Base Enumeration

Users

Enumerate the current user ID (UID), group ID (GID), and the groups the user belongs to.

id
uid=1001(john) gid=1001(john) groups=1001(john),27(sudo) # john's result

Enumerate basic information of all users using /etc/passwd.

cat /etc/passwd

Enumerate shadow file if is accessible

cat /etc/shadow
unshadow /etc/passwd /etc/shadow
#then try choose jhon
  • Username: The login name (1-32 characters).

  • Password: An x means the password is stored in /etc/shadow.

  • User ID (UID): Unique ID for the user. UID 0 is for root, 1-99 are reserved, and 100-999 are for system accounts.

  • Group ID (GID): The primary group ID, found in /etc/group.

  • User Info (GECOS): Optional user information like full name or contact info.

  • Home Directory: The user's default directory when logging in.

  • Shell: The user's default shell, like /bin/bash, or /sbin/nologin to prevent login.


System

Enumerate hostname.

hostname

Enumerate operating system version

cat /etc/os-release
cat /etc/issue

Enumerate kernel version and architecture.

cat /proc/version
# give information about kernal and compilers (gcc,..etc)
uname -a

User configurations

list sudoer capabilities of current user.

when your write this command the device check file sudoer if u have any permission of root or if u can login with root without password

sudo -l

User vourf may run the following commands on DESKTOP-JE4JGR0:
    (ALL : ALL) ALL
    (root) NOPASSWD: /usr/lib/win-kex/xrdp/xrdpservice
    (root) NOPASSWD: /usr/lib/win-kex/wslg-sock/wslg-sock

List environment variables.

which we can find tokens, passwords , maybe can u must know PATH inject a malicious file

env

Processes

Enumerate all processes in a user readable format.

ps aux

Monitor Processes.

watch -n 1 "ps -aux | grep pass"

It also possible to monitor running processes at live time using pspy tool.


Network

Enumerate all network interfaces, this includes physical and virtual networks.

ip a
ifconfig

Display the routing tables.

route

Enumerate connections.

ss -anp
netstat -tulnp

Enumerate firewall rules.

cat /etc/iptables/rules.v4

Installed Software

dpkg -l

SSH Keys & History

Check ~/.ssh/, .bash_history, configs (.gitconfig, config.json, etc.)


SUID/SGID Binaries:

find / -perm -4000 2>/dev/null

Writable Directories

find / -path /proc -prune -o -type d -perm -o+w 2>/dev/null

Last updated