Github

Once you Download the tool then Extract the Zip and Install it

Step 2:

To find the Linux Kernal Version user uname -v

Step 3:

Here we could see the possible Exploit of lInux kernal Verson 2.6.28 .

Use ” Perl ./Linux_Exploit_suggester.pl -k

Here K Used for Manually enter the Version of OS Kernal.

Here 2.2.28 Linux Kernal version Have some Vulnerabilities to Exploit

Ex : CVE-2010-4347 – American-Sign-Language

Also Read  XSSer automated framework to detect, exploit and report XSS vulnerabilities

Here we tested the Kernel Version 2.6.37.This tool has been discovered some Possible Exploit.

Here we can see some other Exploit for the kernal version 2.6.39

By Using same Method  you can Keep searching the Exploits for another Versions.

Author : Aidy

Also Read Exploitation Framework for Embedded devices – RouterSploit

Balaji

BALAJI is an Ex-Security Researcher (Threat Research Labs) at Comodo Cybersecurity. Editor-in-Chief & Co-Founder - Cyber Security News & GBHackers On Security.

View Comments

Recent Posts

Threat Actors Exploit Google Docs And Weebly Services For Malware Attacks

Phishing attackers used Google Docs to deliver malicious links, bypassing security measures and redirecting victims…

12 hours ago

Python NodeStealer: Targeting Facebook Business Accounts to Harvest Login Credentials

The Python-based NodeStealer, a sophisticated info-stealer, has evolved to target new information and employ advanced…

12 hours ago

XSS Vulnerability in Bing.com Let Attackers Send Crafted Malicious Requests

A significant XSS vulnerability was recently uncovered in Microsoft’s Bing.com, potentially allowing attackers to execute…

15 hours ago

Meta Removed 2 Million Account Linked to Malicious Activities

 Meta has announced the removal of over 2 million accounts connected to malicious activities, including…

18 hours ago

Veritas Enterprise Vault Vulnerabilities Lets Attackers Execute Arbitrary Code Remotely

Critical security vulnerability has been identified in Veritas Enterprise Vault, a widely-used archiving and content…

19 hours ago

7-Zip RCE Vulnerability Let Attackers Execute Remote Code

A critical security vulnerability has been disclosed in the popular file archiving tool 7-Zip, allowing…

19 hours ago