Those files which have SUID permissions run with higher privileges. The process is simple. Heres a really good walkthrough for LPE workshop Windows. Thanks -- Regarding your last line, why not, How Intuit democratizes AI development across teams through reusability. ._12xlue8dQ1odPw1J81FIGQ{display:inline-block;vertical-align:middle} What Is the Difference Between 'Man' And 'Son of Man' in Num 23:19? I usually like to do this first, but to each their own. Now we can read about these vulnerabilities and use them to elevate privilege on the target machine. Transfer Multiple Files. linux-exploit-suggester.pl (tutorial here), 1) Grab your IP address. You can trivially add stderr to the same command / log file, pipe it to a different file, or leave it as is (unlogged). Private-i also extracted the script inside the cronjob that gets executed after the set duration of time. This shell script will show relevant information about the security of the local Linux system,. ._2Gt13AX94UlLxkluAMsZqP{background-position:50%;background-repeat:no-repeat;background-size:contain;position:relative;display:inline-block} Why do small African island nations perform better than African continental nations, considering democracy and human development? To subscribe to this RSS feed, copy and paste this URL into your RSS reader. Read it with less -R to see the pretty colours. linPEAS analysis. If you are more of an intermediate or expert then you can skip this and get onto the scripts directly. Run it on a shared network drive (shared with impackets smbserver) to avoid touching disk and triggering Win Defender. 2 Answers Sorted by: 21 It could be that your script is producing output to stdout and stderr, and you are only getting one of those streams output to your log file. Some programs have something like. Additionally, we can also use tee and pipe it with our echo command: On macOS, script is from the BSD codebase and you can use it like so: script -q /dev/null mvn dependency:tree mvn-tree.colours.txt, It will run mvn dependency:tree and store the coloured output into mvn-tree.colours.txt. Unfortunately we cannot directly mount the NFS share to our attacker machine with the command sudo mount -t nfs 10.10.83.72:/ /tmp/pe. Replacing broken pins/legs on a DIP IC package, Recovering from a blunder I made while emailing a professor. A powershell book is not going to explain that. Learn more about Stack Overflow the company, and our products. eCIR A place for people to swap war stories, engage in discussion, build a community, prepare for the course and exam, share tips, ask for help. LinPEAS is a script that search for possible paths to escalate privileges on Linux/Unix* hosts, https://book.hacktricks.xyz/linux-unix/linux-privilege-escalation-checklist, https://book.hacktricks.xyz/linux-unix/privilege-escalation#kernel-exploits, https://book.hacktricks.xyz/linux-unix/privilege-escalation#sudo-version, https://book.hacktricks.xyz/linux-unix/privilege-escalation#processes, https://book.hacktricks.xyz/linux-unix/privilege-escalation#frequent-cron-jobs, https://book.hacktricks.xyz/linux-unix/privilege-escalation#scheduled-jobs, https://book.hacktricks.xyz/linux-unix/privilege-escalation#internal-open-ports, https://book.hacktricks.xyz/linux-unix/privilege-escalation#groups, https://book.hacktricks.xyz/linux-unix/privilege-escalation#commands-with-sudo-and-suid-commands, https://book.hacktricks.xyz/linux-unix/privilege-escalation/nfs-no_root_squash-misconfiguration-pe, https://book.hacktricks.xyz/pentesting/pentesting-kerberos-88#pass-the-ticket-ptt, https://book.hacktricks.xyz/linux-unix/privilege-escalation#open-shell-sessions, https://book.hacktricks.xyz/linux-unix/privilege-escalation#etc-ld-so-conf-d, https://book.hacktricks.xyz/linux-unix/privilege-escalation#capabilities, https://book.hacktricks.xyz/linux-unix/privilege-escalation#logrotate-exploitation, https://book.hacktricks.xyz/linux-unix/privilege-escalation#read-sensitive-data, https://book.hacktricks.xyz/linux-unix/privilege-escalation#writable-files, https://www.aldeid.com/w/index.php?title=LinPEAS&oldid=35120. Staging Ground Beta 1 Recap, and Reviewers needed for Beta 2. You can use the -Encoding parameter to tell PowerShell how to encode the output. ._38lwnrIpIyqxDfAF1iwhcV{background-color:var(--newCommunityTheme-widgetColors-lineColor);border:none;height:1px;margin:16px 0}._37coyt0h8ryIQubA7RHmUc{margin-top:12px;padding-top:12px}._2XJvPvYIEYtcS4ORsDXwa3,._2Vkdik1Q8k0lBEhhA_lRKE,.icon._2Vkdik1Q8k0lBEhhA_lRKE{border-radius:100%;box-sizing:border-box;-ms-flex:none;flex:none;margin-right:8px}._2Vkdik1Q8k0lBEhhA_lRKE,.icon._2Vkdik1Q8k0lBEhhA_lRKE{background-position:50%;background-repeat:no-repeat;background-size:100%;height:54px;width:54px;font-size:54px;line-height:54px}._2Vkdik1Q8k0lBEhhA_lRKE._1uo2TG25LvAJS3bl-u72J4,.icon._2Vkdik1Q8k0lBEhhA_lRKE._1uo2TG25LvAJS3bl-u72J4{filter:blur()}.eGjjbHtkgFc-SYka3LM3M,.icon.eGjjbHtkgFc-SYka3LM3M{border-radius:100%;box-sizing:border-box;-ms-flex:none;flex:none;margin-right:8px;background-position:50%;background-repeat:no-repeat;background-size:100%;height:36px;width:36px}.eGjjbHtkgFc-SYka3LM3M._1uo2TG25LvAJS3bl-u72J4,.icon.eGjjbHtkgFc-SYka3LM3M._1uo2TG25LvAJS3bl-u72J4{filter:blur()}._3nzVPnRRnrls4DOXO_I0fn{margin:auto 0 auto auto;padding-top:10px;vertical-align:middle}._3nzVPnRRnrls4DOXO_I0fn ._1LAmcxBaaqShJsi8RNT-Vp i{color:unset}._2bWoGvMqVhMWwhp4Pgt4LP{margin:16px 0;font-size:12px;font-weight:400;line-height:16px}.icon.tWeTbHFf02PguTEonwJD0{margin-right:4px;vertical-align:top}._2AbGMsrZJPHrLm9e-oyW1E{width:180px;text-align:center}.icon._1cB7-TWJtfCxXAqqeyVb2q{cursor:pointer;margin-left:6px;height:14px;fill:#dadada;font-size:12px;vertical-align:middle}.hpxKmfWP2ZiwdKaWpefMn{background-color:var(--newCommunityTheme-active);background-size:cover;background-image:var(--newCommunityTheme-banner-backgroundImage);background-position-y:center;background-position-x:center;background-repeat:no-repeat;border-radius:3px 3px 0 0;height:34px;margin:-12px -12px 10px}._20Kb6TX_CdnePoT8iEsls6{-ms-flex-align:center;align-items:center;display:-ms-flexbox;display:flex;margin-bottom:8px}._20Kb6TX_CdnePoT8iEsls6>*{display:inline-block;vertical-align:middle}.t9oUK2WY0d28lhLAh3N5q{margin-top:-23px}._2KqgQ5WzoQRJqjjoznu22o{display:inline-block;-ms-flex-negative:0;flex-shrink:0;position:relative}._2D7eYuDY6cYGtybECmsxvE{-ms-flex:1 1 auto;flex:1 1 auto;overflow:hidden;text-overflow:ellipsis}._2D7eYuDY6cYGtybECmsxvE:hover{text-decoration:underline}._19bCWnxeTjqzBElWZfIlJb{font-size:16px;font-weight:500;line-height:20px;display:inline-block}._2TC7AdkcuxFIFKRO_VWis8{margin-left:10px;margin-top:30px}._2TC7AdkcuxFIFKRO_VWis8._35WVFxUni5zeFkPk7O4iiB{margin-top:35px}._1LAmcxBaaqShJsi8RNT-Vp{padding:0 2px 0 4px;vertical-align:middle}._2BY2-wxSbNFYqAy98jWyTC{margin-top:10px}._3sGbDVmLJd_8OV8Kfl7dVv{font-family:Noto Sans,Arial,sans-serif;font-size:14px;font-weight:400;line-height:21px;margin-top:8px;word-wrap:break-word}._1qiHDKK74j6hUNxM0p9ZIp{margin-top:12px}.Jy6FIGP1NvWbVjQZN7FHA,._326PJFFRv8chYfOlaEYmGt,._1eMniuqQCoYf3kOpyx83Jj,._1cDoUuVvel5B1n5wa3K507{-ms-flex-pack:center;justify-content:center;margin-top:12px;width:100%}._1eMniuqQCoYf3kOpyx83Jj{margin-bottom:8px}._2_w8DCFR-DCxgxlP1SGNq5{margin-right:4px;vertical-align:middle}._1aS-wQ7rpbcxKT0d5kjrbh{border-radius:4px;display:inline-block;padding:4px}._2cn386lOe1A_DTmBUA-qSM{border-top:1px solid var(--newCommunityTheme-widgetColors-lineColor);margin-top:10px}._2Zdkj7cQEO3zSGHGK2XnZv{display:inline-block}.wzFxUZxKK8HkWiEhs0tyE{font-size:12px;font-weight:700;line-height:16px;color:var(--newCommunityTheme-button);cursor:pointer;text-align:left;margin-top:2px}._3R24jLERJTaoRbM_vYd9v0._3R24jLERJTaoRbM_vYd9v0._3R24jLERJTaoRbM_vYd9v0{display:none}.yobE-ux_T1smVDcFMMKFv{font-size:16px;font-weight:500;line-height:20px}._1vPW2g721nsu89X6ojahiX{margin-top:12px}._pTJqhLm_UAXS5SZtLPKd{text-transform:none} -s (superfast & stealth): This will bypass some time-consuming checks and will leave absolutely no trace. The trick is to combine the two with tee: This redirects stderr (2) into stdout (1), then pipes stdout into tee, which copies it to the terminal and to the log file. Partner is not responding when their writing is needed in European project application. Then provided execution permissions using chmod and then run the Bashark script. Generally when we run LinPEAS, we will run it without parameters to run 'all checks' and then comb over all of the output line by line, from top to bottom. Browse other questions tagged. It was created by Z-Labs. ._2ik4YxCeEmPotQkDrf9tT5{width:100%}._1DR1r7cWVoK2RVj_pKKyPF,._2ik4YxCeEmPotQkDrf9tT5{display:-ms-flexbox;display:flex;-ms-flex-align:center;align-items:center}._1DR1r7cWVoK2RVj_pKKyPF{-ms-flex-pack:center;justify-content:center;max-width:100%}._1CVe5UNoFFPNZQdcj1E7qb{-ms-flex-negative:0;flex-shrink:0;margin-right:4px}._2UOVKq8AASb4UjcU1wrCil{height:28px;width:28px;margin-top:6px}.FB0XngPKpgt3Ui354TbYQ{display:-ms-flexbox;display:flex;-ms-flex-align:start;align-items:flex-start;-ms-flex-direction:column;flex-direction:column;margin-left:8px;min-width:0}._3tIyrJzJQoNhuwDSYG5PGy{display:-ms-flexbox;display:flex;-ms-flex-align:center;align-items:center;width:100%}.TIveY2GD5UQpMI7hBO69I{font-size:12px;font-weight:500;line-height:16px;color:var(--newRedditTheme-titleText);white-space:nowrap;overflow:hidden;text-overflow:ellipsis}.e9ybGKB-qvCqbOOAHfFpF{display:-ms-flexbox;display:flex;-ms-flex-align:center;align-items:center;width:100%;max-width:100%;margin-top:2px}.y3jF8D--GYQUXbjpSOL5.y3jF8D--GYQUXbjpSOL5{font-weight:400;box-sizing:border-box}._28u73JpPTG4y_Vu5Qute7n{margin-left:4px} It has a few options or parameters such as: -s Supply current user password to check sudo perms (INSECURE). The official repo doesnt have compiled binaries, you can compile it yourself (which I did without any problems) or get the binaries here compiled by carlos (author of winPEAS) or more recently here. A lot of times (not always) the stdout is displayed in colors. If you want to help with the TODO tasks or with anything, you can do it using github issues or you can submit a pull request. For example, if you wanted to send the output of the ls command to a file named "mydirectory," you would use the following command: ls > mydirectory In order to send command or script output, you must do a variety of things.A string can be converted to a specific file in the pipeline using the *-Content and . The nature of simulating nature: A Q&A with IBM Quantum researcher Dr. Jamie We've added a "Necessary cookies only" option to the cookie consent popup. We can see that the target machine is vulnerable to CVE 2021-3156, CVE 2018-18955, CVE 2019-18634, CVE, 2019-15666, CVE 2017-0358 and others. Most of the entries in the NAME column of the output from lsof +D /tmp do not begin with /tmp. LinEnum is a shell script that works in order to extract information from the target machine about elevating privileges. .s5ap8yh1b4ZfwxvHizW3f{color:var(--newCommunityTheme-metaText);padding-top:5px}.s5ap8yh1b4ZfwxvHizW3f._19JhaP1slDQqu2XgT3vVS0{color:#ea0027} I also tried the x64 winpeas.exe but it gave an error of incorrect system version. -P (Password): Pass a password that will be used with sudo -l and Bruteforcing other users, -d Discover hosts using fping or ping, ip -d Discover hosts looking for TCP open ports using nc. This is an important step and can feel quite daunting. By clicking Post Your Answer, you agree to our terms of service, privacy policy and cookie policy. Bashark has been designed to assist penetrations testers and security researchers for the post-exploitation phase of their security assessment of a Linux, OSX or Solaris Based Server. Asking for help, clarification, or responding to other answers. Method 1: Use redirection to save command output to file in Linux You can use redirection in Linux for this purpose. In the hacking process, you will gain access to a target machine. This is Seatbelt. I did the same for Seatbelt, which took longer and found it was still executing. ._2a172ppKObqWfRHr8eWBKV{-ms-flex-negative:0;flex-shrink:0;margin-right:8px}._39-woRduNuowN7G4JTW4I8{margin-top:12px}._136QdRzXkGKNtSQ-h1fUru{display:-ms-flexbox;display:flex;margin:8px 0;width:100%}.r51dfG6q3N-4exmkjHQg_{font-size:10px;font-weight:700;letter-spacing:.5px;line-height:12px;text-transform:uppercase;-ms-flex-pack:justify;justify-content:space-between;-ms-flex-align:center;align-items:center}.r51dfG6q3N-4exmkjHQg_,._2BnLYNBALzjH6p_ollJ-RF{display:-ms-flexbox;display:flex}._2BnLYNBALzjH6p_ollJ-RF{margin-left:auto}._1-25VxiIsZFVU88qFh-T8p{padding:0}._2nxyf8XcTi2UZsUInEAcPs._2nxyf8XcTi2UZsUInEAcPs{color:var(--newCommunityTheme-widgetColors-sidebarWidgetTextColor)} I have read about tee and the MULTIOS option in Zsh, but am not sure how to use them. Heres where it came from. Next, we can view the contents of our sample.txt file. /*# sourceMappingURL=https://www.redditstatic.com/desktop2x/chunkCSS/TopicLinksContainer.3b33fc17a17cec1345d4_.css.map*/, any verse or teachings about love and harmony. Okay I edited my answer to demonstrate another of way using named pipes to redirect all coloured output for each command line to a named pipe, I was so confident that this would work but it doesn't :/ (no colors), How Intuit democratizes AI development across teams through reusability. Run linPEAS.sh and redirect output to a file. However as most in the game know, this is not typically where we stop. I told you I would be back. You can copy and paste from the terminal window to the edit window. 1. This is quite unfortunate, but the binaries has a part named txt, which is now protected and the system does not allow any modification on it. Write the output to a local txt file before transferring the results over. ./my_script.sh | tee log.txt will indeed output everything to the terminal, but will only dump stdout to the logfile. It collects all the positive results and then ranks them according to the potential risk and then show it to the user. Enter your email address to follow this blog and receive notifications of new posts by email. That is, redirect stdout both to the original stdout and log.txt (internally via a pipe to something that works like tee), and then redirect stderr to that as well (to the pipe to the internal tee-like process). But note not all the exercises inside are present in the original LPE workshop; the author added some himself, notably the scheduled task privesc and C:\Devtools. Tips on simple stack buffer overflow, Writing deb packages It can generate various output formats, including LaTeX, which can then be processed into a PDF. All this information helps the attacker to make the post exploit against the machine for getting the higher-privileged shell. Why do many companies reject expired SSL certificates as bugs in bug bounties? Find the latest versions of all the scripts and binaries in the releases page. What video game is Charlie playing in Poker Face S01E07? Async XHR AJAX, Rewriting a Ruby msf exploit in Python Press J to jump to the feed. If you google powershell commands or cli commands to output data to file, there will be a few different ways you can do this. linpeas output to file.LinPEAS is a script that searches for possible paths to escalate privileges on Linux/Unix*/MacOS hosts. Unsure but I redownloaded all the PEAS files and got a nc shell to run it. https://www.reddit.com/r/Christianity/comments/ewhzls/bible_verse_for_husband_and_wife/, https://www.reddit.com/r/AskReddit/comments/8fy0cr/how_do_you_cope_with_wife_that_scolds_you_all_the/, https://www.reddit.com/r/Christians/comments/7tq2kb/good_verses_to_relate_to_work_unhappiness/. We tap into this and we are able to complete privilege escalation. If you find any issue, please report it using github issues. 3.2. This is similar to earlier answer of: LinPEAS also checks for various important files for write permissions as well. Jordan's line about intimate parties in The Great Gatsby? It uses color to differentiate the types of alerts like green means it is possible to use it to elevate privilege on Target Machine. The goal of this script is to search for possible Privilege Escalation Paths (tested in Debian, CentOS, FreeBSD, OpenBSD and MacOS). If you preorder a special airline meal (e.g. Also, redirect the output to our desired destination and the color content will be written to the destination. ./my_script.sh | tee log.txt will indeed output everything to the terminal, but will only dump stdout to the logfile. This is primarily because the linpeas.sh script will generate a lot of output. Connect and share knowledge within a single location that is structured and easy to search. In the beginning, we run LinPEAS by taking the SSH of the target machine and then using the curl command to download and run the LinPEAS script. In order to fully own our target we need to get to the root level. Port 8080 is mostly used for web 1. Winpeas.bat was giving errors. Do new devs get fired if they can't solve a certain bug? It will activate all checks. Recipe for Root (priv esc blog) Why are non-Western countries siding with China in the UN? on Optimum, i ran ./winpeas.exe > output.txt Then, i transferred output.txt back to my kali, wanting to read the output there. Click Close and be happy. This step is for maintaining continuity and for beginners. Create an account to follow your favorite communities and start taking part in conversations. Here, we are downloading the locally hosted LinEnum script and then executing it after providing appropriate permissions. So I've tried using linpeas before. LinPEAS is a script that search for possible paths to escalate privileges on Linux/Unix*/MacOS hosts. It has more accurate wildcard matching. It is not totally important what the picture is showing, but if you are curious there is a cron job that runs an application called "screen." Its always better to read the full result carefully. Linux is a registered trademark of Linus Torvalds. However, I couldn't perform a "less -r output.txt". It could be that your script is producing output to stdout and stderr, and you are only getting one of those streams output to your log file. https://m.youtube.com/watch?v=66gOwXMnxRI. Here we used the getperm -c command to read the SUID bits on nano, cp and find among other binaries. Since many programs will only output color sequences if their stdout is a terminal, a general solution to this problem requires tricking them into believing that the pipe they write to is a terminal. This is possible with the script command from bsdutils: script -q -c "vagrant up" filename.txt This will write the output from vagrant up to filename.txt (and the terminal). Run linPEAS.sh and redirect output to a file 6) On the attacker machine I open a different listening port, and redirect all data sent over it into a file. It uses /bin/sh syntax, so can run in anything supporting sh (and the binaries and parameters used). This makes it perfect as it is not leaving a trace. It does not have any specific dependencies that you would require to install in the wild. How can I get SQL queries to show in output file? Find centralized, trusted content and collaborate around the technologies you use most. Making statements based on opinion; back them up with references or personal experience. HacknPentest Following information are considered as critical Information of Windows System: Several scripts are used in penetration testing to quickly identify potential privilege escalation vectors on Linux systems, and today we will elaborate on each script that works smoothly. All it requires is the session identifier number to run on the exploited target. It was created by, Time to get suggesting with the LES. wife is bad tempered and always raise voice to ask me to do things in the house hold. Start here for a quick overview of the site, Detailed answers to any questions you might have, Discuss the workings and policies of this site. ERROR: CREATE MATERIALIZED VIEW WITH DATA cannot be executed from a function. .c_dVyWK3BXRxSN3ULLJ_t{border-radius:4px 4px 0 0;height:34px;left:0;position:absolute;right:0;top:0}._1OQL3FCA9BfgI57ghHHgV3{-ms-flex-align:center;align-items:center;display:-ms-flexbox;display:flex;-ms-flex-pack:start;justify-content:flex-start;margin-top:32px}._1OQL3FCA9BfgI57ghHHgV3 ._33jgwegeMTJ-FJaaHMeOjV{border-radius:9001px;height:32px;width:32px}._1OQL3FCA9BfgI57ghHHgV3 ._1wQQNkVR4qNpQCzA19X4B6{height:16px;margin-left:8px;width:200px}._39IvqNe6cqNVXcMFxFWFxx{display:-ms-flexbox;display:flex;margin:12px 0}._39IvqNe6cqNVXcMFxFWFxx ._29TSdL_ZMpyzfQ_bfdcBSc{-ms-flex:1;flex:1}._39IvqNe6cqNVXcMFxFWFxx .JEV9fXVlt_7DgH-zLepBH{height:18px;width:50px}._39IvqNe6cqNVXcMFxFWFxx ._3YCOmnWpGeRBW_Psd5WMPR{height:12px;margin-top:4px;width:60px}._2iO5zt81CSiYhWRF9WylyN{height:18px;margin-bottom:4px}._2iO5zt81CSiYhWRF9WylyN._2E9u5XvlGwlpnzki78vasG{width:230px}._2iO5zt81CSiYhWRF9WylyN.fDElwzn43eJToKzSCkejE{width:100%}._2iO5zt81CSiYhWRF9WylyN._2kNB7LAYYqYdyS85f8pqfi{width:250px}._2iO5zt81CSiYhWRF9WylyN._1XmngqAPKZO_1lDBwcQrR7{width:120px}._3XbVvl-zJDbcDeEdSgxV4_{border-radius:4px;height:32px;margin-top:16px;width:100%}._2hgXdc8jVQaXYAXvnqEyED{animation:_3XkHjK4wMgxtjzC1TvoXrb 1.5s ease infinite;background:linear-gradient(90deg,var(--newCommunityTheme-field),var(--newCommunityTheme-inactive),var(--newCommunityTheme-field));background-size:200%}._1KWSZXqSM_BLhBzkPyJFGR{background-color:var(--newCommunityTheme-widgetColors-sidebarWidgetBackgroundColor);border-radius:4px;padding:12px;position:relative;width:auto} 8. I downloaded winpeas.exe to the Windows machine and executed by ./winpeas.exe cmd searchall searchfast. any idea how to capture the winpeas output to a file like we do in linpeas -a > linpeas.txt 1 Qwerty793r 1 yr. ago If you google powershell commands or cli commands to output data to file, there will be a few different ways you can do this. In Meterpreter, type the following to get a shell on our Linux machine: shell In order to send output to a file, you can use the > operator. - Summary: An explanation with examples of the linPEAS output. Here we can see that the Docker group has writable access. Is it plausible for constructed languages to be used to affect thought and control or mold people towards desired outcomes? eCPPT (coming soon) Here, when the ping command is executed, Command Prompt outputs the results to a . I would recommend using the winPEAS.bat if you are unable to get the .exe to work. But it also uses them the identify potencial misconfigurations. This means we need to conduct privilege escalation. On a cluster where I am part of the management team, I often have to go through the multipage standard output of various commands such as sudo find / to look for any troubles such as broken links or to check the directory trees. ._1QwShihKKlyRXyQSlqYaWW{height:16px;width:16px;vertical-align:bottom}._2X6EB3ZhEeXCh1eIVA64XM{margin-left:3px}._1jNPl3YUk6zbpLWdjaJT1r{font-size:12px;font-weight:500;line-height:16px;border-radius:2px;display:inline-block;margin-right:5px;overflow:hidden;text-overflow:ellipsis;vertical-align:text-bottom;white-space:pre;word-break:normal;padding:0 4px}._1jNPl3YUk6zbpLWdjaJT1r._39BEcWjOlYi1QGcJil6-yl{padding:0}._2hSecp_zkPm_s5ddV2htoj{font-size:12px;font-weight:500;line-height:16px;border-radius:2px;display:inline-block;margin-right:5px;overflow:hidden;text-overflow:ellipsis;vertical-align:text-bottom;white-space:pre;word-break:normal;margin-left:0;padding:0 4px}._2hSecp_zkPm_s5ddV2htoj._39BEcWjOlYi1QGcJil6-yl{padding:0}._1wzhGvvafQFOWAyA157okr{font-size:12px;font-weight:500;line-height:16px;border-radius:2px;margin-right:5px;overflow:hidden;text-overflow:ellipsis;vertical-align:text-bottom;white-space:pre;word-break:normal;box-sizing:border-box;line-height:14px;padding:0 4px}._3BPVpMSn5b1vb1yTQuqCRH,._1wzhGvvafQFOWAyA157okr{display:inline-block;height:16px}._3BPVpMSn5b1vb1yTQuqCRH{background-color:var(--newRedditTheme-body);border-radius:50%;margin-left:5px;text-align:center;width:16px}._2cvySYWkqJfynvXFOpNc5L{height:10px;width:10px}.aJrgrewN9C8x1Fusdx4hh{padding:2px 8px}._1wj6zoMi6hRP5YhJ8nXWXE{font-size:14px;padding:7px 12px}._2VqfzH0dZ9dIl3XWNxs42y{border-radius:20px}._2VqfzH0dZ9dIl3XWNxs42y:hover{opacity:.85}._2VqfzH0dZ9dIl3XWNxs42y:active{transform:scale(.95)}