System Weakness

System Weakness is a publication that specialises in publishing upcoming writers in cybersecurity and ethical hacking space. Our security experts write to make the cyber universe more secure, one vulnerability at a time.

Follow publication

Member-only story

CRIMSON LISP

Karol Mazurek
System Weakness
Published in
2 min readJun 15, 2022

--

Linux Post-Exploitation tools wrapper.

Source: https://github.com/Karmaz95/crimson_lisp

INTRODUCTION

A quick tour of a tool that automates post-exploitation tasks.

FUNCTIONALITIES

You have to first download the tools to make the -e | -l work.

  • Downloading the tools needed for the Post-Exploitation phase.
./lisp.sh -u "http://127.0.0.1/"
  • Enumerating system for Privilege escalation (-e).
./lisp.sh -e
  • Looting the system after escalating to root (-l).
sudo ./lisp.sh -l

THE CODE

The program has been divided into three segments (functions).
The tool code is shown below. It will probably change in the future, but the main idea of the three segments will be the same.

DOWNLOAD_TOOLS

Function checks if the architecture is x86 or x64 and downloads appropriate tools needed for the Crimson Lisp to work and additionally nmap with NSE for manual port and vulnerability scanning of the internal network.

Source: Own study — Download function.

ESCALATION

The function uses the tools for the Privilege Escalation and saves the output in the priv directory. After enumeration, the tool prints the reminder about Metasploit modules that can be used and additional manual checks.
After that, the Pspy starts and monitors the Linux processes.

Source: Own study — Escalation function.

LOOTING

The function uses lazagne to gather credentials, then runs 3snake in the background and enumerates files with the potential credentials.

Source: Own study — Looting function.

Then print modules that could be used for a credentials gathering using Metasploit and remind checking User files, browsers, and databases.
In the end, it searches for plain text credentials in the memory and saves all of the output in the loot directory.

Source: Own study — Looting function.

FINAL WORDS

Thanks for reading. I hope you enjoy the tool. If you have any suggestions or find a bug feel free to contribute.

--

--

Published in System Weakness

System Weakness is a publication that specialises in publishing upcoming writers in cybersecurity and ethical hacking space. Our security experts write to make the cyber universe more secure, one vulnerability at a time.

Responses (2)

Write a response