Linux Enumeration

Helpful resources for privilege escalation on a Linux machine

Linux enumeration tools

Operating System

Distribution

cat /etc/issue
cat /etc/*-release
cat /etc/lsb-release      #Debian based
cat /etc/redhat-release   #Redhat based

Kernel Version

cat /proc/version
uname -a
rpm -q kernel
dmesg | grep Linux
ls /boot | grep vmlinuz-

Environmental variables

Applications & Services

What services are running? Which service has which user privilege?

Which service(s) are been running by root? Of these services, which are vulnerable - it's worth a double check!

What applications are installed? What version are they? Are they currently running?

Any of the service(s) settings misconfigured? Are any (vulnerable) plugins attached?

CronJob

Any plain text usernames or passwords?

Networking

See NIC(s) type

What are the network configuration settings? What can you find out about this network? DHCP server? DNS server? Gateway?

What other users & hosts are communicating with the system?

IP and Mac addresses

Is packet sniffing possible? What can be seen? Listen to live traffic

Have you got a shell? Can you interact with the system?

Is port forwarding possible? Redirect and interact with traffic from another view

Is tunneling possible? Send commands locally, remotely

Confidential Information & Users

Who are you? Who is logged in? Who has been logged in? Who else is there? Who can do what?

What sensitive files can be found?

Anything "Interesting" in the home directories? If it is possible to access

Are there any passwords in; scripts, databases, configuration files or log files? Default paths and locations for passwords

What has the user being doing? Is there any password in plain text? What have they been editing?

What user information can be found?

Can private key information be found?

File System

Which configuration files can be written in /etc/? Able to reconfigure a service?

Check /var directory

Check website files

Verify logs

How are file-systems mounted?

Are there any unmounted file-systems?

What "Advanced Linux File Permissions" are used? Sticky bits, SUID & GUID

Where can written to and executed from? A few 'common' places: /tmp, /var/tmp, /dev/shm

Any "problem" files? Word-writeable, "nobody" files

Check Library

List of Checks in details

Last updated