Articles by "Linux"
Showing posts with label Linux. Show all posts
What's more pleasant when you change distribution to have available his configuration files carefully preserved?

When you spend time tweaking the configuration of the display server or its favourite text editor, the idea of ​​losing these famous files gives cold sweats.

Only when we want to make a backup of these files we must do everything by hand and especially we always tend to forget some.
This for this reason that I tinkered a little script Bash that collects your conf files and makes a nice tar.bz2 archive ready to be copied away from crashes.
You can download the script in question here:
This script is very easily customisation. It is divided into two sections: the first contains the commands (the script itself) and the second part is a list of files to save.
You can add filenames as well as directories. In all cases we must give the full path from the root (/). If you indicate a directory, all its content will be copied ... so think about what you add! It may be best to give filenames belonging to the same directory rather than giving the entire directory (I am thinking in particular of the hidden directories used by browsers which contain the cache of your navigation).

Launched as a lambda user, saves the system configuration files (in / etc, / usr ...).
Launched in root, the script will additionally record the configuration of each "human" user (whose uid is greater than or equal to 500)
User configuration files must be indicated using the keyword _USER_ which will be replaced when using the script by the home directory of this user (nothing very complicated, you will easily understand by looking at the list of files by default).

Small note: does not keep the file permissions in memory ... but it is easily modifiable by modifying the arguments passed to tar and cp.
The script needs bash, awk, tar and bzip2 to work.

GitMiner is a complicated search tool for automation in Github, it allows mining Github for helpful or potentially dangerous data or as an example specific vulnerable or helpful WordPress files.

This tool aims to facilitate mining the code or snippets on Github through the site’s search page.

What is Mining Github?

GitHub may be a web-based unpleasant person or version management repository and   web hosting service. it's principally used for code. It offers all of the distributed version management and ASCII text file management (SCM) practicality of unpleasant person   still as adding its own options. It provides access management and a number of other      collaboration options like bug pursuit, feature requests, task management, and wikis for each project
From Wiki.

Mining Github relates to the act of scouring Github victimization the general public computer program for sensitive or helpful data in code, commit messages etc supported sure search patterns (which will embody file sorts, target file structures like wp-config.php and languages used).

It’s a decent apply for associate degree organisation to go looking its own Github repositories if any of them square measure public to make sure they aren’t unseaworthy something sensitive.

$ git clone

$ cd GitMiner

~/GitMiner $ pip3 install -r requirements.txt
$ git clone
$ cd GitMiner
$ docker build -t gitminer .
$ docker run -it gitminer -h   


  | THIS PROGRAM                                      |
       [-h] [-q 'filename:shadow path:etc']
       [-m wordpress] [-o result.txt]
       [-r '/^\s*.*?;?\s*$/gm']
       [-c _octo=GH1.1.2098292984896.153133829439; _ga=GA1.2.36424941.153192375318; user_session=oZIxL2_ajeDplJSndfl37ddaLAEsR2l7myXiiI53STrfhqnaN; __Host-user_session_same_site=oXZxv9_ajeDplV0gAEsmyXiiI53STrfhDN; logged_in=yes; dotcom_user=unkl4b; tz=America%2FSao_Paulo; has_recent_activity=1; _gh_sess=MmxxOXBKQ1RId3NOVGpGcG54aEVnT1o0dGhxdGdzWVpySnFRd1dVYUk5TFZpZXFuTWxOdW1FK1IyM0pONjlzQWtZM2xtaFR3ZDdxlGMCsrWnBIdnhUN0tjVUtMYU1GeG5Pbm5DMThuWUFETnZjcllGOUNkRGUwNUtKOVJTaGR5eUJYamhWRE5XRnMWZZN3Y3dlpFNDZXL1NWUEN4c093RFhQd3RJQ1NBdmhrVDE3VVNiUFF3dHBycC9FeDZ3cFVXV0ZBdXZieUY5WDRlOE9ZSG5sNmRHUmllcmk0Up1MTcyTXZrN1RHYmJSdz09--434afdd652b37745f995ab55fc83]

optional arguments:
  -h, --help            show this help message and exit
  -q 'filename:shadow path:etc', --query 'filename:shadow path:etc'
                        Specify search term
  -m wordpress, --module wordpress
                        Specify the search module
  -o result.txt, --output result.txt
                        Specify the output file where it will be
  -r '/^\s*(.*?);?\s*$/gm', --regex '/^\s*(.*?);?\s*$/gm'
                        Set regex to search in file
  -c _octo=GH1.1.2098292984896.153133829439; _ga=GA1.2.36424941.153192375318; user_session=oZIxL2_ajeDplJSndfl37ddaLAEsR2l7myXiiI53STrfhqnaN; __Host-user_session_same_site=oXZxv9_ajeDplV0gAEsmyXiiI53STrfhDN; logged_in=yes; dotcom_user=unkl4b; tz=America%2FSao_Paulo; has_recent_activity=1; _gh_sess=MmxxOXBKQ1RId3NOVGpGcG54aEVnT1o0dGhxdGdzWVpySnFRd1dVYUk5TFZpZXFuTWxOdW1FK1IyM0pONjlzQWtZM2xtaFR3ZDdxlGMCsrWnBIdnhUN0tjVUtMYU1GeG5Pbm5DMThuWUFETnZjcllGOUNkRGUwNUtKOVJTaGR5eUJYamhWRE5XRnMWZZN3Y3dlpFNDZXL1NWUEN4c093RFhQd3RJQ1NBdmhrVDE3VVNiUFF3dHBycC9FeDZ3cFVXV0ZBdXZieUY5WDRlOE9ZSG5sNmRHUmllcmk0Up1MTcyTXZrN1RHYmJSdz09--434afdd652b37745f995ab55fc83, --cookie _octo=GH1.1.2098292984896.153133829439; _ga=GA1.2.36424941.153192375318; user_session=oZIxL2_ajeDplJSndfl37ddaLAEsR2l7myXiiI53STrfhqnaN; __Host-user_session_same_site=oXZxv9_ajeDplV0gAEsmyXiiI53STrfhDN; logged_in=yes; dotcom_user=unkl4b; tz=America%2FSao_Paulo; has_recent_activity=1; _gh_sess=MmxxOXBKQ1RId3NOVGpGcG54aEVnT1o0dGhxdGdzWVpySnFRd1dVYUk5TFZpZXFuTWxOdW1FK1IyM0pONjlzQWtZM2xtaFR3ZDdxlGMCsrWnBIdnhUN0tjVUtMYU1GeG5Pbm5DMThuWUFETnZjcllGOUNkRGUwNUtKOVJTaGR5eUJYamhWRE5XRnMWZZN3Y3dlpFNDZXL1NWUEN4c093RFhQd3RJQ1NBdmhrVDE3VVNiUFF3dHBycC9FeDZ3cFVXV0ZBdXZieUY5WDRlOE9ZSG5sNmRHUmllcmk0Up1MTcyTXZrN1RHYmJSdz09--434afdd652b37745f995ab55fc83
                        Specify the cookie for your github


Searching for joomla configuration files with passwords:
$:> python3 --query 'filename:configuration extension:php "public password" in:file' -m joomla -c pAAAhPOma9jEsXyLWZ-16RTTsGI8wDawbNs4

You can download GitMiner to mine Github here:

This program run without arguments will perform a 'uname -r' to grab the Linux Operating Systems release version, and return a suggestive list of possible exploits. Nothing fancy, so a patched/back-ported patch may fool this script.
This script has been extremely useful on site and in exams
perl ./ -k 4.11.7
root privilege escalation opportunities on Linux machine,

Sample Output

$ perl ./ -k 2.6.28

Kernel local: 2.6.28

Possible Exploits:
[+] sock_sendpage2
   Alt: proto_ops    CVE-2009-2692
[+] half_nelson3
   Alt: econet    CVE-2010-4073
[+] reiserfs
[+] pktcdvd
[+] american-sign-language
[+] half_nelson
   Alt: econet    CVE-2010-3848
[+] udev
   Alt: udev <1 .4.1="" alt:="" c="" can_bcm="" cve-2009-1185="" cve-2009-2692="" cve-2009-3547="" cve-2010-0415="" cve-2010-2959="" cve-2010-3081="" cve-2010-3301="" cve-2010-3848="" cve-2010-3850="" data="" do_pages_move="" econet="" enlightenment="" exit_notify="" exploits="" half_nelson1="" half_nelson2="" http:="" ia32syscall="" pipe.c_32bit="" pre="" ptrace_kmod2="" robert_you_suck="" sieve="" sock_sendpage="" source:="" spenders="" video4linux="" vulnerabilities="" wunderbar_emporium="""""">