## https://sploitus.com/exploit?id=0F72D810-4FD9-5249-B4EE-C262C0E8E81F
# dirtypipe-ebpf_detection -- Dirtypipe detection tool
This program was made to detect Dirty Pipe exploitation attempts thanks to eBPF. It also monitors nonvulnerable kernels and docker containers.
![](/.images/088d790795eb65a66c268d61039feeea5455bae6.gif)
:flight_departure: If you want more details on how it works please read the [blog](https://skyblue.team/posts/dirtypipe-ebpf-detection/) post ! :flight_arrival:
## How does it works?
**Default execution:**
```bash
sudo ./bin/dirtypipe_detection
```
**Debug mode:**
> Show libbpf logs on execution
```bash
sudo ./bin/dirtypipe_detection --debug
```
**Daemon mode:**
> Run program as daemon and send alerts over syslog
```bash
sudo ./bin/dirtypipe_detection --daemon
```
## How to build?
### Debian
```bash
sudo apt install git make pkg-config libelf-dev clang-11 libc6-dev-i386 bpftool -y
git clone https://github.com/airbus-cert/dirtypipe-ebpf_detection
cd ./dirtypipe-ebpf_detection/src/
make
```
### Ubuntu
```bash
sudo apt install git make pkg-config libelf-dev clang-11 libc6-dev-i386 linux-tools-common linux-tools-$(uname -r) -y
git clone https://github.com/airbus-cert/dirtypipe-ebpf_detection
cd ./dirtypipe-ebpf_detection/src/
make
```
## Credits and References
Read the original [blog](https://dirtypipe.cm4all.com/) on Dirtypipe from max.kellermann@ionos.com
Read an interesting strategy from [Datadog](https://www.datadoghq.com/blog/dirty-pipe-vulnerability-overview-and-remediation/) team