Linux Enumeration
Helpful resources for privilege escalation on a Linux machine
Linux enumeration tools
LES (Linux Exploit Suggester): https://github.com/mzet-/linux-exploit-suggester
Linux Smart Enumeration: https://github.com/diego-treitos/linux-smart-enumeration
Linux Priv Checker: https://github.com/linted/linuxprivchecker
Operating System
Distribution
cat /etc/issue
cat /etc/*-release
cat /etc/lsb-release #Debian based
cat /etc/redhat-release #Redhat basedKernel Version
cat /proc/version
uname -a
rpm -q kernel
dmesg | grep Linux
ls /boot | grep vmlinuz-Environmental variables
Applications & Services
What services are running? Which service has which user privilege?
Which service(s) are been running by root? Of these services, which are vulnerable - it's worth a double check!
What applications are installed? What version are they? Are they currently running?
Any of the service(s) settings misconfigured? Are any (vulnerable) plugins attached?
CronJob
Any plain text usernames or passwords?
Networking
See NIC(s) type
What are the network configuration settings? What can you find out about this network? DHCP server? DNS server? Gateway?
What other users & hosts are communicating with the system?
IP and Mac addresses
Is packet sniffing possible? What can be seen? Listen to live traffic
Have you got a shell? Can you interact with the system?
Is port forwarding possible? Redirect and interact with traffic from another view
Is tunneling possible? Send commands locally, remotely
Confidential Information & Users
Who are you? Who is logged in? Who has been logged in? Who else is there? Who can do what?
What sensitive files can be found?
Anything "Interesting" in the home directories? If it is possible to access
Are there any passwords in; scripts, databases, configuration files or log files? Default paths and locations for passwords
What has the user being doing? Is there any password in plain text? What have they been editing?
What user information can be found?
Can private key information be found?
File System
Which configuration files can be written in /etc/? Able to reconfigure a service?
Check /var directory
Check website files
Verify logs
How are file-systems mounted?
Are there any unmounted file-systems?
What "Advanced Linux File Permissions" are used? Sticky bits, SUID & GUID
Where can written to and executed from? A few 'common' places: /tmp, /var/tmp, /dev/shm
Any "problem" files? Word-writeable, "nobody" files
Check Library
List of Checks in details

Last updated