Jump to content
YOUR-AD-HERE
HOSTING
TOOLS

Locked LinEnum - Check privilege escalation and enumerate


0b3y

Recommended Posts

This is the hidden content, please

 

LinEnum will automate many of the checks that I’ve documented in the Local Linux Enumeration & Privilege Escalation Cheatsheet. It’s a very basic shell script that performs over 65 checks, getting anything from kernel information to locating possible escalation points such as potentially useful SUID/GUID files and Sudo/rhost mis-configurations and more.

 

An additional ‘extra’ feature is that the script will also use a provided keyword to search through *.conf and *.log files. Any matches will be displayed along with the full file path and line number on which the keyword was identified.

 

After the scan has completed (please be aware that it make take some time) you’ll be presented with (possibly quite extensive) output, to which any key findings will be highlighted in yellow with everything else documented under the relevant headings.

 

 

Below is a high-level summary of the checks/tasks performed by LinEnum:

1-Kernel and distribution release details

2-System Information:

Hostname

Networking details:

Current IP

Default route details

DNS server information

User Information:

Current user details

Last logged on users

Llist all users including uid/gid information

List root accounts

Extract full details for ‘default’ uid’s such as 0, 1000, 1001 etc

Attempt to read restricted files i.e. /etc/shadow

List current users history files (i.e .bash_history, .nano_history etc.)

3-Privileged access:

Determine if /etc/sudoers is accessible

Determine if the current user has Sudo access without a password

Are known ‘good’ breakout binaries available via Sudo (i.e. nmap, vim etc.)

Is root’s home directory accessible

List permissions for /home/

4-Environmental:

Display current $PATH

5-Jobs/Tasks:

List all cron jobs

Locate all world-writable cron jobs

Locate cron jobs owned by other users of the system

Services:

List network connections (TCP & UDP)

List running processes

Lookup and list process binaries and associated permissions

List inetd.conf/xined.conf contents and associated binary file permissions

List init.d binary permissions

Version Information (of the following):

Sudo

MYSQL

Postgres

Apache

6-Default/Weak Credentials:

Checks for default/weak Postgres accounts

Checks for default root/root access to local MYSQL services

7-Searches:

Locate all SUID/GUID files

Locate all world-writable SUID/GUID files

Locate all SUID/GUID files owned by root

Locate ‘interesting’ SUID/GUID files (i.e. nmap, vim etc)

List all world-writable files

Find/list all accessible *.plan files and display contents

Find/list all accesible *.rhosts files and display contents

Show NFS server details

Locate *.conf and *.log files containing keyword supplied at script runtime

List all *.conf files located in /etc

Locate mail

 

Download:

[HIDE-THANKS]

This is the hidden content, please

[/HIDE-THANKS]

Link to comment
Share on other sites

Guest
This topic is now closed to further replies.
×
×
  • Create New...

Important Information

We have placed cookies on your device to help make this website better. You can adjust your cookie settings, otherwise we'll assume you're okay to continue.