Sponsored
Exploiting Tools

Postenum – Advance Privilege Escalation Tool

Hey Folks, in this tutorial we are going to talk about an interesting tool that will help us during solve the CTF challenge. Once the target is compromised we can collect data and a lot of information called privilege escalation. But the good thing is that we don’t have to do anything, just execute the command it will get all the information and give it to us.

Lets take a look πŸ™‚ !!

Installation

In this case we will run this tool with non privileged user as you can see below because as we know that the privilege escalation are used for getting the privileges of accounts.

First we will download it from the github page using the following command. After installed we will going into the directory and give some chmod permission.

git clone https://github.com/mostaphabahadou/postenum.git
cd postenum/
sudo chmod +x postenum.sh
./postenum.sh

You can see the features of this tool by execute the above commands.

File System

We check the permission and ownership of file and directory by executing separate-2 command but this feature can give us complete information about the file system such as where the file is kept and what its permission.

./postenum.sh -s

You can see the file read by other users which can be helpful for lfi with log poising attack.

Shell Escape and Tools

With the help of this command we can check the development tools and languages which are installed and supported.

./postenum.sh -l

Even we can also identify the shell escape that is the most useful feature for CTF player.

Credentials Info and Users

Linux user knows how to check user and what is permissions but if you have limited time and want to get more details then you can use it.

./postenum.sh -c

Network

This feature provide us the network configuration of the target machine.

./postenum.sh -n

Software Vulnerability

Its will provide us the version details of the protocols.

./postenum.sh -v

Exploits

This feature can be the leader of this tool as it will provide us with OS information and privilege escalation kernel exploits.

./postenum.sh -o
About the Author
Shubham Goyal Certified Ethical Hacker, information security analyst, penetration tester and researcher. Can be connect on Linkedin.
Sponsored

Recent Posts

Termux Cheat Sheet for Hackers

Hey Folks :) !! In this article, we present the "Termux Cheat Sheet for Hackers"…

1 month ago

Cracking the X-Factor in Cybersecurity: How Humans are Protecting the Systems?

Amid the rapid advancement of technology, the significance of human involvement in cybersecurity frequently goes…

8 months ago

Cariddi – Hidden Endpoint Finder for Bug Hunting

Hey Folks, we are back today after such a long break, but don't worry we…

2 years ago

API Security Testing 101: Know Everything About API Security Testing!

The security of your API should be one of the top priorities of companies. Without…

2 years ago

7 Best Tools for Web Penetration Testing: Comprehensive Details

Hey Folks, In today's business world, it is essential to have an online presence. However,…

2 years ago

Cyber Security Audits: Everything You Need to Know About It

Hey Folks, Is your business prepared in case of a cyber attack? Many companies don't…

2 years ago
Sponsored

This website uses cookies.