A fully automated, enterprise-grade bash script for comprehensive Linux system reconnaissance, security auditing, and vulnerability assessment. Features advanced detection capabilities, automated vulnerability scoring, and cloud instance exploitation vectors.
FOR AUTHORIZED USE ONLY
This tool is intended solely for:
- Security audits on systems you own
- Authorized penetration testing with written permission
- Educational purposes in controlled lab environments
- System administration of your own infrastructure
Unauthorized access to computer systems is illegal. Users are responsible for obtaining proper authorization before running this tool. Misuse may violate laws including the Computer Fraud and Abuse Act (CFAA), Computer Misuse Act, or similar legislation in your jurisdiction.
- 40+ toggleable scan modules - Enable only what you need
- Advanced color-coded severity levels (99%, 95%, 75%)
- No user interaction required - Fully automated operation
- Comprehensive reporting - Detailed output with timestamps
- Automated vulnerability scoring - Risk assessment with prioritized recommendations
- Automated vulnerability scoring (CRITICAL β LOW)
- Overall risk level calculation
- SSH security analysis with specific CVE checks
- Firewall configuration assessment
- System hardening verification (SELinux, AppArmor, ASLR)
- Password policy and authentication analysis
- Open port security evaluation
- CVE-2021-4034 (PwnKit) detection
- Dirty COW vulnerability detection
- SUID/SGID binary enumeration with dangerous binary flagging
- World-writable file detection in critical directories
- Weak file permission analysis (/etc/passwd, /etc/shadow)
- Sudo misconfiguration detection (NOPASSWD, overly permissive rules)
- Kernel exploit identification (Dirty COW, version checks)
- Linux capability analysis (cap_setuid, cap_sys_admin, etc.)
- PATH hijacking vulnerability detection
- Files with no owner/group
- PolicyKit (Polkit) vulnerability checks
- D-Bus misconfiguration detection
- NFS no_root_squash exploitation
- Writable systemd service files
- Screen/tmux socket hijacking
- LD_PRELOAD and LD_LIBRARY_PATH hijacking
- Docker escape techniques (privileged mode, socket mounting)
- Interesting group memberships (docker, lxd, disk, shadow, sudo)
- AWS EC2 detection with IAM credential extraction
- Azure instance detection with metadata API access
- Google Cloud Platform detection with service account tokens
- Automatic cloud metadata exploitation
- IAM role credential harvesting
- Bash history password extraction
- SSH private key discovery (id_rsa, id_dsa, id_ecdsa, id_ed25519)
- AWS credentials file detection (~/.aws/credentials)
- Hardcoded password search in scripts and configs
- .env file discovery
- API key and secret detection
- Database credential files (.db, .sqlite)
- Certificate and key files (.pem, .key, .p12, .pfx)
- Configuration and backup files (.conf, .config, .bak)
- Complete hardware enumeration (CPU, Memory, USB, PCI devices)
- BIOS/UEFI firmware information
- Kernel version and loaded modules
- System manufacturer and product details
- Performance metrics (CPU, memory, I/O)
- Storage analysis with SMART disk health
- Compiler detection (gcc, g++, python, perl)
- Development tool enumeration (wget, curl, netcat, socat)
- Network interface configuration (IPv4/IPv6)
- Active connections with process mapping
- Local network host discovery (nmap or ping sweep)
- ARP cache and routing tables
- DNS configuration and testing
- Open port enumeration with security flags
- Network statistics and interface details
- Unix socket and named pipe analysis
- Containers: Docker, Podman, Kubernetes, LXC/LXD
- Docker escape detection (privileged containers, socket mounting, CAP_SYS_ADMIN)
- Databases: MySQL, PostgreSQL, MongoDB, Redis
- Web Servers: Apache, Nginx, Lighttpd
- Package Managers: apt, yum, pacman, snap, flatpak
- Security update availability
- Installed software inventory
- User and group enumeration
- Login history and current sessions
- Failed login attempt tracking
- Password aging and policy analysis
- Empty password detection
- Non-root UID 0 user detection
- Sudo privilege enumeration with exploit checking
- SSH key inventory and permission analysis
- Detailed /etc/passwd and /etc/shadow analysis
- Default credential detection
- Running processes (CPU/Memory sorted)
- Systemd service enumeration
- Writable systemd service file detection
- Systemd timer exploitation analysis
- Zombie process detection
- Process tree visualization
- System logs (dmesg, journalctl, auth logs)
- Cron jobs and systemd timers
- At jobs and scheduled tasks
- PATH variable exploitation analysis
- LD_PRELOAD and LD_LIBRARY_PATH hijacking detection
- Writable directories in PATH
- Sensitive environment variables (PASSWORD, API_KEY, TOKEN)
- Writable library paths
- /etc/ld.so.preload manipulation detection
- Linux/Unix operating system
- Bash shell
- Root privileges (recommended for complete scan coverage)
nmap- Enhanced network discoverysmartctl- Disk health monitoringlshw- Detailed hardware informationdmidecode- BIOS/SMBIOS informationethtool- Network interface details
# Clone the repository
git clone https://github.com/yourusername/Looter.git
cd Looter
# Make executable
chmod +x system_scan.sh
# Run the scan
sudo ./system_scan.shEdit the configuration variables at the top of system_scan.sh to customize your scan:
# ============================================================================
# CONFIGURATION SECTION - Enable/Disable Scan Modules
# ============================================================================
# Main Scan Modules
SCAN_BASIC_SYSTEM=true # System info, hardware, kernel
SCAN_HARDWARE_DETAILED=true # Detailed hardware enumeration
SCAN_NETWORK=true # Network configuration
SCAN_NETWORK_DISCOVERY=true # Local network host discovery
SCAN_SERVICES=true # Running services and processes
SCAN_USERS_AUTH=true # Users, groups, authentication
SCAN_SSH_ANALYSIS=true # SSH configuration and vulnerabilities
SCAN_FIREWALL=true # Firewall rules and status
SCAN_SOFTWARE=true # Installed packages
SCAN_STORAGE=true # Disk, filesystem, mount points
SCAN_SECURITY_AUDIT=true # SUID/SGID, world-writable files
SCAN_PRIVILEGE_ESCALATION=true # Privilege escalation vectors
SCAN_CONTAINERS=true # Docker, Podman detection
SCAN_DATABASES=true # Database detection
SCAN_WEB_SERVERS=true # Web server detection
SCAN_SYSTEM_HARDENING=true # SELinux, AppArmor
SCAN_LOGS=true # System logs
SCAN_CRON_SCHEDULED=true # Cron jobs and timers
SCAN_VULNERABILITY_SCORING=true # Automated vulnerability assessment
SCAN_PERFORMANCE=true # Performance metrics
# Privilege Escalation Checks
CHECK_SUID_SGID=true # Find SUID/SGID binaries
CHECK_WORLD_WRITABLE=true # Find world-writable files
CHECK_NO_OWNER=true # Find files with no owner
CHECK_WEAK_PERMISSIONS=true # Check for weak file permissions
CHECK_SUDO_MISCONFIG=true # Check sudo misconfigurations
CHECK_KERNEL_EXPLOITS=true # Check for known kernel vulnerabilities
# Advanced Privilege Escalation Checks
CHECK_POLKIT=true # PolicyKit vulnerabilities (PwnKit)
CHECK_DBUS=true # D-Bus misconfigurations
CHECK_NFS_EXPORTS=true # NFS share misconfigurations
CHECK_WRITEABLE_SERVICES=true # Writable systemd service files
CHECK_SCREEN_TMUX=true # Screen/tmux socket hijacking
CHECK_INTERESTING_GROUPS=true # Interesting group memberships
# Advanced Detection Features
SCAN_CLOUD_DETECTION=true # AWS, Azure, GCP instance detection
SCAN_INTERESTING_FILES=true # Config files, credentials, backups
SCAN_ENVIRONMENT_ANALYSIS=true # PATH, LD_PRELOAD exploitation
SCAN_COMPILER_DETECTION=true # Available compilers and dev tools
SCAN_WRITABLE_PATHS=true # Writable folders in PATH
SCAN_INTERESTING_PERMS=true # /etc files with interesting permissions
SCAN_PASSWD_SHADOW_ANALYSIS=true # Deep password file analysis
SCAN_CAPABILITIES_EXTENDED=true # Extended capability analysis
SCAN_DOCKER_ESCAPE=true # Docker escape techniques
SCAN_SEARCH_PASSWORDS=true # Search for passwords in files
SCAN_BASH_HISTORY=true # Analyze bash history for secrets
SCAN_LDPRELOAD_HIJACK=true # LD_PRELOAD hijacking detection
# Network Settings
NETWORK_SCAN_TIMEOUT=1 # Ping timeout in seconds
NETWORK_SCAN_THREADS=50 # Max concurrent ping threads# Run complete scan with all modules (requires root)
sudo ./system_scan.sh# Edit script to enable only basic modules
SCAN_BASIC_SYSTEM=true
SCAN_NETWORK=true
SCAN_SERVICES=true
# Set all others to false
./system_scan.sh# Enable only privilege escalation checks
SCAN_PRIVILEGE_ESCALATION=true
CHECK_SUID_SGID=true
CHECK_WORLD_WRITABLE=true
CHECK_WEAK_PERMISSIONS=true
CHECK_SUDO_MISCONFIG=true
CHECK_KERNEL_EXPLOITS=true
sudo ./system_scan.sh# Enable network modules
SCAN_NETWORK=true
SCAN_NETWORK_DISCOVERY=true
NETWORK_SCAN_THREADS=100
./system_scan.shThe script generates a timestamped report file: system_scan_YYYY-MM-DD_HH-MM-SS.txt
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β COMPREHENSIVE SECURITY AUDIT & SYSTEM SCANNER β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
=== SYSTEM INFORMATION ===
[Detailed system information...]
=== PRIVILEGE ESCALATION VECTORS ===
[CRITICAL] Dangerous SUID binaries found
[HIGH] Sudo access to dangerous binaries
[MEDIUM] World-writable files in /tmp
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
β AUTOMATED VULNERABILITY SCORING β
ββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββββ
Total Vulnerability Score: 34
Critical Issues: 2
High Issues: 5
Medium Issues: 8
Low Issues: 3
Overall Risk Level: CRITICAL
Priority Recommendations:
1. IMMEDIATE ACTION REQUIRED: Address critical vulnerabilities
2. HIGH PRIORITY: Review and mitigate high-severity issues
3. MEDIUM PRIORITY: Address medium-severity findings
- 99% PE Vector - Critical privilege escalation path (bright red)
- 95% PE Vector - High probability privilege escalation (red)
- 75% PE Vector - Medium-high probability (yellow)
- Interesting Finding - Worth investigating (cyan)
-
CRITICAL (10 points) - Immediate exploitation risk
- SSH Protocol 1 enabled
- Empty passwords allowed
- World-writable /etc/passwd or /etc/shadow
- Dangerous SUID binaries (vim, find, bash, nmap)
- Redis/MongoDB exposed on all interfaces
- Dirty COW kernel vulnerability
- AWS IAM credentials accessible
- Docker socket mounted in container
- Member of docker/lxd/disk group
- Writable systemd service files
- /etc/ld.so.preload writable
- Writable directory in PATH
-
HIGH (7 points) - Significant security risk
- SSH root login permitted
- Writable PATH directories
- NOPASSWD sudo access
- cap_setuid capabilities
- Very old kernel versions
- Databases exposed on all interfaces
- Readable SSH private keys
- Passwords in bash history
- AWS credentials file present
- Member of shadow/sudo group
- NFS no_root_squash configuration
- Hijackable screen/tmux sockets
- PolicyKit SUID binary (PwnKit)
-
MEDIUM (4 points) - Should be addressed
- SSH password authentication enabled
- No active firewall
- SELinux not enforcing
- Services on all interfaces
- Compilers available on system
-
LOW (1 point) - Minor issues
- X11 forwarding enabled
- Files with no owner
- Interesting group memberships
- CRITICAL - Any critical vulnerabilities
- HIGH - 3+ high vulnerabilities
- ELEVATED - Any high or 5+ medium vulnerabilities
- MODERATE - Any medium vulnerabilities
- LOW - Only low or no vulnerabilities
- β SELinux enforcement status
- β AppArmor profile status
- β ASLR (Address Space Layout Randomization)
- β Kernel pointer restriction
- β dmesg restriction
- β ptrace scope
- β Password policies and aging
- β Empty password detection
- β Non-root UID 0 users
- β Failed login attempts
- β Sudo privilege analysis
- β SSH configuration hardening
- β Firewall active status
- β Open port analysis
- β Insecure protocol detection (telnet, FTP)
- β Database exposure checks
- β Service binding analysis
- β SUID/SGID binary enumeration
- β World-writable file detection
- β Critical file permissions
- β Orphaned files (no owner/group)
- β Linux capabilities
Supun Hewagamage
- GitHub: @supunhg
PROPRIETARY - ALL RIGHTS RESERVED
Copyright Β© 2025 Supun Hewagamage. All Rights Reserved.
This software is proprietary and confidential. Unauthorized copying, distribution, modification, or use of this software, via any medium, is strictly prohibited without explicit written permission from Supun Hewagamage.
For licensing inquiries or permission requests, please contact:
- GitHub: https://github.com/supunhg
See the LICENSE file for complete terms and conditions.
This tool is provided for educational and professional security assessment purposes only. Always:
- β Obtain written authorization before scanning any system
- β Use in controlled lab environments for learning
- β Follow responsible disclosure practices
- β Comply with all applicable laws and regulations
- β Never use on systems without explicit permission
- β Do not use for malicious purposes
The authors assume no liability for misuse of this tool.
For licensing, permission requests, or security inquiries:
- GitHub: @supunhg
- Author: Supun Hewagamage
This tool requires explicit written permission for use. Unauthorized use is prohibited.
Remember: With great power comes great responsibility. Use this tool ethically and legally.
- 40+ Scan Modules - Comprehensive coverage
- 100+ Security Checks - Thorough analysis
- 50+ CVE Detections - Known vulnerabilities
- 10+ Cloud Services - AWS, Azure, GCP
- 20+ Credential Patterns - Secret hunting
- Automated Scoring - Risk assessment
- LinPEAS Enhanced - Superior capabilities
β
Proprietary algorithms not available in open-source tools
β
Automated vulnerability scoring saves analysis time
β
Cloud exploitation built-in (AWS/Azure/GCP)
β
40+ configurable modules for precise scanning
β
LinPEAS-inspired color coding for quick triage
β
Enterprise-grade detection capabilities
β
Active development by security professionals
β
Professional support available for licensed users
Copyright Β© 2025 Supun Hewagamage. All Rights Reserved.