Emp3R0R – Linux Post-Exploitation Framework Made By Linux User
hide processes and files
currently emp3r0r uses libemp3r0r to hide its files and processes, which utilizes glibc hijacking
persistence
currently implemented methods:
- libemp3r0r
- cron
- bash profile and command injection
more will be added in the future
modules
basic command shell
this is not a shell, it just executes any commands you send with sh -c
and sends the result back to you
besides, it provides several useful helpers:
- file management:
put
andget
- command autocompletion
#net
shows basic network info, such asip a
,ip r
,ip neigh
#kill
processes, and a simple#ps
bash
!!! this is the real bash shell, keep on reading!
![Emp3R0R - Linux Post-Exploitation Framework Made By Linux User 1 emp3r0r 07](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/emp3r0r_07.png)
fully interactive and stealth bash shell
a reverse bash shell, started with custom bash
binary and bashrc
, leaving no trace on the system shell
emp3r0r’s terminal supports everything your current terminal supports, you can use it just like an openssh session
but wait, it’s more than just a reverse bash shell, with module vaccine, you can use whatever tool you like on your target system
![Emp3R0R - Linux Post-Exploitation Framework Made By Linux User 2 emp3r0r 08](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/emp3r0r_08.png)
credential harvesting
not implemented yet
i wrote about this in my blog
auto root
currently emp3r0r supports CVE-2018-14665, agents can exploit this vulnerability if possible, and restart itself with root privilege
![Emp3R0R - Linux Post-Exploitation Framework Made By Linux User 3 emp3r0r 09](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/emp3r0r_09.png)
LPE suggest
upload the latest:
- mzet-/linux-exploit-suggester
- pentestmonkey/unix-privesc-check
and run them on target system, return the results
![Emp3R0R - Linux Post-Exploitation Framework Made By Linux User 4 emp3r0r 10](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/emp3r0r_10.png)
port mapping
map any target addresses to CC side, using HTTP2 (or whatever transport your agent uses)
![Emp3R0R - Linux Post-Exploitation Framework Made By Linux User 5 emp3r0r 11](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/emp3r0r_11.png)
plugin system
yes, there is a plugin system. please read the wiki for more information
![Emp3R0R - Linux Post-Exploitation Framework Made By Linux User 6 emp3r0r 12](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/emp3r0r_12.png)
![Emp3R0R - Linux Post-Exploitation Framework Made By Linux User 7 emp3r0r 13](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/emp3r0r_13.png)
thanks
- pty
- guitmz
- readline
- h2conn
- diamorphine
- Upgrading Simple Shells to Fully Interactive TTYs
If you like the site, please consider joining the telegram channel or supporting us on Patreon using the button below.