-
Auto Scripts
- run linuxprivchecker.py if you're really stuck
- run LINPEAS
- run LSE
-
Figure Out unsername, groups, OS, & Kernel Versions
-
whoami
- whoami | id
-
groups
- groups
getent group <name of group> # liste all members
-
OS & Kernel version
- cat /etc/issue
cat /proc/version
hostname
uname -a
-
Sudo -l
- When this command is executed in the context of a user that is part of the sudo group, the output of
-
Check Services Running as root
- ps aux | grep root
-
world writables
&
Files
- find / -writable -type d 2>/dev/null # world-writeable folders
find / -perm -222 -type d 2>/dev/null # world-writeable folders
find / -perm -o w -type d 2>/dev/null # world-writeable folders
find / -perm -o x -type d 2>/dev/null # world-executable folders
find / \( -perm -o w -perm -o x \) -type d 2>/dev/null # world-writeable & executable folders
- user files
- readable backups
- writable service files
- hidden files
-
sensitive files
- backup folder, .bash_history files, /srv directory
-
config files &web config files
web configs files may have password
- config files /etc
ls -ls /etc/ | grep .conf
- web dir config files
ls -ls /var/www/html
-
SUID
- find / -type f -a \( -perm -u+s -o -perm -g+s \) -exec ls -l {} \; 2> /dev/null
- Run "strace" on binary to check for missing ".so" files that we can create.
- Run "strings" on binaries to check for functions used by the binary that can be taken over
-
password keys
- script rescults
- Home directoties
-
cron jobs
- cat /etc/ crontab
crontab -l
-
NFS
- enumerate unmounted disks