Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Added Linux Smart Enumeration to Linux Privesc TTPs #125

Closed
wants to merge 1 commit into from

Conversation

d0n601
Copy link
Contributor

@d0n601 d0n601 commented Aug 21, 2024

Summary:
This TTP helps identify privilege escalation paths using Linux Smart
Enumeration, a tool that automates the discovery of local privilege escalation
vulnerabilities on Linux-based operating systems.

Arguments

Pre-requisites

  1. A Linux-based operating system.
  2. Bash shell.

Examples

You can run the TTP using the following example (after updating the arguments):

ttpforge run forgearmory//privilege-escalation/linux/identify-privilege-escalation-paths-with-lse/identify-privilege-escalation-paths-with-lse.yaml \
  --arg escalate_privileges=true

Steps

  1. ensure-root-user-if-required: This step checks if the TTP needs to be run
    as root and ensures that it is being executed as the root user.
  2. download-and-run-lse: This step downloads the latest version of lse.sh
    from GitHub and executes it with bash.

Manual Reproduction Steps

# Escalate privileges to root (optional - being root gives you more info)
sudo su

# Download and run lse
curl -sL https://github.com/diego-treitos/linux-smart-enumeration/releases/latest/download/lse.sh | bash

MITRE ATT&CK Mapping

  • Tactics:
    • TA0003 Execution
    • TA0007 Discovery
  • Techniques:
    • T1059 Command and Scripting Interpreter
    • T1087 Account Discovery
    • T1083 File and Directory Discovery
    • T1057 Process Discovery
    • T1069 Permission Groups Discovery
    • T1518 Software Discovery
    • T1082 System Information Discovery
    • T1033 System Owner/User Discovery
    • T1007 System Service Discovery
  • Subtechniques:
    • T1059.004 Command and Scripting Interpreter Unix Shell

Differential Revision: D61623273

Summary:
This TTP helps identify privilege escalation paths using Linux Smart
Enumeration, a tool that automates the discovery of local privilege escalation
vulnerabilities on Linux-based operating systems.

## Arguments

- **escalate_privileges**: A boolean flag indicating whether to run the TTP as
  root or not. Default is false.
- **download_link**: The URL to download the latest version of `lse.sh` from
  GitHub. Default is
  [https://github.com/diego-treitos/linux-smart-enumeration/releases/latest/download/lse.sh](https://github.com/diego-treitos/linux-smart-enumeration/releases/latest/download/lse.sh)

## Pre-requisites

1. A Linux-based operating system.
2. Bash shell.

## Examples

You can run the TTP using the following example (after updating the arguments):

```bash
ttpforge run forgearmory//privilege-escalation/linux/identify-privilege-escalation-paths-with-lse/identify-privilege-escalation-paths-with-lse.yaml \
  --arg escalate_privileges=true
```

## Steps

1. **ensure-root-user-if-required**: This step checks if the TTP needs to be run
   as root and ensures that it is being executed as the root user.
2. **download-and-run-lse**: This step downloads the latest version of `lse.sh`
   from GitHub and executes it with bash.

## Manual Reproduction Steps

```
# Escalate privileges to root (optional - being root gives you more info)
sudo su

# Download and run lse
curl -sL https://github.com/diego-treitos/linux-smart-enumeration/releases/latest/download/lse.sh | bash
```

## MITRE ATT&CK Mapping

- **Tactics**:
  - TA0003 Execution
  - TA0007 Discovery
- **Techniques**:
  - T1059 Command and Scripting Interpreter
  - T1087 Account Discovery
  - T1083 File and Directory Discovery
  - T1057 Process Discovery
  - T1069 Permission Groups Discovery
  - T1518 Software Discovery
  - T1082 System Information Discovery
  - T1033 System Owner/User Discovery
  - T1007 System Service Discovery
- **Subtechniques**:
  - T1059.004 Command and Scripting Interpreter Unix Shell

Differential Revision: D61623273
@facebook-github-bot
Copy link
Contributor

This pull request was exported from Phabricator. Differential Revision: D61623273

@facebook-github-bot
Copy link
Contributor

This pull request has been merged in fee6160.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants