{"id":3787,"date":"2014-11-25T03:10:43","date_gmt":"2014-11-24T19:10:43","guid":{"rendered":"https:\/\/www.darknet.org.uk\/?p=3787"},"modified":"2015-09-09T19:36:42","modified_gmt":"2015-09-09T11:36:42","slug":"linenum-linux-enumeration-privilege-escalation-tool","status":"publish","type":"post","link":"https:\/\/www.darknet.org.uk\/2014\/11\/linenum-linux-enumeration-privilege-escalation-tool\/","title":{"rendered":"LinEnum – Linux Enumeration & Privilege Escalation Tool"},"content":{"rendered":"

LinEnum will automate many Local Linux Enumeration & Privilege Escalation checks documented in this cheat sheet<\/a>. It\u2019s a very basic shell script that performs over 65 checks, getting anything from kernel information to locating possible escalation points such as potentially useful SUID\/GUID files and Sudo\/rhost mis-configurations and more.<\/p>\n

An additional ‘extra’ feature is that the script will also use a provided keyword to search through *.conf and *.log files. Any matches will be displayed along with the full file path and line number on which the keyword was identified.<\/p>\n

\"LinEnum<\/p>\n

After the scan has completed (please be aware that it make take some time) you\u2019ll be presented with (possibly quite extensive) output, to which any key findings will be highlighted in yellow with everything else documented under the relevant headings.<\/p>\n

Usage<\/strong><\/p>\n

.\/LinEnum.sh -k keyword -r report -e \/tmp\/ -t<\/pre>\n