Member-only story
CRIMSON LISP
Linux Post-Exploitation tools wrapper.

INTRODUCTION
A quick tour of a tool that automates post-exploitation tasks.
FUNCTIONALITIES
You have to first download the tools to make the
-e
|-l
work.
- Downloading the tools needed for the Post-Exploitation phase.
./lisp.sh -u "http://127.0.0.1/"
- Enumerating system for Privilege escalation (
-e
).
./lisp.sh -e
- Looting the system after escalating to root (
-l
).
sudo ./lisp.sh -l
THE CODE
The program has been divided into three segments (functions).
The tool code is shown below. It will probably change in the future, but the main idea of the three segments will be the same.
DOWNLOAD_TOOLS
Function checks if the architecture is x86 or x64 and downloads appropriate tools needed for the Crimson Lisp to work and additionally nmap with NSE for manual port and vulnerability scanning of the internal network.

ESCALATION
The function uses the tools for the Privilege Escalation and saves the output in the priv directory. After enumeration, the tool prints the reminder about Metasploit modules that can be used and additional manual checks.
After that, the Pspy starts and monitors the Linux processes.

LOOTING
The function uses lazagne to gather credentials, then runs 3snake in the background and enumerates files with the potential credentials.

Then print modules that could be used for a credentials gathering using Metasploit and remind checking User files, browsers, and databases.
In the end, it searches for plain text credentials in the memory and saves all of the output in the loot directory.

FINAL WORDS
Thanks for reading. I hope you enjoy the tool. If you have any suggestions or find a bug feel free to contribute.