Common Tips
Establish your manual privilege escalation enumeration.
Practice them until you can run the commands without copy and paste them.
Run the quick win commands first.
Check the date of logged-in machine OS installed and then the files/directories changed so you may be able to find where the latest files and configurations are touched by admins.
Do not use local enumeration tools until you complete manual local enumeration or run only when you need another perspective for privilege escalation. There is much information that will be captured, so you may lose your focus or fail to identify intended ways of solving the machines. For certification pursuer, do not expect that such tools will capture all vulnerabilities that you could try.
linpeas.sh
lse.sh
LinEnum.sh
Do not forget enumerating all files in your first logged-in directory!
Check unusual directories and files under /, /tmp, /opt, /var, and /home, and /home/username.
Do not forget checking dot files under /home/username directory!
Do not forget enumerating all password files (pass, creds) in first login directory, home, var/www, var/log, /opt/, and /tmp directory.
Creds can be hidden in files / database / configurations as well as images and binaries!
Enumerate running programs and services. Identify the version numbers of the programs and services that might have vulnerabilities.
You need to be comfortable to use network pivoting techniques to connect from remote machine.
Think through weak configurations and misconfigurations occurred in current machine environment & programs and services running.
Understand the local database enumeration methodology.
Understand /etc/ directory and where weak configurations might occur
Understand dockers and any weaknesses
Understand management tools like Ansible and YAML misconfigurations
etc.
Last updated