linux提权辅助工具(二):linux-exploit-suggester-2.pl

来自:https://github.com/jondonas/linux-exploit-suggester-2/blob/master/linux-exploit-suggester-2.pl

#!/usr/bin/perl
use strict;
use warnings;
use Getopt::Std;our $VERSION = '1.1';my %opts;
getopt( 'k,h', \%opts );
usage() if exists $opts{h};my ( $khost, $is_partial ) = get_kernel();
print "\n\e[00;33m  #############################\e[00m\n";
print "\e[00;31m    Linux Exploit Suggester 2\e[00m\n";
print "\e[00;33m  #############################\e[00m\n";
print "\n  Local Kernel: $khost\n";my %exploits = get_exploits();
print '  Searching among ' . scalar keys(%exploits) . " exploits...\n\n";
print "  \e[00;35mPossible Exploits:\e[00m\n";EXPLOIT:
foreach my $key ( sort keys %exploits ) {foreach my $kernel ( @{ $exploits{$key}{vuln} } ) {if (     $khost eq $kernelor ( $is_partial and index($kernel,$khost) == 0 )) {print "\e[00;33m[\e[00m\e[00;31m+\e[00m\e[00;33m]\e[00m ";print "\e[00;33m$key\e[00m";print " \e[00;33m($kernel)\e[00m" if $is_partial;my $alt = $exploits{$key}{alt};my $cve = $exploits{$key}{cve};my $mlw = $exploits{$key}{mil};if ( $alt or $cve ) {print "\n";}if ( $alt ) { print "     Alt: $alt "; }if ( $cve ) { print "     CVE-$cve"; }if ( $mlw ) { print "\n     Source: $mlw"; }print "\n";next EXPLOIT;}}
}
print "\n";
exit;######################
## extra functions  ##
######################sub get_kernel {my $khost = '';if ( exists $opts{k} ) {$khost = $opts{k};}else {$khost = `uname -r |cut -d"-" -f1`;chomp $khost;}# partial kernels might be provided by the user,# such as '2.4' or '2.6.'my $is_partial = $khost =~ /^\d+\.\d+\.\d?/ ? 0 : 1;return ( $khost, $is_partial );
}sub usage {print <<"EOUSAGE";
Linux Exploit Suggester $VERSION
Usage: \t$0  [-h] [-k kernel][-h] help (this message)
[-k] kernel number eg. 2.6.28You can also provide a partial kernel version (eg. 2.4)
to see all exploits available.EOUSAGE
}sub get_exploits {return ('w00t' => {vuln => ['2.4.10', '2.4.16', '2.4.17', '2.4.18','2.4.19', '2.4.20', '2.4.21',]},'brk' => {vuln => [ '2.4.10', '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ],},'ave' => { vuln => [ '2.4.19', '2.4.20' ] },'elflbl' => {vuln => ['2.4.29'],mil  => 'http://www.exploit-db.com/exploits/744/',},'elfdump'      => { vuln => ['2.4.27'] },'elfcd'        => { vuln => ['2.6.12'] },'expand_stack' => { vuln => ['2.4.29'] },'h00lyshit' => {vuln => ['2.6.8',  '2.6.10', '2.6.11', '2.6.12','2.6.13', '2.6.14', '2.6.15', '2.6.16',],cve => '2006-3626',mil => 'http://www.exploit-db.com/exploits/2013/',},'kdump' => { vuln => ['2.6.13'] },'km2'   => { vuln => [ '2.4.18', '2.4.22' ] },'krad' =>{ vuln => [ '2.6.5', '2.6.7', '2.6.8', '2.6.9', '2.6.10', '2.6.11' ] },'krad3' => {vuln => [ '2.6.5', '2.6.7', '2.6.8', '2.6.9', '2.6.10', '2.6.11' ],mil => 'http://exploit-db.com/exploits/1397',},'local26' => { vuln => ['2.6.13'] },'loko'    => { vuln => [ '2.4.22', '2.4.23', '2.4.24' ] },'mremap_pte' => {vuln => [ '2.4.20', '2.2.24', '2.4.25', '2.4.26', '2.4.27' ],mil => 'http://www.exploit-db.com/exploits/160/',},'newlocal' => { vuln => [ '2.4.17', '2.4.19' ] },'ong_bak'  => { vuln => ['2.6.5'] },'ptrace' =>{ vuln => [ '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ] },'ptrace_kmod' => {vuln => [ '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ],cve  => '2007-4573',},'ptrace_kmod2' => {vuln => ['2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31','2.6.32', '2.6.33', '2.6.34',],alt => 'ia32syscall,robert_you_suck',mil => 'http://www.exploit-db.com/exploits/15023/',cve => '2010-3301',},'ptrace24' => { vuln => ['2.4.9'] },'pwned'    => { vuln => ['2.6.11'] },'py2'      => { vuln => [ '2.6.9', '2.6.17', '2.6.15', '2.6.13' ] },'raptor_prctl' => {vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],cve  => '2006-2451',mil => 'http://www.exploit-db.com/exploits/2031/',},'prctl' => {vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],mil => 'http://www.exploit-db.com/exploits/2004/',},'prctl2' => {vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],mil => 'http://www.exploit-db.com/exploits/2005/',},'prctl3' => {vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],mil => 'http://www.exploit-db.com/exploits/2006/',},'prctl4' => {vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],mil => 'http://www.exploit-db.com/exploits/2011/',},'remap'      => { vuln => ['2.4'] },'rip'        => { vuln => ['2.2'] },'stackgrow2' => { vuln => [ '2.4.29', '2.6.10' ] },'uselib24' => {vuln => [ '2.6.10', '2.4.17', '2.4.22', '2.4.25', '2.4.27', '2.4.29' ]},'newsmp'   => { vuln => ['2.6'] },'smpracer' => { vuln => ['2.4.29'] },'loginx'   => { vuln => ['2.4.22'] },'exp.sh'   => { vuln => [ '2.6.9', '2.6.10', '2.6.16', '2.6.13' ] },'vmsplice1' => {vuln => ['2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22','2.6.23', '2.6.24', '2.6.24.1',],alt => 'jessica biel',cve => '2008-0600',mil => 'http://www.exploit-db.com/exploits/5092',},'vmsplice2' => {vuln => [ '2.6.23', '2.6.24' ],alt  => 'diane_lane',cve  => '2008-0600',mil  => 'http://www.exploit-db.com/exploits/5093',},'vconsole' => {vuln => ['2.6'],cve  => '2009-1046',},'sctp' => {vuln => ['2.6.26'],cve  => '2008-4113',},'ftrex' => {vuln => ['2.6.11', '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16','2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',],cve => '2008-4210',mil => 'http://www.exploit-db.com/exploits/6851',},'exit_notify' => {vuln => [ '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29' ],mil => 'http://www.exploit-db.com/exploits/8369',},'udev' => {vuln => [ '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29' ],alt  => 'udev <1.4.1',cve  => '2009-1185',mil => 'http://www.exploit-db.com/exploits/8478',},'sock_sendpage2' => {vuln => ['2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9','2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15','2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21','2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27','2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33','2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.0',  '2.6.1','2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',  '2.6.7','2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12', '2.6.13','2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18', '2.6.19','2.6.20', '2.6.21', '2.6.22', '2.6.23', '2.6.24', '2.6.25','2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30',],alt => 'proto_ops',cve => '2009-2692',mil => 'http://www.exploit-db.com/exploits/9436',},'sock_sendpage' => {vuln => ['2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9','2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15','2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21','2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27','2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33','2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.0',  '2.6.1','2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',  '2.6.7','2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12', '2.6.13','2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18', '2.6.19','2.6.20', '2.6.21', '2.6.22', '2.6.23', '2.6.24', '2.6.25','2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30',],alt => 'wunderbar_emporium',cve => '2009-2692',mil => 'http://www.exploit-db.com/exploits/9435',},'udp_sendmsg_32bit' => {vuln => ['2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6','2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12','2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18','2.6.19',],cve => '2009-2698',mil =>'http://downloads.securityfocus.com/vulnerabilities/exploits/36108.c',},'pipe.c_32bit' => {vuln => ['2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9','2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15','2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21','2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27','2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33','2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.15', '2.6.16','2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22','2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28','2.6.29', '2.6.30', '2.6.31',],cve => '2009-3547',mil =>'http://www.securityfocus.com/data/vulnerabilities/exploits/36901-1.c',},'do_pages_move' => {vuln => ['2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23','2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29','2.6.30', '2.6.31',],alt => 'sieve',cve => '2010-0415',mil => 'Spenders Enlightenment',},'reiserfs' => {vuln => ['2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23','2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29','2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34',],cve => '2010-1146',mil => 'http://www.exploit-db.com/exploits/12130/',},'can_bcm' => {vuln => ['2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23','2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29','2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35','2.6.36',],cve => '2010-2959',mil => 'http://www.exploit-db.com/exploits/14814/',},'rds' => {vuln => ['2.6.30', '2.6.31', '2.6.32', '2.6.33','2.6.34', '2.6.35', '2.6.36',],mil => 'http://www.exploit-db.com/exploits/15285/',cve => '2010-3904',},'half_nelson' => {vuln => ['2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5','2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11','2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17','2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23','2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29','2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35','2.6.36',],alt => 'econet',cve => '2010-3848',mil => 'http://www.exploit-db.com/exploits/6851',},'half_nelson1' => {vuln => ['2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5','2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11','2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17','2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23','2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29','2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35','2.6.36',],alt => 'econet',cve => '2010-3848',mil => 'http://www.exploit-db.com/exploits/17787/',},'half_nelson2' => {vuln => ['2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5','2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11','2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17','2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23','2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29','2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35','2.6.36',],alt => 'econet',cve => '2010-3850',mil => 'http://www.exploit-db.com/exploits/17787/',},'half_nelson3' => {vuln => ['2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5','2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11','2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17','2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23','2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29','2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35','2.6.36',],alt => 'econet',cve => '2010-4073',mil => 'http://www.exploit-db.com/exploits/17787/',},'caps_to_root' => {vuln => [ '2.6.34', '2.6.35', '2.6.36' ],cve  => 'n/a',mil => 'http://www.exploit-db.com/exploits/15916/',},'american-sign-language' => {vuln => ['2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5','2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11','2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17','2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23','2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29','2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35','2.6.36',],cve => '2010-4347',mil => 'http://www.securityfocus.com/bid/45408/',},'pktcdvd' => {vuln => ['2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5','2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11','2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17','2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23','2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29','2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35','2.6.36',],cve => '2010-3437',mil => 'http://www.exploit-db.com/exploits/15150/',},'video4linux' => {vuln => ['2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5','2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11','2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17','2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23','2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29','2.6.30', '2.6.31', '2.6.32', '2.6.33',],cve => '2010-3081',mil => 'http://www.exploit-db.com/exploits/15024/',},'memodipper' => {vuln => ['2.6.39', '3.0.0', '3.0.1', '3.0.2', '3.0.3', '3.0.4','3.0.5',  '3.0.6', '3.1.0',],cve => '2012-0056',mil => 'http://www.exploit-db.com/exploits/18411/',},'semtex' => {vuln => ['2.6.37', '2.6.38', '2.6.39', '3.0.0', '3.0.1', '3.0.2','3.0.3',  '3.0.4',  '3.0.5',  '3.0.6', '3.1.0',],cve => '2013-2094',mil => 'http://www.exploit-db.com/download/25444/‎',},'perf_swevent' => {vuln => ['3.0.0', '3.0.1', '3.0.2', '3.0.3', '3.0.4', '3.0.5','3.0.6', '3.1.0', '3.2.0', '3.3.0', '3.4.0', '3.4.1','3.4.2', '3.4.3', '3.4.4', '3.4.5', '3.4.6', '3.4.8','3.4.9', '3.5.0', '3.6.0', '3.7.0', '3.8.0', '3.8.1','3.8.2', '3.8.3', '3.8.4', '3.8.5', '3.8.6', '3.8.7','3.8.8', '3.8.9',],cve => '2013-2094',mil => 'http://www.exploit-db.com/download/26131',},'msr' => {vuln => ['2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23','2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.27', '2.6.28','2.6.29', '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34','2.6.35', '2.6.36', '2.6.37', '2.6.38', '2.6.39', '3.0.0','3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',  '3.0.5',  '3.0.6','3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',  '3.5.0',  '3.6.0','3.7.0',  '3.7.6',],cve => '2013-0268',mil => 'http://www.exploit-db.com/exploits/27297/',},'timeoutpwn' => {vuln => ['3.4.0',  '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.9', '3.9.0',  '3.10.0', '3.11.0', '3.12.0', '3.13.0', '3.4.0','3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.5',  '3.8.6',  '3.8.9',  '3.9.0',  '3.9.6',  '3.10.0', '3.10.6', '3.11.0','3.12.0', '3.13.0', '3.13.1'],cve => '2014-0038',mil => 'http://www.exploit-db.com/exploits/31346/',},'rawmodePTY' => {vuln => ['2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35', '2.6.36','2.6.37', '2.6.38', '2.6.39', '3.14.0', '3.15.0'],cve => '2014-0196',mil => 'http://packetstormsecurity.com/files/download/126603/cve-2014-0196-md.c',},'overlayfs' => {vuln => ['3.13.0', '3.16.0', '3.19.0'],cve => '2015-8660',mil => 'https://www.exploit-db.com/exploits/39230/',},'pp_key' => {vuln => ['3.4.0',  '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.1',  '3.8.2',  '3.8.3',  '3.8.4',  '3.8.5',  '3.8.6',  '3.8.7',  '3.8.8',  '3.8.9',  '3.9.0',  '3.9.6',  '3.10.0', '3.10.6', '3.11.0', '3.12.0', '3.13.0', '3.13.1'],cve => '2016-0728',mil => 'https://www.exploit-db.com/exploits/39277/',},'dirty_cow' => {vuln => ['2.6.22', '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35', '2.6.36', '2.6.37', '2.6.38', '2.6.39', '3.0.0',  '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',  '3.0.5',  '3.0.6',  '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',  '3.5.0',  '3.6.0',  '3.7.0',  '3.7.6',  '3.8.0',  '3.9.0', '3.10.0', '3.11.0', '3.12.0', '3.13.0', '3.14.0', '3.15.0', '3.16.0', '3.17.0', '3.18.0', '3.19.0', '4.0.0',  '4.1.0', '4.2.0',  '4.3.0',  '4.4.0',  '4.5.0',  '4.6.0',  '4.7.0'],cve => '2016-5195',mil => 'https://www.exploit-db.com/exploits/40616/',},'af_packet' => {vuln => ['4.4.0' ],cve => '2016-8655',mil => 'https://www.exploit-db.com/exploits/40871/',},'packet_set_ring' => {vuln => ['4.8.0' ],cve => '2017-7308',mil => 'https://www.exploit-db.com/exploits/41994/',},'clone_newuser' => {vuln => ['3.3.5', '3.3.4', '3.3.2', '3.2.13', '3.2.9', '3.2.1', '3.1.8', '3.0.5', '3.0.4', '3.0.2', '3.0.1', '3.2', '3.0.1', '3.0'],cve => 'N\A',mil => 'https://www.exploit-db.com/exploits/38390/',},'get_rekt' => {vuln => ['4.4.0', '4.8.0', '4.10.0', '4.13.0'],cve => '2017-16695',mil => 'https://www.exploit-db.com/exploits/45010',},'exploit_x' => {vuln => ['2.6.22', '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27','2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31', '2.6.32','2.6.33', '2.6.34', '2.6.35', '2.6.36', '2.6.37', '2.6.38','2.6.39', '3.0.0',  '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4','3.0.5',  '3.0.6',  '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0','3.5.0',  '3.6.0',  '3.7.0',  '3.7.6',  '3.8.0',  '3.9.0','3.10.0', '3.11.0', '3.12.0', '3.13.0', '3.14.0', '3.15.0','3.16.0', '3.17.0', '3.18.0', '3.19.0', '4.0.0',  '4.1.0','4.2.0',  '4.3.0',  '4.4.0',  '4.5.0',  '4.6.0',  '4.7.0'],cve => '2018-14665',mil => 'https://www.exploit-db.com/exploits/45697',},);
}__END__
=head1 NAMElinux_exploit_suggester-2.pl - A local exploit suggester for linux=head1 DESCRIPTIONThis perl script will enumerate the possible exploits available for a given kernel version=head1 USAGE$ Local_Exploit_Checker [-h] [-k kernel][-h] helpYou can also provide a partial kernel version (eg. 2.4)
to see all exploits available.=head1 AUTHORJonathan Donas (c) 2018=head1 CHANGELOG
31-12-2018 added exploit_x30-11-2018 added get_rekt15-04-2018 added clone_newuser23-11-2017 added packet_set_ring05-11-2017 added af_packet28-04-2017 added dirty_cow25-07-2016 added overlayfs and pp_key=cut=head1 LICENSELinux Exploit Suggester 2This program is free software; you can redistribute it and/or modifyit under the terms of the GNU General Public License as published bythe Free Software Foundation; either version 2 of the License, or(at your option) any later version.This program is distributed in the hope that it will be useful,but WITHOUT ANY WARRANTY; without even the implied warranty ofMERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See theGNU General Public License for more details.You should have received a copy of the GNU General Public License alongwith this program; if not, write to the Free Software Foundation, Inc.,51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.=cut

 

转载于:https://www.cnblogs.com/zlgxzswjy/p/10249197.html

本文来自互联网用户投稿,该文观点仅代表作者本人,不代表本站立场。本站仅提供信息存储空间服务,不拥有所有权,不承担相关法律责任。如若转载,请注明出处:http://www.mzph.cn/news/484361.shtml

如若内容造成侵权/违法违规/事实不符,请联系多彩编程网进行投诉反馈email:809451989@qq.com,一经查实,立即删除!

相关文章

swap交换算法

交换算法(swap) void swap(int x,int y)void swap(int *px,int *py)#define swap(x,y,t) ((t)(x),(x)(y),(y)(x))void swap(int &x,int &y)template<class T> void swap(T&x,T&y) #include<iostream> using namespace std; void swap(int &x…

《新一代城市大脑建设与发展》专家研讨会在京举办(新版)

&#xff08;这个新版本增加了三位专家的发言&#xff09;2021年6月26日&#xff0c;新一代城市大脑建设与发展专家研讨会在京举办&#xff0c;本次活动由城市大脑全球标准研究组主办&#xff0c;远望智库承办。6G 俱乐部提供了重要支持。20多位专家参与本次研讨会&#xff0c;…

增强学习--蒙特卡洛方法

蒙特卡洛方法 实例代码 下面代码是constant-α monte carlo&#xff0c;这里有一点介绍 1 import numpy as np2 import random3 from collections import defaultdict4 from environment import Env5 6 7 # Monte Carlo Agent which learns every episodes from the sample8 cl…

排序算法-查找算法

排序算法 冒泡排序 从左向右扫描数据&#xff0c;选着最大的数据。要点&#xff1a;比较相邻的两个数&#xff0c;如果左边的数大于右边的数就进行交换。 template<class T> void BubbleSort(T *array, const int length) { for (int i 0; i <length-1; i) { fo…

当法律纽带变成“机器红线”,能让自动驾驶汽车更安全吗?

来源&#xff1a; 脑极体美国汽车协会(American Automobile Association, AAA)与哈佛大学的一项研究结果显示&#xff0c;高达77%的人表示担心自己与自动驾驶汽车共享道路的安全性&#xff0c;62%则担心自动驾驶汽车发生意外时的肇责归属。某种程度上来讲&#xff0c;这可以说是…

JAVA面试——计算机网络

网络体系架构&#xff1a;应用层&#xff1a;为特定应用程序提供传输服务&#xff08;HTTP、DNS协议&#xff09;传输层&#xff1a;提供通用数据传输服务&#xff08;TCP、UDP&#xff09;TCP头部20个字节UDP头部8个字节网络层&#xff1a;为主机提供传输服务&#xff0c;将报…

李联宁|量子计算机:技术路线、风险及战略投资

来源&#xff1a;《学术前沿》杂志2021年4月上&#xff08;微信有删节&#xff09;作者&#xff1a;西安交通大学城市学院教授 李联宁原文责编&#xff1a;桂琰新媒体责编&#xff1a;李思琪视觉&#xff1a;王洋图片来源&#xff1a;网络由于现有半导体微电子技术物理极限的原…

vs code 配置java

VS code 入门 Vs code 配置Java 首先到VS code官网下载VS code软件&#xff0c;打开界面如图&#xff1a; 下载安装好&#xff0c;打开界面如图(注下图已汉化)&#xff1a; 为了便于使用&#xff0c;我们先进行汉化&#xff0c;在最左边点击图1-1中的图标&#xff0c;出现如图…

四、HTTP控制器

1、控制器的作用&#xff1a;数据和视图之间的桥梁 2、控制器创建方法&#xff1a; &#xff08;1&#xff09;手动创建 <?php namespace App\Http\Controllers; class UserController extends Controller { public function showProfile($id) { return view(user.profile,…

机器人行业专利构建与维护刻不容缓,专利研发需下苦功!

来源&#xff1a;机器人大讲堂自我国加入世界贸易组织&#xff0c;已经近20年过去。但不可忽视的是&#xff0c;发达国家或地区利用其产业先发优势&#xff0c;也一直在知识产权和专利上&#xff0c;采用知识产权和专利贸易壁垒&#xff0c;限制我国企业参与国际市场竞争。机器…

java-弹簧布局(自适应窗口)

一、布局管理器 弹簧布局管理器以容器和组件的边缘为操作对象&#xff0c;通过组件与容器边缘以及组件与组件边缘建立约束(建立位置关系)&#xff0c;实现对组件的布局管理。主要通过函数putConstraint(Strting s1,Component c1,int len,Strting s2,Component c2);当s2在s1的北…

从1G到5G,从回顾过去到展望未来

来源&#xff1a;《从1G到5G&#xff1a;移动通信如何改变世界》 作者&#xff1a;王建宙始于20世纪80年代的蜂窝式移动通信&#xff0c;只用了30多年的时间&#xff0c;就实现了在全世界的普及。如今&#xff0c;手机是人们随身携带的使用频率最高的工具。手机改变了人类的沟…

ECMA6--目录

ECMA6(ecma2015) ECMA是一个组织规范&#xff0c;是一个标准严格意义上来说并不是JS&#xff0c;当时JavaScript支持是最好的约等于&#xff0c;js。 [理解] ECMA非常重要&#xff0c;JavaScript是一门语言&#xff0c;个人认为语言最重要的几点&#xff1a;词汇量、语法、语言…

学习笔记二:异步FIFO

1 module fifo1 #(parameter DSIZE 8,2 parameter ASIZE 4) //用格雷码的局限性&#xff1a;循环计数深度必须是2的n次幂&#xff0c;否则就失去了每次只变化一位的特性3 (wclk,wrstn,wdata,wfull,winc,rclk,rrstn,rdata,rempty,…

重磅:国拨概算5.34亿!“新一代人工智能”重大项目项目申报指南发布

来源&#xff1a;brainnews各省、自治区、直辖市及计划单列市科技厅&#xff08;委、局&#xff09;&#xff0c;新疆生产建设兵团科技局&#xff0c;国务院各有关部门&#xff0c;各有关单位&#xff1a;为落实国务院印发的《新一代人工智能发展规划》总体部署&#xff0c;现根…

java-多线程知识

几个排序算法比较 采用多线程实现几个排序算法&#xff0c;比较各个排序算法的优劣&#xff1b;java实现&#xff0c;一个主类&#xff0c;多个内部排序算法进程的接口&#xff0c;涉及到进程间的通信&#xff0c;因为每个进程包含自己的储存空间&#xff0c;无法直接访问其他…

Idea中在代码顶部添加自定义作者和时间

一、在工具栏找到File>settings>Editor>File and Code Templates 二、选择右边的File Header,在编辑框中添加自定义信息&#xff0c;例如&#xff1a; 三、然后点击应用&#xff0c;保存就OK啦&#xff01; 转载于:https://www.cnblogs.com/HelloBigTable/p/10261145.…

MFC框架解析

通过上述方法&#xff0c;我们进行代码的编写&#xff0c;创建一个空项目&#xff0c;我们要编写MFC应有程序&#xff0c;因此设置项目的属性&#xff0c; 项目->属性->链接器->系统->子系统为&#xff1a;窗口 (/SUBSYSTEM:WINDOWS)&#xff0c;项目->属性-&g…