February 2018
Intermediate to advanced
396 pages
9h 38m
English
Enumeration is a key for every successful attack. It is a critical phase in hacking systems, and a vital part of information gathering. During this phase, the attacker establishes a connection between them and the target (locally or remotely) to gather as much information as possible to decide on an attacking vector. To enumerate a Linux host, you can use a utility called LinEnum, and download it from https://github.com/rebootuser/LinEnum.
It is a useful shell script that gathers information about a Linux host using a checklist of at least 65 items, such as kernel and sensitive users information, in order to find an escalation point:
The following screenshot shows, for example, information about the logged ...
Read now
Unlock full access