Based on [RoqueNight's repository]. This script checks various security aspects of a Linux server, including permissions, potential vulnerabilities, and key configurations. It provides a quick overview of the system's security posture.
To run this script, you can use the following commands:
-
Make the script executable:
chmod +x Basic_Linux_Privilege_Escalation_Audit.sh
-
Execute the script:
./Basic_Linux_Privilege_Escalation_Audit.sh
-
Alternatively, you can redirect the output to a file:
./Basic_Linux_Privilege_Escalation_Audit.sh > audit.txt
This script is provided for educational purposes only. Use of this script for testing, either on your own systems or on systems for which you have legal authorization to perform such tests, is highly encouraged. However, executing this script on systems without such authorization is illegal and strictly forbidden. The creator of this script assumes no liability for misuse of this tool or any damage that might be caused by its appropriate or inappropriate use. It is the end user's responsibility to comply with all applicable local, state, and federal laws. Users must consider the impact of any actions they perform and be mindful of the applicable laws and rights of others.
By running this script, you agree to the terms of use and acknowledge that you have the necessary authorizations to perform such assessments.
This project is licensed under the MIT License.
If you would like to contribute to this project, please fork the repository and create a pull request with your changes. We welcome improvements and suggestions.
For any questions or issues, please open an issue in this repository or contact the maintainer.
Thank you for using the Basic Linux Privilege Escalation Audit script. We hope it helps you in securing your systems!