traitor
cve-2021-3449
traitor | cve-2021-3449 | |
---|---|---|
17 | 4 | |
6,497 | 225 | |
- | - | |
0.0 | 0.0 | |
about 2 months ago | over 2 years ago | |
Go | Go | |
MIT License | - |
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.
traitor
- Traitor – Automatic Linux privesc via exploitation of low-hanging fruits
-
Exploiting
How about traitor?
- Traitor now includes an exploit for CVE-2021-4034 (pwnkit)
- Traitor: Escalada de Privilegios Automático en Linux đź¤
- Traitor: Linux privilege escalation made easy
- Traitor: Automatic Linux privilege escalation via exploitation of low-hanging fruit
- Automatic Linux privesc via exploitation of low-hanging fruit e.g. gtfobins
cve-2021-3449
-
CVE 2021 3449 exploit method
I am trying to understand how to use the information in https://github.com/terorie/cve-2021-3449 to check in my server which has UI and supports TLS 1.2. It does not support renegotiation though but I still wanted to check with exploit to verify whether or not, it is impacted. The link mentions “go run . -host host:port” but I am not able to figure out how to use it as there seem no script to run. Any help would be appreciated.
- CVE-2021-3499 OpenSSL denial-of-service PoC
-
Do these vulns affect Fortigate devices? CVE-2021-3449 - CVE-2021-3450
FortiOS(web gui/sslvpn) is "vulnerable" to CVE-2021-3449, tested using POC https://github.com/terorie/cve-2021-3449 Impact is basically limited to filling up your crashlog, but if you have fortigates your used to that :)
-
OpenSSL Security Advisory [25 March 2021]
Does anyone have a PoC? Someone posted this on Github but the git log is squashed and doesn't show the changes they made. https://github.com/terorie/cve-2021-3449
What are some alternatives?
PEASS-ng - PEASS - Privilege Escalation Awesome Scripts SUITE (with colors)
Caddy - Fast and extensible multi-platform HTTP/1-2-3 web server with automatic HTTPS
pspy - Monitor linux processes without root permissions
httpd - Docker Official Image packaging for Apache HTTP Server
kubesploit - Kubesploit is a cross-platform post-exploitation HTTP/2 Command & Control server and agent written in Golang, focused on containerized environments.
stunner - Stunner is a tool to test and exploit STUN, TURN and TURN over TCP servers.
jaeles - The Swiss Army knife for automated Web Application Testing
OpenSSL - TLS/SSL and crypto library
GTFONow - Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.
hershell - Multiplatform reverse shell generator
Cameradar - Cameradar hacks its way into RTSP videosurveillance cameras
mkcert - A simple zero-config tool to make locally trusted development certificates with any names you'd like.