VULNERABILITY ANALYSIS
- Please assure you are not operating as root by opening a new shell:
- 1. Check to see who you are operating as with a "whoami".
- 2. Check who else is logged in with a "w".
- 3. Check the current kernel version with a "uname -a"
- 4. Check the OS version with a "cat /etc/issue"
- 5. Check if you can execute privileged commands without a password "sudo cat /etc/sudoers"
- 5. Look for potential victim binaries by searching for SUID set with root ownership "find ./ -perm 4000 -o -perm 2000
- 6. You can now research more accurately for known vulnerabilities in the OS/Kernel, what controls might be applicable, and have a binary that might be worth exploiting.