uname -a
-- Look for Kernel Exploitlscpu
-- CPU Architecture-
ps aux
-- What services are running?
- You are performing this type of enumeration to find out who you are, what permissions you have, and what you are capable of doing
whoami
-- Display current userid
-- Permissions of current usersudo -l
-- What are the SUDO permissions of the current user | Very IMPORTANT- Ask yourself what files do you know of and what files can you access
- Access to sensitive files? /etc/shadow /etc/passwd
history
-- Display command/Terminal history
- This type of enumeration allows you to identify internal ports and gives you a lay of the land
ifconfig
orip a
-- General IP and Networking information -- Is this dual-homed (two NICs)ip route
-- View routing tablearp -a
orip neigh
-- View ARP tablenetstat -ano
ornetstat -tulnp
- Password hunting or sensitive file hunting
password:
grep --color=auto -rnw '/' -ie "PASSWORD" --color=always 2> /dev/null
grep --color=auto -rnw '/' -ie "PASSWORD=" --color=always 2> /dev/null
grep --color=auto -rnw '/' -ie "PWD" --color=always 2> /dev/null
grep --color=auto -rnw '/' -ie "PASS" --color=always 2> /dev/null
File name:
locate password | more
find / -name authorized_keys 2> /dev/null
find / -name id_rsa 2> /dev/null