| skipped 236 lines |
237 | 237 | | |
238 | 238 | | echo -ne "\n${SECTION_LINE}\n" |
239 | 239 | | echo -e "[*] FINDING RELEVANT PRIVILEGE ESCALATION EXPLOITS..." |
| 240 | + | read -p "[?] Would you like to search for possible exploits? [y/N] " connectToServer |
240 | 241 | | |
241 | | - | # We're gonna do this section a little different |
242 | | - | echo -ne "\n\n\n" |
243 | | - | printf "%*s\n" "80" | tr " " "*" |
244 | | - | echo -ne "This project is still under development.\nTo get involved or check for updates please check \nhttps://github.com/linted/linuxprivchecker\n" |
245 | | - | printf "%*s\n" "80" | tr " " "*" |
| 242 | + | if [[ $connectToServer = y* ]] |
| 243 | + | then |
| 244 | + | read -p "[?] What is the address of the server? " server |
| 245 | + | read -p "[?] What port is the server using? " port |
| 246 | + | echo -ne "\n\n" |
| 247 | + | echo -e "[ ] Searching on $server:$port" |
| 248 | + | printf "%*s\n" "80" | tr " " "*" |
| 249 | + | dpkg -l | tail -n +6 | awk '{print $2, $3} END {print ""}' | nc $server $port |
| 250 | + | printf "%*s\n" "80" | tr " " "*" |
| 251 | + | fi |
246 | 252 | | |
247 | 253 | | echo -ne "\n\n${TITLE_LINE}" |
248 | 254 | | echo -ne "\nFINISHED" |
| skipped 2 lines |