Nytro Posted November 30, 2014 Report Posted November 30, 2014 [h=1]LinEnum - Local Linux Enumeration & Privilege Escalation Checks [/h] Dump3R on 6:14 PM No Comment LinEnum will automate many of the checks that I’ve documented in the Local Linux Enumeration & Privilege Escalation Cheatsheet. It’s a very basic shell script that performs over 65 checks, getting anything from kernel information to locating possible escalation points such as potentially useful SUID/GUID files and Sudo/rhost mis-configurations and more. An additional ‘extra’ feature is that the script will also use a provided keyword to search through *.conf and *.log files. Any matches will be displayed along with the full file path and line number on which the keyword was identified. After the scan has completed (please be aware that it make take some time) you’ll be presented with (possibly quite extensive) output, to which any key findings will be highlighted in yellow with everything else documented under the relevant headings. Below is a high-level summary of the checks/tasks performed by LinEnum:Kernel and distribution release details System Information:Hostname Networking details:Current IPDefault route detailsDNS server information[*] User Information:Current user detailsLast logged on usersLlist all users including uid/gid informationList root accountsExtract full details for ‘default’ uid’s such as 0, 1000, 1001 etcAttempt to read restricted files i.e. /etc/shadowList current users history files (i.e .bash_history, .nano_history etc.)[*] Privileged access:Determine if /etc/sudoers is accessibleDetermine if the current user has Sudo access without a passwordAre known ‘good’ breakout binaries available via Sudo (i.e. nmap, vim etc.)Is root’s home directory accessibleList permissions for /home/[*] Environmental:Display current $PATH[*] Jobs/Tasks:List all cron jobsLocate all world-writable cron jobsLocate cron jobs owned by other users of the system[*] Services:List network connections (TCP & UDP)List running processesLookup and list process binaries and associated permissionsList inetd.conf/xined.conf contents and associated binary file permissionsList init.d binary permissions[*] Version Information (of the following):SudoMYSQLPostgresApache[*] Default/Weak Credentials:Checks for default/weak Postgres accountsChecks for default root/root access to local MYSQL services[*] Searches:Locate all SUID/GUID filesLocate all world-writable SUID/GUID filesLocate all SUID/GUID files owned by rootLocate ‘interesting’ SUID/GUID files (i.e. nmap, vim etc)List all world-writable filesFind/list all accessible *.plan files and display contentsFind/list all accesible *.rhosts files and display contentsShow NFS server detailsLocate *.conf and *.log files containing keyword supplied at script runtimeList all *.conf files located in /etcLocate mail Some of the above commands are privileged/and or the related task may be nonexistent and will therefore most likely fail. The user shouldn’t be alerted to failed results, just the output from successful commands should be displayed. Download LinEnumSursa: LinEnum - Local Linux Enumeration & Privilege Escalation Checks | KitPloit - PenTest Tools for your Security Arsenal! Quote