[+] Identify and analyze kernel version

This module tries to identify the version of the used Linux kernel. The following sources are tested:
    - Results of module s24
    - Identified kernel modules in .ko format
    - Identified kernel modules in .o format
    - Filesytem path of kernel modules - e.g.: /lib/modules/1.2.3/bla

Additionally it checks the identified kernel version with the linux-exploit-suggester (https://github.com/mzet-/linux-exploit-suggester) for known exploits.
Finally it tests the kernel modules for interesting combination of closed source modules with debugging information. E.g. Non open source modules with debugging information included.

Kernel version:
    4.9.206

Kernel details:
    
    ARC4_Cipher_Algorithm
    ARTPEC_5_video_subsystem_driver
    CBC_block_cipher_algorithm
    CMAC_keyed_hash_algorithm
    Console_driver_for_network_interfaces
    DES___Triple_DES_EDE_Cipher_Algorithms
    DNS_Resolver
    Datacache
    ECB_block_cipher_algorithm
    Fourth_Extended_Filesystem
    IPv4_packet_filter
    IPv6_packet_filter
    MD4_Message_Digest_Algorithm
    MS_DOS_filesystem_support
    Meta_block_cache__for_extended_attributes_
    Netfilter_IPv4_packet_logging
    Netfilter_IPv6_packet_logging
    SCPU_entropy_driver
    SCPU_subsystem_driver
    TC_flow_classifier
    Universal_TUN_TAP_device_driver
    VFAT_filesystem_support
    VFS_to_access_servers_complying_with_the_SNIA_CIFS_Specification_e_g__Samba_and_Windows
    Xtables
    _ip_ip6_arp_eb__tables_backend_module
    device_mapper_target_for_transparent_encryption___decryption
    heatertmp100_driver
    ip6tables_filter_table
    iptables_filter_table
    ledapds9301_driver

==> Kernel vulnerabilities

[+] Found linux kernel version/s:
    4.9.206


==> Possible exploits via linux-exploit-suggester.sh for kernel version 4.9.206

[*] Search possible exploits via linux-exploit-suggester.sh for kernel version 4.9.206
    https://github.com/mzet-/linux-exploit-suggester

Available information:

Kernel version: 4.9.206
Architecture: N/A
Distribution: N/A
Distribution version: N/A
Additional checks (CONFIG_*, sysctl entries, custom Bash commands): N/A
Package listing: N/A

Searching among:

81 kernel space exploits
0 user space exploits

Possible Exploits:

[+] [CVE-2017-16995] eBPF_verifier

   Details: https://ricklarabee.blogspot.com/2018/07/ebpf-and-analysis-of-get-rekt-linux.html
   Exposure: probable
   Tags: debian=9.0{kernel:4.9.0-3-amd64},fedora=25|26|27,ubuntu=14.04{kernel:4.4.0-89-generic},ubuntu=(16.04|17.04){kernel:4.(8|10).0-(19|28|45)-generic}
   Download URL: https://www.exploit-db.com/download/45010
   Comments: CONFIG_BPF_SYSCALL needs to be set && kernel.unprivileged_bpf_disabled != 1
   Requirements: pkg=linux-kernel,ver>=4.4,ver<=4.14.8,CONFIG_BPF_SYSCALL=y,sysctl:kernel.unprivileged_bpf_disabled!=1
   exploit-db: 45010
   author: Rick Larabee

[+] [CVE-2022-32250] nft_object UAF (NFT_MSG_NEWSET)

   Details: https://research.nccgroup.com/2022/09/01/settlers-of-netlink-exploiting-a-limited-uaf-in-nf_tables-cve-2022-32250/
CVE-2022-32250-linux-kernel-lpe-2022/" title="https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/" target="_blank" >https://blog.theori.io/research/CVE-2022-32250-linux-kernel-lpe-2022/
   Exposure: less probable
   Tags: ubuntu=(22.04){kernel:5.15.0-27-generic}
   Download URL: CVE-2022-32250-exploit/main/exp.c" title="https://raw.githubusercontent.com/theori-io/CVE-2022-32250-exploit/main/exp.c" target="_blank" >https://raw.githubusercontent.com/theori-io/CVE-2022-32250-exploit/main/exp.c
   Comments: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)
   Requirements: pkg=linux-kernel,ver<5.18.1,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
   author: vulnerability discovery: EDG Team from NCC Group; Author of this exploit: theori.io

[+] [CVE-2022-2586] nft_object UAF

   Details: https://www.openwall.com/lists/oss-security/2022/08/29/5
   Exposure: less probable
   Tags: ubuntu=(20.04){kernel:5.12.13}
   Download URL: https://www.openwall.com/lists/oss-security/2022/08/29/5/1
   Comments: kernel.unprivileged_userns_clone=1 required (to obtain CAP_NET_ADMIN)
   Requirements: pkg=linux-kernel,ver>=3.16,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
   author: vulnerability discovery: Team Orca of Sea Security; Exploit author: Alejandro Guerrero

[+] [CVE-2021-27365] linux-iscsi

   Details: https://blog.grimm-co.com/2021/03/new-old-bugs-in-linux-kernel.html
   Exposure: less probable
   Tags: RHEL=8
   Download URL: https://codeload.github.com/grimm-co/NotQuite0DayFriday/zip/trunk
   Comments: CONFIG_SLAB_FREELIST_HARDENED must not be enabled
   Requirements: pkg=linux-kernel,ver<=5.11.3,CONFIG_SLAB_FREELIST_HARDENED!=y
   author: GRIMM

[+] [CVE-2021-22555] Netfilter heap out-of-bounds write

   Details: https://google.github.io/security-research/pocs/linux/cve-2021-22555/writeup.html
   Exposure: less probable
   Tags: ubuntu=20.04{kernel:5.8.0-*}
   Download URL: https://raw.githubusercontent.com/google/security-research/master/pocs/linux/cve-2021-22555/exploit.c
   ext-url: CVE-2021-22555/exploit.c" title="https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c" target="_blank" >https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2021-22555/exploit.c
   Comments: ip_tables kernel module must be loaded
   Requirements: pkg=linux-kernel,ver>=2.6.19,ver<=5.12-rc6
   exploit-db: 50135
   author: theflow (orginal exploit author); bcoles (author of exploit update at 'ext-url')

[+] [CVE-2019-15666] XFRM_UAF

   Details: https://duasynt.com/blog/ubuntu-centos-redhat-privesc
   Exposure: less probable
   Download URL: 
   Comments: CONFIG_USER_NS needs to be enabled; CONFIG_XFRM needs to be enabled
   Requirements: pkg=linux-kernel,ver>=3,ver<5.0.19,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1,CONFIG_XFRM=y
   author: Vitaly 'vnik' Nikolenko

[+] [CVE-2019-13272] PTRACE_TRACEME

   Details: https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
   Exposure: less probable
   Tags: ubuntu=16.04{kernel:4.15.0-*},ubuntu=18.04{kernel:4.15.0-*},debian=9{kernel:4.9.0-*},debian=10{kernel:4.19.0-*},fedora=30{kernel:5.0.9-*}
   Download URL: https://github.com/offensive-security/exploitdb-bin-sploits/raw/master/bin-sploits/47133.zip
   ext-url: CVE-2019-13272/poc.c" title="https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2019-13272/poc.c" target="_blank" >https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2019-13272/poc.c
   Comments: Requires an active PolKit agent.
   Requirements: pkg=linux-kernel,ver>=4,ver<5.1.17,sysctl:kernel.yama.ptrace_scope==0,x86_64
   exploit-db: 47133
47163
   author: Jann Horn (orginal exploit author); bcoles (author of exploit update at 'ext-url')

[+] [CVE-2018-5333] rds_atomic_free_op NULL pointer dereference

   Details: https://gist.githubusercontent.com/wbowling/9d32492bd96d9e7c3bf52e23a0ac30a4/raw/959325819c78248a6437102bb289bb8578a135cd/cve-2018-5333-poc.c
   Exposure: less probable
   Tags: ubuntu=16.04{kernel:4.4.0|4.8.0}
   Download URL: https://gist.githubusercontent.com/wbowling/9d32492bd96d9e7c3bf52e23a0ac30a4/raw/959325819c78248a6437102bb289bb8578a135cd/cve-2018-5333-poc.c
   ext-url: CVE-2018-5333/cve-2018-5333.c" title="https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2018-5333/cve-2018-5333.c" target="_blank" >https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2018-5333/cve-2018-5333.c
   Comments: rds.ko kernel module needs to be loaded. Modified version at 'ext-url' adds support for additional targets and bypassing KASLR.
   Requirements: pkg=linux-kernel,ver>=4.4,ver<=4.14.13,cmd:grep
   author: wbowling (orginal exploit author); bcoles (author of exploit update at 'ext-url')

[+] [CVE-2017-7308] af_packet

   Details: https://googleprojectzero.blogspot.com/2017/05/exploiting-linux-kernel-via-packet.html
   Exposure: less probable
   Tags: ubuntu=16.04{kernel:4.8.0-(34|36|39|41|42|44|45)-generic}
   Download URL: CVE-2017-7308/poc.c" title="https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-7308/poc.c" target="_blank" >https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-7308/poc.c
   ext-url: CVE-2017-7308/poc.c" title="https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-7308/poc.c" target="_blank" >https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-7308/poc.c
   Comments: CAP_NET_RAW cap or CONFIG_USER_NS=y needed. Modified version at 'ext-url' adds support for additional kernels
   Requirements: pkg=linux-kernel,ver>=3.2,ver<=4.10.6,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
   exploit-db: 41994
   author: Andrey 'xairy' Konovalov (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')

[+] [CVE-2017-1000253] PIE_stack_corruption

   Details: https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.txt
   Exposure: less probable
   Tags: RHEL=6,RHEL=7{kernel:3.10.0-514.21.2|3.10.0-514.26.1}
   Download URL: https://www.qualys.com/2017/09/26/linux-pie-cve-2017-1000253/cve-2017-1000253.c
   Requirements: pkg=linux-kernel,ver>=3.2,ver<=4.13,x86_64
   exploit-db: 42887
   author: Qualys

[+] [CVE-2017-1000112] NETIF_F_UFO

   Details: http://www.openwall.com/lists/oss-security/2017/08/13/1
   Exposure: less probable
   Tags: ubuntu=14.04{kernel:4.4.0-*},ubuntu=16.04{kernel:4.8.0-*}
   Download URL: CVE-2017-1000112/poc.c" title="https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-1000112/poc.c" target="_blank" >https://raw.githubusercontent.com/xairy/kernel-exploits/master/CVE-2017-1000112/poc.c
   ext-url: CVE-2017-1000112/poc.c" title="https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-1000112/poc.c" target="_blank" >https://raw.githubusercontent.com/bcoles/kernel-exploits/master/CVE-2017-1000112/poc.c
   Comments: CAP_NET_ADMIN cap or CONFIG_USER_NS=y needed. SMEP/KASLR bypass included. Modified version at 'ext-url' adds support for additional distros/kernels
   Requirements: pkg=linux-kernel,ver>=4.4,ver<=4.13,CONFIG_USER_NS=y,sysctl:kernel.unprivileged_userns_clone==1
   author: Andrey 'xairy' Konovalov (orginal exploit author); Brendan Coles (author of exploit update at 'ext-url')

[+] WARNING: Vulnerability CVE-2019-13272 is a known exploited vulnerability.

==> Check modprobe.d directory and content

[-] No modprobe.d directory found
[-] No check for kernel configuration

==> Analyze kernel modules

[*] Found 52 kernel modules.
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/crypto/cbc.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/crypto/arc4.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/crypto/md4.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv4/netfilter/nf_log_ipv4.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/drivers/net/netconsole.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[+] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/extra/scpu.ko (-rw-r--r-- root root)  License not found - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/extra/datacache.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv4/inet_diag.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/drivers/net/tun.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/sched/cls_flow.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv6/netfilter/nf_log_ipv6.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv4/udp_diag.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv4/tunnel4.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv4/ip_tunnel.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/fs/fat/vfat.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/netfilter/nf_log_common.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv6/netfilter/ip6_tables.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/extra/heatertmp100_mod.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/extra/ledapds9301_mod.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/crypto/srtp_crypto.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv4/netfilter/ipt_REJECT.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/dns_resolver/dns_resolver.ko (-rw-r--r-- root root)  License: GPL:GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv4/netfilter/nf_reject_ipv4.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/fs/nls/nls_cp437.ko (-rw-r--r-- root root)  License: DualBSD/GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv6/netfilter/nf_reject_ipv6.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/netfilter/xt_multiport.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/crypto/ecb.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/fs/nls/nls_utf8.ko (-rw-r--r-- root root)  License: DualBSD/GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/sched/cls_basic.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv6/netfilter/ip6t_REJECT.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv4/netfilter/iptable_filter.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/extra/scpurandom.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/sched/sch_htb.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/crypto/des_generic.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/crypto/cmac.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv6/netfilter/ip6table_filter.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/fs/mbcache.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/fs/nls/nls_iso8859-1.ko (-rw-r--r-- root root)  License: DualBSD/GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/netfilter/xt_tcpudp.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/fs/ext4/ext4.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/fs/cifs/cifs.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv6/sit.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[+] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/extra/artpec-5.ko (-rw-r--r-- root root)  License: Proprietary - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv4/tcp_diag.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/sched/cls_u32.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/fs/fat/fat.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/netfilter/xt_LOG.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/fs/jbd2/jbd2.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/drivers/md/dm-crypt.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/ipv4/netfilter/ip_tables.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/net/netfilter/x_tables.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED
[-] Found kernel module ./logs/firmware/unblob_extracted/firmware_extract/4325012-58052244.squashfs_v4_le_extract/usr/lib/modules/4.9.206-axis5/kernel/fs/fat/msdos.ko (-rw-r--r-- root root)  License: GPL - NOT STRIPPED