Reading the /etc/passwd file can be an easy way to discover users on the system. It is worth remembering that the id command can also be used to obtain the same information for another user as seen below. The id command will provide a general overview of the user’s privilege level and group memberships. The example below shows how the “secret.txt” file can easily be missed using the ls or ls -l commands. While looking for potential privilege escalation vectors, please remember to always use the ls command with the -la parameter. One of the common commands used in Linux is probably ls. The sudo -l command can be used to list all commands your user can run using sudo. The target system may be configured to allow users to run some (or all) commands with root privileges. Python) that could be used to run code on the target system or leveraged for privilege escalation. The PATH variable may have a compiler or a scripting language (e.g. The env command will show environmental variables. Looking at the ps aux command output, we can have a better understanding of the system and potential vulnerabilities.
0 Comments
Leave a Reply. |