{"id":13849,"date":"2021-06-29T15:23:19","date_gmt":"2021-06-29T09:53:19","guid":{"rendered":"https:\/\/kalilinuxtutorials.com\/?p=13849"},"modified":"2021-06-29T15:23:19","modified_gmt":"2021-06-29T09:53:19","slug":"kconfig","status":"publish","type":"post","link":"https:\/\/kalilinuxtutorials.com\/kconfig\/","title":{"rendered":"Kconfig : Hardened-Check &#8211; A Tool For Checking The Hardening Options In The Linux Kernel Config"},"content":{"rendered":"\n<p>Kconfig is a tool For Checking The Hardening Options In The Linux Kernel Config<\/p>\n\n\n\n<p>There are plenty of Linux kernel hardening config options. A lot of them are not enabled by the major distros. We have to enable these options ourselves to make our systems more secure.<\/p>\n\n\n\n<p>But nobody likes checking configs manually. So let the computers do their job!<\/p>\n\n\n\n<p><strong>kconfig-hardened-check.py<\/strong>&nbsp;helps me to check the Linux kernel Kconfig option list against my hardening preferences, which are based on the<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><a href=\"http:\/\/kernsec.org\/wiki\/index.php\/Kernel_Self_Protection_Project\/Recommended_Settings\">KSPP recommended settings<\/a>,<\/li><li><a href=\"https:\/\/docs.clip-os.org\/clipos\/kernel.html#configuration\">CLIP OS kernel configuration<\/a>,<\/li><li>last public&nbsp;<a href=\"https:\/\/grsecurity.net\/\">grsecurity<\/a>&nbsp;patch (options which they disable),<\/li><li><a href=\"https:\/\/lwn.net\/Articles\/791863\/\">SECURITY_LOCKDOWN_LSM<\/a>&nbsp;patchset,<\/li><li>direct feedback from Linux kernel maintainers (Daniel Vetter in&nbsp;<a href=\"https:\/\/github.com\/a13xp0p0v\/kconfig-hardened-check\/issues\/38\">issue #38<\/a>).<\/li><\/ul>\n\n\n\n<p>I also created&nbsp;<a href=\"https:\/\/github.com\/a13xp0p0v\/linux-kernel-defence-map\"><strong>Linux Kernel Defence Map<\/strong><\/a>&nbsp;that is a graphical representation of the relationships between these hardening features and the corresponding vulnerability classes or exploitation techniques.<\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-vivid-green-cyan-background-color has-text-color has-background\"><strong>Supported Microarchitectures<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>X86_64<\/li><li>X86_32<\/li><li>ARM64<\/li><li>ARM<\/li><\/ul>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Installation<\/strong><\/p>\n\n\n\n<p>You can install the package:<\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>pip install git+https:\/\/github.com\/a13xp0p0v\/kconfig-hardened-check<\/strong><\/p>\n\n\n\n<p>or simply run&nbsp;<strong><code>.\/bin\/kconfig-hardened-check<\/code>&nbsp;<\/strong>from the cloned repository.<\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Usage<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>usage: kconfig-hardened-check [-h] [&#8211;version] [-p {X86_64,X86_32,ARM64,ARM}]<br>[-c CONFIG]<br>[-m {verbose,json,show_ok,show_fail}]<br>Checks the hardening options in the Linux kernel config<br>optional arguments:<br>-h, &#8211;help show this help message and exit<br>&#8211;version show program&#8217;s version number and exit<br>-p {X86_64,X86_32,ARM64,ARM}, &#8211;print {X86_64,X86_32,ARM64,ARM}<br>print hardening preferences for selected architecture<br>-c CONFIG, &#8211;config CONFIG<br>check the kernel config file against these preferences<br>-m {verbose,json,show_ok,show_fail}, &#8211;mode {verbose,json,show_ok,show_fail}<br>choose the report mode<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-vivid-green-cyan-background-color has-background\"><strong>Output for&nbsp;<code>Ubuntu 20.04 LTS (Focal Fossa)<\/code>&nbsp;kernel config<\/strong><\/p>\n\n\n\n<p class=\"has-vivid-green-cyan-color has-black-background-color has-text-color has-background\"><strong>$ .\/bin\/kconfig-hardened-check -c kconfig_hardened_check\/config_files\/distros\/ubuntu-focal.config<br>[+] Config file to check: kconfig_hardened_check\/config_files\/distros\/ubuntu-focal.config<br>[+] Detected architecture: X86_64<br>[+] Detected kernel version: 5.4<br>option name | desired val | decision | reason | check resultCONFIG_BUG | y |defconfig | self_protection | OK<br>CONFIG_SLUB_DEBUG | y |defconfig | self_protection | OK<br>CONFIG_GCC_PLUGINS | y |defconfig | self_protection | FAIL: not found<br>CONFIG_STACKPROTECTOR_STRONG | y |defconfig | self_protection | OK<br>CONFIG_STRICT_KERNEL_RWX | y |defconfig | self_protection | OK<br>CONFIG_STRICT_MODULE_RWX | y |defconfig | self_protection | OK<br>CONFIG_REFCOUNT_FULL | y |defconfig | self_protection | FAIL: &#8220;is not set&#8221;<br>CONFIG_IOMMU_SUPPORT | y |defconfig | self_protection | OK<br>CONFIG_RANDOMIZE_BASE | y |defconfig | self_protection | OK<br>CONFIG_THREAD_INFO_IN_TASK | y |defconfig | self_protection | OK<br>CONFIG_VMAP_STACK | y |defconfig | self_protection | OK<br>CONFIG_MICROCODE | y |defconfig | self_protection | OK<br>CONFIG_RETPOLINE | y |defconfig | self_protection | OK<br>CONFIG_X86_SMAP | y |defconfig | self_protection | OK<br>CONFIG_SYN_COOKIES | y |defconfig | self_protection | OK<br>CONFIG_X86_UMIP | y |defconfig | self_protection | OK: CONFIG_X86_INTEL_UMIP &#8220;y&#8221;<br>CONFIG_PAGE_TABLE_ISOLATION | y |defconfig | self_protection | OK<br>CONFIG_RANDOMIZE_MEMORY | y |defconfig | self_protection | OK<br>CONFIG_INTEL_IOMMU | y |defconfig | self_protection | OK<br>CONFIG_AMD_IOMMU | y |defconfig | self_protection | OK<br>CONFIG_SECURITY_DMESG_RESTRICT | y | kspp | self_protection | FAIL: &#8220;is not set&#8221;<br>CONFIG_BUG_ON_DATA_CORRUPTION | y | kspp | self_protection | FAIL: &#8220;is not set&#8221;<br>CONFIG_DEBUG_WX | y | kspp | self_protection | OK<br>CONFIG_SCHED_STACK_END_CHECK | y | kspp | self_protection | OK<br>CONFIG_SLAB_FREELIST_HARDENED | y | kspp | self_protection | OK<br>CONFIG_SLAB_FREELIST_RANDOM | y | kspp | self_protection | OK<br>CONFIG_SHUFFLE_PAGE_ALLOCATOR | y | kspp | self_protection | OK<br>CONFIG_FORTIFY_SOURCE | y | kspp | self_protection | OK<br>CONFIG_DEBUG_LIST | y | kspp | self_protection | FAIL: &#8220;is not set&#8221;<br>CONFIG_DEBUG_SG | y | kspp | self_protection | FAIL: &#8220;is not set&#8221;<br>CONFIG_DEBUG_CREDENTIALS | y | kspp | self_protection | FAIL: &#8220;is not set&#8221;<br>CONFIG_DEBUG_NOTIFIERS | y | kspp | self_protection | FAIL: &#8220;is not set&#8221;<br>CONFIG_INIT_ON_ALLOC_DEFAULT_ON | y | kspp | self_protection | OK<br>CONFIG_GCC_PLUGIN_LATENT_ENTROPY | y | kspp | self_protection | FAIL: not found<br>CONFIG_GCC_PLUGIN_RANDSTRUCT | y | kspp | self_protection | FAIL: not found<br>CONFIG_HARDENED_USERCOPY | y | kspp | self_protection | OK<br>CONFIG_HARDENED_USERCOPY_FALLBACK | is not set | kspp | self_protection | FAIL: &#8220;y&#8221;<br>CONFIG_MODULE_SIG | y | kspp | self_protection | OK<br>CONFIG_MODULE_SIG_ALL | y | kspp | self_protection | OK<br>CONFIG_MODULE_SIG_SHA512 | y | kspp | self_protection | OK<br>CONFIG_MODULE_SIG_FORCE | y | kspp | self_protection | FAIL: &#8220;is not set&#8221;<br>CONFIG_INIT_STACK_ALL_ZERO | y | kspp | self_protection | FAIL: not found<br>CONFIG_INIT_ON_FREE_DEFAULT_ON | y | kspp | self_protection | OK: CONFIG_PAGE_POISONING_ZERO &#8220;y&#8221;<br>CONFIG_GCC_PLUGIN_STACKLEAK | y | kspp | self_protection | FAIL: not found<br>CONFIG_DEFAULT_MMAP_MIN_ADDR | 65536 | kspp | self_protection | OK<br>CONFIG_DEBUG_VIRTUAL | y | clipos | self_protection | FAIL: &#8220;is not set&#8221;<br>CONFIG_STATIC_USERMODEHELPER | y | clipos | self_protection | FAIL: &#8220;is not set&#8221;<br>CONFIG_EFI_DISABLE_PCI_DMA | y | clipos | self_protection | FAIL: not found<br>CONFIG_SLAB_MERGE_DEFAULT | is not set | clipos | self_protection | FAIL: &#8220;y&#8221;<br>CONFIG_RANDOM_TRUST_BOOTLOADER | is not set | clipos | self_protection | FAIL: &#8220;y&#8221;<br>CONFIG_RANDOM_TRUST_CPU | is not set | clipos | self_protection | FAIL: &#8220;y&#8221;<br>CONFIG_GCC_PLUGIN_RANDSTRUCT_PERFORMANCE | is not set | clipos | self_protection | FAIL: CONFIG_GCC_PLUGIN_RANDSTRUCT not &#8220;y&#8221;<br>CONFIG_STACKLEAK_METRICS | is not set | clipos | self_protection | FAIL: CONFIG_GCC_PLUGIN_STACKLEAK not &#8220;y&#8221;<br>CONFIG_STACKLEAK_RUNTIME_DISABLE | is not set | clipos | self_protection | FAIL: CONFIG_GCC_PLUGIN_STACKLEAK not &#8220;y&#8221;<br>CONFIG_INTEL_IOMMU_DEFAULT_ON | y | clipos | self_protection | FAIL: &#8220;is not set&#8221;<br>CONFIG_INTEL_IOMMU_SVM | y | clipos | self_protection | OK<br>CONFIG_UBSAN_BOUNDS | y | my | self_protection | FAIL: CONFIG_UBSAN_TRAP not &#8220;y&#8221;<br>CONFIG_RESET_ATTACK_MITIGATION | y | my | self_protection | OK<br>CONFIG_AMD_IOMMU_V2 | y | my | self_protection | FAIL: &#8220;m&#8221;<br>CONFIG_SECURITY | y |defconfig | security_policy | OK<br>CONFIG_SECURITY_YAMA | y | kspp | security_policy | OK<br>CONFIG_SECURITY_WRITABLE_HOOKS | is not set | my | security_policy | OK: not found<br>CONFIG_SECURITY_LOCKDOWN_LSM | y | clipos | security_policy | OK<br>CONFIG_SECURITY_LOCKDOWN_LSM_EARLY | y | clipos | security_policy | OK<br>CONFIG_LOCK_DOWN_KERNEL_FORCE_CONFIDENTIALITY| y | clipos | security_policy | FAIL: &#8220;is not set&#8221;<br>CONFIG_SECURITY_SAFESETID | y | my | security_policy | OK<br>CONFIG_SECURITY_LOADPIN | y | my | security_policy | FAIL: &#8220;is not set&#8221;<br>CONFIG_SECURITY_LOADPIN_ENFORCE | y | my | security_policy | FAIL: CONFIG_SECURITY_LOADPIN not &#8220;y&#8221;<br>CONFIG_SECCOMP | y |defconfig | cut_attack_surface | OK<br>CONFIG_SECCOMP_FILTER | y |defconfig | cut_attack_surface | OK<br>CONFIG_STRICT_DEVMEM | y |defconfig | cut_attack_surface | OK<br>CONFIG_ACPI_CUSTOM_METHOD | is not set | kspp | cut_attack_surface | OK<br>CONFIG_COMPAT_BRK | is not set | kspp | cut_attack_surface | OK<br>CONFIG_DEVKMEM | is not set | kspp | cut_attack_surface | OK<br>CONFIG_COMPAT_VDSO | is not set | kspp | cut_attack_surface | OK<br>CONFIG_BINFMT_MISC | is not set | kspp | cut_attack_surface | FAIL: &#8220;m&#8221;<br>CONFIG_INET_DIAG | is not set | kspp | cut_attack_surface | FAIL: &#8220;m&#8221;<br>CONFIG_KEXEC | is not set | kspp | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_PROC_KCORE | is not set | kspp | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_LEGACY_PTYS | is not set | kspp | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_HIBERNATION | is not set | kspp | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_IA32_EMULATION | is not set | kspp | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_X86_X32 | is not set | kspp | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_MODIFY_LDT_SYSCALL | is not set | kspp | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_OABI_COMPAT | is not set | kspp | cut_attack_surface | OK: not found<br>CONFIG_MODULES | is not set | kspp | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_DEVMEM | is not set | kspp | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_IO_STRICT_DEVMEM | y | kspp | cut_attack_surface | FAIL: &#8220;is not set&#8221;<br>CONFIG_LEGACY_VSYSCALL_NONE | y | kspp | cut_attack_surface | FAIL: &#8220;is not set&#8221;<br>CONFIG_ZSMALLOC_STAT | is not set |grsecurity| cut_attack_surface | OK<br>CONFIG_PAGE_OWNER | is not set |grsecurity| cut_attack_surface | OK<br>CONFIG_DEBUG_KMEMLEAK | is not set |grsecurity| cut_attack_surface | OK<br>CONFIG_BINFMT_AOUT | is not set |grsecurity| cut_attack_surface | OK: not found<br>CONFIG_KPROBES | is not set |grsecurity| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_UPROBES | is not set |grsecurity| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_GENERIC_TRACER | is not set |grsecurity| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_PROC_VMCORE | is not set |grsecurity| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_PROC_PAGE_MONITOR | is not set |grsecurity| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_USELIB | is not set |grsecurity| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_CHECKPOINT_RESTORE | is not set |grsecurity| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_USERFAULTFD | is not set |grsecurity| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_HWPOISON_INJECT | is not set |grsecurity| cut_attack_surface | FAIL: &#8220;m&#8221;<br>CONFIG_MEM_SOFT_DIRTY | is not set |grsecurity| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_DEVPORT | is not set |grsecurity| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_DEBUG_FS | is not set |grsecurity| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_NOTIFIER_ERROR_INJECTION | is not set |grsecurity| cut_attack_surface | FAIL: &#8220;m&#8221;<br>CONFIG_X86_PTDUMP | is not set |grsecurity| cut_attack_surface | OK<br>CONFIG_DRM_LEGACY | is not set |maintainer| cut_attack_surface | OK<br>CONFIG_FB | is not set |maintainer| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_VT | is not set |maintainer| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_AIO | is not set |grapheneos| cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_STAGING | is not set | clipos | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_KSM | is not set | clipos | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_KALLSYMS | is not set | clipos | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_X86_VSYSCALL_EMULATION | is not set | clipos | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_MAGIC_SYSRQ | is not set | clipos | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_KEXEC_FILE | is not set | clipos | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_USER_NS | is not set | clipos | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_X86_MSR | is not set | clipos | cut_attack_surface | FAIL: &#8220;m&#8221;<br>CONFIG_X86_CPUID | is not set | clipos | cut_attack_surface | FAIL: &#8220;m&#8221;<br>CONFIG_IO_URING | is not set | clipos | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_X86_IOPL_IOPERM | is not set | clipos | cut_attack_surface | OK: not found<br>CONFIG_ACPI_TABLE_UPGRADE | is not set | clipos | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_EFI_CUSTOM_SSDT_OVERLAYS | is not set | clipos | cut_attack_surface | OK: not found<br>CONFIG_LDISC_AUTOLOAD | is not set | clipos | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_X86_INTEL_TSX_MODE_OFF | y | clipos | cut_attack_surface | OK<br>CONFIG_EFI_TEST | is not set | lockdown | cut_attack_surface | FAIL: &#8220;m&#8221;<br>CONFIG_BPF_SYSCALL | is not set | lockdown | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_MMIOTRACE_TEST | is not set | lockdown | cut_attack_surface | OK<br>CONFIG_TRIM_UNUSED_KSYMS | y | my | cut_attack_surface | FAIL: not found<br>CONFIG_MMIOTRACE | is not set | my | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_LIVEPATCH | is not set | my | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_IP_DCCP | is not set | my | cut_attack_surface | FAIL: &#8220;m&#8221;<br>CONFIG_IP_SCTP | is not set | my | cut_attack_surface | FAIL: &#8220;m&#8221;<br>CONFIG_FTRACE | is not set | my | cut_attack_surface | FAIL: &#8220;y&#8221;<br>CONFIG_VIDEO_VIVID | is not set | my | cut_attack_surface | FAIL: &#8220;m&#8221;<br>CONFIG_INPUT_EVBUG | is not set | my | cut_attack_surface | FAIL: &#8220;m&#8221;<br>CONFIG_INTEGRITY | y |defconfig |userspace_hardening | OK<br>CONFIG_ARCH_MMAP_RND_BITS | 32 | clipos |userspace_hardening | FAIL: &#8220;28&#8221;<br>[+] Config check is finished: &#8216;OK&#8217; &#8211; 58 \/ &#8216;FAIL&#8217; &#8211; 81<\/strong><\/p>\n\n\n\n<p class=\"has-text-align-center has-black-color has-vivid-green-cyan-background-color has-text-color has-background\"><strong>kconfig-hardened-check versioning<\/strong><\/p>\n\n\n\n<p>I usually update the kernel hardening recommendations after each Linux kernel release.<\/p>\n\n\n\n<p>So the version of&nbsp;<strong><code>kconfig-hardened-check<\/code>&nbsp;<\/strong>is associated with the corresponding version of the kernel.<\/p>\n\n\n\n<p>The version format is:&nbsp;<strong>[major_number].[kernel_version].[kernel_patchlevel]<\/strong><\/p>\n\n\n\n<div class=\"wp-block-buttons is-content-justification-center is-layout-flex wp-block-buttons-is-layout-flex\">\n<div class=\"wp-block-button is-style-outline is-style-outline--1\"><a class=\"wp-block-button__link has-vivid-cyan-blue-background-color has-background\" href=\"https:\/\/github.com\/a13xp0p0v\/kconfig-hardened-check#installation\"><strong>Download<\/strong><\/a><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Kconfig is a tool For Checking The Hardening Options In The Linux Kernel Config There are plenty of Linux kernel hardening config options. A lot of them are not enabled by the major distros. We have to enable these options ourselves to make our systems more secure. But nobody likes checking configs manually. So let [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":16914,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"fifu_image_url":"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png","fifu_image_alt":"Kconfig : Hardened-Check &#8211; A Tool For Checking The Hardening Options In The Linux Kernel Config","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[28],"tags":[1457,1793,1906],"class_list":["post-13849","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-kali","tag-hardening-options","tag-kconfig","tag-linux-kernel-config"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Kconfig : A Tool For Checking Hardening Options In The Linux Kernel<\/title>\n<meta name=\"description\" content=\"Kconfig is a tool For Checking The Hardening Options In The Linux Kernel Config. There are plenty of Linux kernel hardening config options.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kalilinuxtutorials.com\/kconfig\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Kconfig : A Tool For Checking Hardening Options In The Linux Kernel\" \/>\n<meta property=\"og:description\" content=\"Kconfig is a tool For Checking The Hardening Options In The Linux Kernel Config. There are plenty of Linux kernel hardening config options.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kalilinuxtutorials.com\/kconfig\/\" \/>\n<meta property=\"og:site_name\" content=\"Kali Linux Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-29T09:53:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png\" \/>\n<meta name=\"author\" content=\"R K\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:site\" content=\"@CyberEdition\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"R K\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kconfig\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kconfig\/\"},\"author\":{\"name\":\"R K\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\"},\"headline\":\"Kconfig : Hardened-Check &#8211; A Tool For Checking The Hardening Options In The Linux Kernel Config\",\"datePublished\":\"2021-06-29T09:53:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kconfig\/\"},\"wordCount\":1829,\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kconfig\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png\",\"keywords\":[\"Hardening Options\",\"Kconfig\",\"Linux Kernel Config\"],\"articleSection\":[\"Kali Linux\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kconfig\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/kconfig\/\",\"name\":\"Kconfig : A Tool For Checking Hardening Options In The Linux Kernel\",\"isPartOf\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kconfig\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/kconfig\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png\",\"datePublished\":\"2021-06-29T09:53:19+00:00\",\"description\":\"Kconfig is a tool For Checking The Hardening Options In The Linux Kernel Config. There are plenty of Linux kernel hardening config options.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kalilinuxtutorials.com\/kconfig\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/kconfig\/#primaryimage\",\"url\":\"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png\",\"contentUrl\":\"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#website\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"name\":\"Kali Linux Tutorials\",\"description\":\"Kali Linux Tutorials\",\"publisher\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#organization\",\"name\":\"Kali Linux Tutorials\",\"url\":\"https:\/\/kalilinuxtutorials.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"contentUrl\":\"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png\",\"width\":272,\"height\":90,\"caption\":\"Kali Linux Tutorials\"},\"image\":{\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/CyberEdition\",\"https:\/\/www.threads.com\/@cybersecurityedition\",\"https:\/\/www.linkedin.com\/company\/cyberedition\",\"https:\/\/www.instagram.com\/cybersecurityedition\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad\",\"name\":\"R K\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g\",\"caption\":\"R K\"},\"url\":\"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Kconfig : A Tool For Checking Hardening Options In The Linux Kernel","description":"Kconfig is a tool For Checking The Hardening Options In The Linux Kernel Config. There are plenty of Linux kernel hardening config options.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kalilinuxtutorials.com\/kconfig\/","og_locale":"en_US","og_type":"article","og_title":"Kconfig : A Tool For Checking Hardening Options In The Linux Kernel","og_description":"Kconfig is a tool For Checking The Hardening Options In The Linux Kernel Config. There are plenty of Linux kernel hardening config options.","og_url":"https:\/\/kalilinuxtutorials.com\/kconfig\/","og_site_name":"Kali Linux Tutorials","article_published_time":"2021-06-29T09:53:19+00:00","og_image":[{"url":"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png","type":"","width":"","height":""}],"author":"R K","twitter_card":"summary_large_image","twitter_image":"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png","twitter_creator":"@CyberEdition","twitter_site":"@CyberEdition","twitter_misc":{"Written by":"R K","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kalilinuxtutorials.com\/kconfig\/#article","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/kconfig\/"},"author":{"name":"R K","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad"},"headline":"Kconfig : Hardened-Check &#8211; A Tool For Checking The Hardening Options In The Linux Kernel Config","datePublished":"2021-06-29T09:53:19+00:00","mainEntityOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/kconfig\/"},"wordCount":1829,"publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/kconfig\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png","keywords":["Hardening Options","Kconfig","Linux Kernel Config"],"articleSection":["Kali Linux"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/kalilinuxtutorials.com\/kconfig\/","url":"https:\/\/kalilinuxtutorials.com\/kconfig\/","name":"Kconfig : A Tool For Checking Hardening Options In The Linux Kernel","isPartOf":{"@id":"https:\/\/kalilinuxtutorials.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kalilinuxtutorials.com\/kconfig\/#primaryimage"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/kconfig\/#primaryimage"},"thumbnailUrl":"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png","datePublished":"2021-06-29T09:53:19+00:00","description":"Kconfig is a tool For Checking The Hardening Options In The Linux Kernel Config. There are plenty of Linux kernel hardening config options.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kalilinuxtutorials.com\/kconfig\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/kconfig\/#primaryimage","url":"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png","contentUrl":"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png"},{"@type":"WebSite","@id":"https:\/\/kalilinuxtutorials.com\/#website","url":"https:\/\/kalilinuxtutorials.com\/","name":"Kali Linux Tutorials","description":"Kali Linux Tutorials","publisher":{"@id":"https:\/\/kalilinuxtutorials.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kalilinuxtutorials.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/kalilinuxtutorials.com\/#organization","name":"Kali Linux Tutorials","url":"https:\/\/kalilinuxtutorials.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/","url":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","contentUrl":"https:\/\/kalilinuxtutorials.com\/wp-content\/uploads\/2025\/07\/Kali.png","width":272,"height":90,"caption":"Kali Linux Tutorials"},"image":{"@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/CyberEdition","https:\/\/www.threads.com\/@cybersecurityedition","https:\/\/www.linkedin.com\/company\/cyberedition","https:\/\/www.instagram.com\/cybersecurityedition\/"]},{"@type":"Person","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/69444b58b9e267a4cf08fceb34b6f6ad","name":"R K","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/kalilinuxtutorials.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3937c9687f2da11bc0a716404ff91779fe19ca115208dbf66167ad353aca5aa?s=96&d=mm&r=g","caption":"R K"},"url":"https:\/\/kalilinuxtutorials.com\/author\/ranjith\/"}]}},"jetpack_featured_media_url":"https:\/\/1.bp.blogspot.com\/-t3atY9m3yo4\/YNrtb6dZA8I\/AAAAAAAAJto\/TuxnkzETsE0rSdGL8EZCL20sMxIGzLM4wCLcBGAsYHQ\/s728\/Kconfig.png","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":5839,"url":"https:\/\/kalilinuxtutorials.com\/jshielder-hardening-script\/","url_meta":{"origin":13849,"position":0},"title":"JShielder : Hardening Script for Linux Servers\/ Secure LAMP-LEMP Deployer\/ CIS Benchmark G","author":"R K","date":"July 18, 2019","format":false,"excerpt":"JSHielder is an Open Source Bash Script developed to help SysAdmin and developers secure there Linux Servers in which they will be deploying any web application or services. This tool automates the process of installing all the necessary packages to host a web application and Hardening a Linux server with\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":28295,"url":"https:\/\/kalilinuxtutorials.com\/krie\/","url_meta":{"origin":13849,"position":1},"title":"KRIe :To Detect Linux Kernel Runtime Integrity Exploits With eBPF","author":"R K","date":"February 19, 2023","format":false,"excerpt":"KRIe is a research project that aims to detect Linux Kernel exploits with eBPF. KRIe is far from being a bulletproof strategy: from eBPF related limitations to post exploitation detections that might rely on a compromised kernel to emit security events, it is clear that a motivated attacker will eventually\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEijP_cIScsPGejCDjkQH77lw_162hP0wUAK95wxJyoFI0xIvYiG9D7ORI0dF89QKG9Gjmup_R8wfW14IiZjv7hCP70OqjMP4uDwb5e4g4V8YS5tmdxOifeZrOlLxz96hH6-Svh3K_K9_yO3OWd7bRKlR9yOgxyZNoyMcXWXKiFLibJJE9eMF7k1K3oN\/s728\/KRIe%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEijP_cIScsPGejCDjkQH77lw_162hP0wUAK95wxJyoFI0xIvYiG9D7ORI0dF89QKG9Gjmup_R8wfW14IiZjv7hCP70OqjMP4uDwb5e4g4V8YS5tmdxOifeZrOlLxz96hH6-Svh3K_K9_yO3OWd7bRKlR9yOgxyZNoyMcXWXKiFLibJJE9eMF7k1K3oN\/s728\/KRIe%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEijP_cIScsPGejCDjkQH77lw_162hP0wUAK95wxJyoFI0xIvYiG9D7ORI0dF89QKG9Gjmup_R8wfW14IiZjv7hCP70OqjMP4uDwb5e4g4V8YS5tmdxOifeZrOlLxz96hH6-Svh3K_K9_yO3OWd7bRKlR9yOgxyZNoyMcXWXKiFLibJJE9eMF7k1K3oN\/s728\/KRIe%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEijP_cIScsPGejCDjkQH77lw_162hP0wUAK95wxJyoFI0xIvYiG9D7ORI0dF89QKG9Gjmup_R8wfW14IiZjv7hCP70OqjMP4uDwb5e4g4V8YS5tmdxOifeZrOlLxz96hH6-Svh3K_K9_yO3OWd7bRKlR9yOgxyZNoyMcXWXKiFLibJJE9eMF7k1K3oN\/s728\/KRIe%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":6111,"url":"https:\/\/kalilinuxtutorials.com\/graphenex-automated-system-hardening-framework\/","url_meta":{"origin":13849,"position":2},"title":"GrapheneX : Automated System Hardening Framework","author":"R K","date":"August 8, 2019","format":false,"excerpt":"GrapheneX is an automated system hardening framework. Although the current technology tries to design systems as safe as possible, security flaws and situations that can lead to vulnerabilities caused by unconscious use and missing configurations still exist. The user must be knowledgeable about the technical side of system architecture and\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3629,"url":"https:\/\/kalilinuxtutorials.com\/tyton-kernel-rootkit-hunter\/","url_meta":{"origin":13849,"position":3},"title":"Tyton : Kernel-Mode Rootkit Hunter","author":"R K","date":"January 22, 2019","format":false,"excerpt":"Tyton Linux Kernel-Mode Rootkit Hunter for 4.4.0-31+. Detected Attacks Hidden Modules Syscall Table Hooking Network Protocol Hooking Netfilter Hooking Zeroed Process Inodes Process Fops Hooking Interrupt Descriptor Table Hooking Also Read:Hatch \u2013 Brute Force Tool That Is Used To Brute Force Most Websites Additional Features Notifications: Users (including myself) do\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":26372,"url":"https:\/\/kalilinuxtutorials.com\/bpflock\/","url_meta":{"origin":13849,"position":4},"title":"Bpflock : eBPF Driven Security For Locking And Auditing Linux Machines","author":"R K","date":"August 12, 2022","format":false,"excerpt":"bpflock uses\u00a0eBPF\u00a0to strength Linux security. By restricting access to a various range of Linux features, bpflock is able to reduce the attack surface and block some well known attack techniques. Only programs like container managers, systemd and other containers\/programs that run in the host\u00a0pid and network namespaces\u00a0are allowed access to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhi0IOUaz_THnNfPH8TBBy7MXgQPchaYiww2p97ypUzkQZEFyDX5bFDcZ9QYAw7TgUCvzArD-tpRgF3JgC35wsCkYTvhiWksNREx9vQpNSICaQZ_AGfmwSb4pDQNks5Hg8CrTFQrFfPSGdsxadPgQHJN-IhOUe9MImdUCnGx5Uts-_qk-Tb9jFdEblt\/s728\/bpflock-logo-small%20%281%29.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhi0IOUaz_THnNfPH8TBBy7MXgQPchaYiww2p97ypUzkQZEFyDX5bFDcZ9QYAw7TgUCvzArD-tpRgF3JgC35wsCkYTvhiWksNREx9vQpNSICaQZ_AGfmwSb4pDQNks5Hg8CrTFQrFfPSGdsxadPgQHJN-IhOUe9MImdUCnGx5Uts-_qk-Tb9jFdEblt\/s728\/bpflock-logo-small%20%281%29.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhi0IOUaz_THnNfPH8TBBy7MXgQPchaYiww2p97ypUzkQZEFyDX5bFDcZ9QYAw7TgUCvzArD-tpRgF3JgC35wsCkYTvhiWksNREx9vQpNSICaQZ_AGfmwSb4pDQNks5Hg8CrTFQrFfPSGdsxadPgQHJN-IhOUe9MImdUCnGx5Uts-_qk-Tb9jFdEblt\/s728\/bpflock-logo-small%20%281%29.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blogger.googleusercontent.com\/img\/b\/R29vZ2xl\/AVvXsEhi0IOUaz_THnNfPH8TBBy7MXgQPchaYiww2p97ypUzkQZEFyDX5bFDcZ9QYAw7TgUCvzArD-tpRgF3JgC35wsCkYTvhiWksNREx9vQpNSICaQZ_AGfmwSb4pDQNks5Hg8CrTFQrFfPSGdsxadPgQHJN-IhOUe9MImdUCnGx5Uts-_qk-Tb9jFdEblt\/s728\/bpflock-logo-small%20%281%29.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":6937,"url":"https:\/\/kalilinuxtutorials.com\/postenum-privilege-escalation-techniques\/","url_meta":{"origin":13849,"position":5},"title":"Postenum : Tool For Basic\/Advanced Privilege Escalation Techniques","author":"R K","date":"October 18, 2019","format":false,"excerpt":"Postenum is a clean, nice and easy tool for basic\/advanced privilege escalation vectors\/techniques. The tool is intended to be executed locally on a Linux box. Be more than a normal user. be the ROOT. USE .\/postenum.sh [option] .\/postenum.sh -s .\/postenum.sh -c Also Read - SIEM \u2013 A Beginner\u2019s Guide to\u2026","rel":"","context":"In &quot;Kali Linux&quot;","block_context":{"text":"Kali Linux","link":"https:\/\/kalilinuxtutorials.com\/category\/kali\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/13849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/comments?post=13849"}],"version-history":[{"count":0,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/posts\/13849\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media\/16914"}],"wp:attachment":[{"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/media?parent=13849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/categories?post=13849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kalilinuxtutorials.com\/wp-json\/wp\/v2\/tags?post=13849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}