• Stars
    star
    3,951
  • Rank 11,055 (Top 0.3 %)
  • Language
    Go
  • License
    GNU General Publi...
  • Created almost 7 years ago
  • Updated almost 2 years ago

Reviews

There are no reviews yet. Be the first to send feedback to the community and the maintainers!

Repository Details

Monitor linux processes without root permissions

pspy - unprivileged Linux process snooping

Go Report Card Maintainability Test Coverage CircleCI

pspy is a command line tool designed to snoop on processes without need for root permissions. It allows you to see commands run by other users, cron jobs, etc. as they execute. Great for enumeration of Linux systems in CTFs. Also great to demonstrate your colleagues why passing secrets as arguments on the command line is a bad idea.

The tool gathers the info from procfs scans. Inotify watchers placed on selected parts of the file system trigger these scans to catch short-lived processes.

Getting started

Download

Get the tool onto the Linux machine you want to inspect. First get the binaries. Download the released binaries here:

  • 32 bit big, static version: pspy32 download
  • 64 bit big, static version: pspy64 download
  • 32 bit small version: pspy32s download
  • 64 bit small version: pspy64s download

The statically compiled files should work on any Linux system but are quite huge (~4MB). If size is an issue, try the smaller versions which depend on libc and are compressed with UPX (~1MB).

Build

Either use Go installed on your system or run the Docker-based build process which ran to create the release. For the latter, ensure Docker is installed, and then run make build-build-image to build a Docker image, followed by make build to build the binaries with it.

You can run pspy --help to learn about the flags and their meaning. The summary is as follows:

  • -p: enables printing commands to stdout (enabled by default)
  • -f: enables printing file system events to stdout (disabled by default)
  • -r: list of directories to watch with Inotify. pspy will watch all subdirectories recursively (by default, watches /usr, /tmp, /etc, /home, /var, and /opt).
  • -d: list of directories to watch with Inotify. pspy will watch these directories only, not the subdirectories (empty by default).
  • -i: interval in milliseconds between procfs scans. pspy scans regularly for new processes regardless of Inotify events, just in case some events are not received.
  • -c: print commands in different colors. File system events are not colored anymore, commands have different colors based on process UID.
  • --debug: prints verbose error messages which are otherwise hidden.

The default settings should be fine for most applications. Watching files inside /usr is most important since many tools will access libraries inside it.

Some more complex examples:

# print both commands and file system events and scan procfs every 1000 ms (=1sec)
./pspy64 -pf -i 1000 

# place watchers recursively in two directories and non-recursively into a third
./pspy64 -r /path/to/first/recursive/dir -r /path/to/second/recursive/dir -d /path/to/the/non-recursive/dir

# disable printing discovered commands but enable file system events
./pspy64 -p=false -f

Examples

Cron job watching

To see the tool in action, just clone the repo and run make example (Docker needed). It is known passing passwords as command line arguments is not safe, and the example can be used to demonstrate it. The command starts a Debian container in which a secret cron job, run by root, changes a user password every minute. pspy run in foreground, as user myuser, and scans for processes. You should see output similar to this:

~/pspy (master) $ make example
[...]
docker run -it --rm local/pspy-example:latest
[+] cron started
[+] Running as user uid=1000(myuser) gid=1000(myuser) groups=1000(myuser),27(sudo)
[+] Starting pspy now...
Watching recursively    : [/usr /tmp /etc /home /var /opt] (6)
Watching non-recursively: [] (0)
Printing: processes=true file-system events=false
2018/02/18 21:00:03 Inotify watcher limit: 524288 (/proc/sys/fs/inotify/max_user_watches)
2018/02/18 21:00:03 Inotify watchers set up: Watching 1030 directories - watching now
2018/02/18 21:00:03 CMD: UID=0    PID=9      | cron -f
2018/02/18 21:00:03 CMD: UID=0    PID=7      | sudo cron -f
2018/02/18 21:00:03 CMD: UID=1000 PID=14     | pspy
2018/02/18 21:00:03 CMD: UID=1000 PID=1      | /bin/bash /entrypoint.sh
2018/02/18 21:01:01 CMD: UID=0    PID=20     | CRON -f
2018/02/18 21:01:01 CMD: UID=0    PID=21     | CRON -f
2018/02/18 21:01:01 CMD: UID=0    PID=22     | python3 /root/scripts/password_reset.py
2018/02/18 21:01:01 CMD: UID=0    PID=25     |
2018/02/18 21:01:01 CMD: UID=???  PID=24     | ???
2018/02/18 21:01:01 CMD: UID=0    PID=23     | /bin/sh -c /bin/echo -e "KI5PZQ2ZPWQXJKEL\nKI5PZQ2ZPWQXJKEL" | passwd myuser
2018/02/18 21:01:01 CMD: UID=0    PID=26     | /usr/sbin/sendmail -i -FCronDaemon -B8BITMIME -oem root
2018/02/18 21:01:01 CMD: UID=101  PID=27     |
2018/02/18 21:01:01 CMD: UID=8    PID=28     | /usr/sbin/exim4 -Mc 1enW4z-00000Q-Mk

First, pspy prints all currently running processes, each with PID, UID and the command line. When pspy detects a new process, it adds a line to this log. In this example, you find a process with PID 23 which seems to change the password of myuser. This is the result of a Python script used in roots private crontab /var/spool/cron/crontabs/root, which executes this shell command (check crontab and script). Note that myuser can neither see the crontab nor the Python script. With pspy, it can see the commands nevertheless.

CTF example from Hack The Box

Below is an example from the machine Shrek from Hack The Box. In this CTF challenge, the task is to exploit a hidden cron job that's changing ownership of all files in a folder. The vulnerability is the insecure use of a wildcard together with chmod (details for the interested reader). It requires substantial guesswork to find and exploit it. With pspy though, the cron job is easy to find and analyse:

animated demo gif

How it works

Tools exist to list all processes executed on Linux systems, including those that have finished. For instance there is forkstat. It receives notifications from the kernel on process-related events such as fork and exec.

These tools require root privileges, but that should not give you a false sense of security. Nothing stops you from snooping on the processes running on a Linux system. A lot of information is visible in procfs as long as a process is running. The only problem is you have to catch short-lived processes in the very short time span in which they are alive. Scanning the /proc directory for new PIDs in an infinite loop does the trick but consumes a lot of CPU.

A stealthier way is to use the following trick. Process tend to access files such as libraries in /usr, temporary files in /tmp, log files in /var, ... Using the inotify API, you can get notifications whenever these files are created, modified, deleted, accessed, etc. Linux does not require priviledged users for this API since it is needed for many innocent applications (such as text editors showing you an up-to-date file explorer). Thus, while non-root users cannot monitor processes directly, they can monitor the effects of processes on the file system.

We can use the file system events as a trigger to scan /proc, hoping that we can do it fast enough to catch the processes. This is what pspy does. There is no guarantee you won't miss one, but chances seem to be good in my experiments. In general, the longer the processes run, the bigger the chance of catching them is.

Misc

Logo: "By Creative Tail [CC BY 4.0 (http://creativecommons.org/licenses/by/4.0)], via Wikimedia Commons" (link)

More Repositories

1

stego-toolkit

Collection of steganography tools - helps with CTF challenges
Shell
2,124
star
2

cryptanalysis

Tool to break classical ciphers like Caesar, Vigenere or Substitution ciphers
Python
25
star
3

self-driving-car-experiments

Deep learning for self-driving cars experiments
Python
14
star
4

SliverSamples

A collection of sample code used in some experiments with Sliver C2
C
10
star
5

macdump

Dump macOS 1.8+ password hashes to a hashcat-compatible format
Python
8
star
6

deep-learning-essentials

A collection of examples to get you started quickly with deep leraning projects
Python
7
star
7

RegPFA

Process mining algorithm that learns the structure of finite state machines from observations of their behavior
Java
7
star
8

slowport-restarter

CLI utility to reboot Speedport W 724V routers
Go
5
star
9

vgg_docker

VGG image feature extraction and label prediction with docker
Python
4
star
10

goncat

netcat-like CLI tool with advanced features for bind/reverse shells
Go
4
star
11

mnist_neural_network

Example of a neural network development process - from exploration to production
Jupyter Notebook
3
star
12

docker_tutorial

Some docker stuff
JavaScript
3
star
13

iprecon

CLI tool that retrieves WHOIS data for IP addresses
Python
3
star
14

tinyaws

PoC for a Go AWS API client not based on the official SDK
Go
3
star
15

resnet_50_docker

ResNet50 image feature extraction and label prediction with docker
Python
3
star
16

SliverToolbox

A work in progress experiment with Sliver extensions
C
3
star
17

mylittlewebserver

Simple self-made web server - with fork support
Python
3
star
18

nikto_docker

Docker image for nikto web scanner
Shell
3
star
19

intent

Intent classifier
Python
2
star
20

ReverseImageSearch

JavaScript
2
star
21

sysad_notes

Some notes on how to perform ordinary system administration tasks
2
star
22

responder

Chat bot responder service
JavaScript
2
star
23

packer_example

Exemplary setup for Packer with AWS
Shell
2
star
24

matasano_crypto

Solutions for Matasano Crypto Challenges
Python
2
star
25

matasano_cryptopals_go

Cryptopals solutions in Go
Go
1
star
26

uda_ml_nano_capstone

Capstone report
Shell
1
star
27

insurebot_botkit

Test bot for botkit
1
star
28

pfm_bot

Sample chatbot built with MS bot buider
JavaScript
1
star
29

local_mongo

Scripts to start/stop local mongodb docker container
Shell
1
star
30

jinja2_docker

Render Jinja2 templates with this Docker image
Shell
1
star
31

airflow_example

A playground to test airflow
Makefile
1
star
32

titanic_survival

Titanic survial rate dataset analysis
HTML
1
star
33

job_runner

Go
1
star
34

gs_contact_form_backend

Simple example of how Google Scripts can be used as a backend for a contact form
JavaScript
1
star
35

insure_bot

Sample chatbot built with wit.ai and integrated into facebook
JavaScript
1
star
36

big_data_stack

Playground for Hadoop and friends
Shell
1
star
37

boston_housing

Bostin house prices dataset analysis
HTML
1
star
38

docker_images

Collection of personal docker images
Makefile
1
star
39

roman_numerals_kata

Kata with Raimo
Ruby
1
star
40

customer_segments

HTML
1
star
41

socket_io_chat_example

Simple chat application built with node.js and socket.io
JavaScript
1
star
42

workshop_traffic_lights

Dockerized version of a traffic light detection workshop
Jupyter Notebook
1
star
43

student_intervention

Project from Udacity nanodegree
HTML
1
star
44

VF2Errors

This is a VF2 subgraph isomprphism implementation with some errors. Correcting it is an exercise for university students. Do not use this implementation for anything!
Java
1
star
45

cs224d_nlp

My notes on an NLP course with deep learning flavor
Python
1
star
46

dominicbreuker.github.io

Personal Homepage
HTML
1
star
47

arduino-remote

Control your home with your voice
JavaScript
1
star