Windows Information Gathering
OS Information Gathering
OS enumeration happens at different stages of the engagement. You can get some OS information from the initial Information Gathering phase with nmap or other finger printing tools. Getting command execution affords another opportunity to get even more information. Escalating privileges can provide even greater information about the system and its users.
This part of the engagement is designed to help make the Privilege Escalation phase easier. Much of the information here is the same as the Privilege Escalation Methodology page. However, these are all things no matter what should be looked at on all Linux systems. The other checklist may have things you may consider checking.
Limited User
As a limited, or non-admin, user, the amount of information that can be gathered will be limited. Much of these will need to be reassessed for each new user to include the admin or SYSTEM user. This is because each user may have more or less visibility than another. This could reveal a connection to another service or system on the network you previously did not know about. It may also reveal a previously unknown vulnerable application or provide you with access to files or folders you were not able to access before..
Quick checklist of items you want to look for:
Root User
You will need to do much of the same as above such as the cron jobs, processes network connections.
Last updated
Was this helpful?