Cyber Research Wiki

linPEAS

An open-source Linux/Unix privilege-escalation enumeration script in the PEASS-ng suite that audits a host for misconfigurations, vulnerabilities, and environmental conditions that could enable local privilege escalation.

Overview

linPEAS is a component of the PEASS-ng (Privilege Escalation Awesome Scripts – next generation) project maintained on GitHub. It targets local, post-compromise auditing of Linux/Unix-like and macOS systems, presenting likely privilege-escalation vectors through color-coded findings and structured sections. The suite provides parsers that convert tool output into machine-readable and report-oriented formats. Distribution is via GitHub releases as shell scripts and prebuilt binaries, with documentation cross-referenced to the HackTricks knowledge base curated by the same author. The project is actively updated.

What It Is

A host-based, read-only-by-default enumerator that inspects configuration, permissions, services, credential artifacts, container/virtualization settings, software versions, and kernel/build information to surface conditions commonly abused for privilege escalation. It is not an exploitation framework; it reports potential paths and leaves validation and exploitation to the operator.

How It Works

linPEAS executes locally on a target host as a POSIX shell script, with compiled binaries also available. It performs modular checks spanning operating system and build details; users, groups, and sudoers configuration; file permissions including SUID/SGID; services, processes, timers, and cron; environment and PATH risks; network and storage mounts such as NFS and fstab; credentials in predictable locations; software and package versions; and indicators of containerization or virtualization (e.g., Docker, LXC, Kubernetes). Findings are highlighted to aid triage. The PEASS-ng builder composes variants with differing check sets (e.g., full, default, small). Output can be post-processed by official PEASS-ng parsers into JSON, HTML, or PDF for analysis and reporting. By design, it avoids writing to disk and avoids credential use; some optional extended checks increase runtime and noisiness.

Core Concepts

Typical Workflow

Use Cases

Limitations

Related Tools

Evidence Gaps

Sources

Confidence

high