Skip to content

Host Scan Methodologies

The initial access to a compromised host often occurs through a low-access user or service account. Attackers typically conduct host scanning, also called enumeration, to identify weaknesses that could facilitate privilege escalation.

Host enumeration needs to be tailored for each scan; It wouldn't make sense to search for files with sudo privileges on a Windows machine or to query the registry on a BSD system.

UNIX

  • Kernel and distribution release details

  • System Information:

    • Hostname
    • Networking details:
      • Current IP
      • Default route details
      • DNS server information
  • User Information:

    • Current user details
    • Last logged-on users
    • Show users logged onto the host
    • List all users, including uid/gid information, IPv4 header
    • List root accounts
    • Extract password policies and hash storage method information
    • Check umask value
    • Check if password hashes are stored in /etc/passwd
    • Extract full details for 'default' uids such as 0, 1000, 1001, etc
    • Attempt to read restricted files, i.e.,/etc/shadow
    • List current users' history files (i.e., .bash_history, .nano_history, etc.)
    • Basic SSH checks
  • Privileged access:

    • Which users have recently used sudo
    • Determine if /etc/sudoers is accessible
    • Determine if the current user has Sudo access without a password
    • Are known 'good' breakout binaries available via Sudo (i.e., Nmap, vim, etc.)
    • Is the root's home directory accessible
    • List permissions for /home/
  • Environmental:

    • Display current $PATH
    • Display environmental information
  • Jobs/Tasks:

    • List all cron jobs
    • Locate all world-writable cron jobs
    • Locate cron jobs owned by other users of the system
    • List the active and inactive systemd timers
  • Services:

    • List network connections (TCP & UDP)
    • List running processes
    • Lookup and list process binaries and associated permissions
    • List inetd.conf/xined.conf contents and associated binary file permissions
    • List init.d binary permissions
  • Version Information (of the following):

    • Sudo
    • MYSQL
    • Postgres
    • Apache
      • Checks user config
      • Shows enabled modules
      • Checks for htpasswd files
      • View www directories
  • Default/Weak Credentials:

    • Check for default/weak Postgres accounts
    • Check for default/weak MYSQL accounts
  • Search:

    • Locate all SUID/GUID files
    • Locate all world-writable SUID/GUID files
    • Locate all SUID/GUID files owned by root
    • Locate 'interesting' SUID/GUID files (i.e., Nmap, vim, etc)
    • Locate files with POSIX capabilities
    • List all world-writable files
    • Find/list all accessible *.plan files and display contents
    • Find/list all accessible *.rhosts files and display contents
    • Show NFS server details
    • Locate *.conf and *.log files containing keywords supplied at script runtime
    • List all *.conf files located in /etc
    • .bak file search
    • Locate mail
  • Platform/software-specific tests:

    • Check to determine if in a Docker container
    • Check to see if the host has Docker installed
    • Check to determine if in an LXC container`

Windows

  • System Information:

    • Windows Version
    • Architecture
    • Hostname
    • Current User
    • Current Time\Date
  • User Information:

    • Username
    • Groups
    • Stored Credentials
    • Checking for AutoAdminLogon
  • Network Information:

    • ip configs
    • ARP cache
    • Netstat
    • Windows firewall
    • Hosts File Contents
  • Services:

    • Processes
    • Scheduled Tasks
    • Services
    • Installed Programs
    • Installed Patches
    • Program Folders
  • File System Information

    • Files with Full Control and Modify Access
    • Folders with Full Control and Modify Access
    • Mapped Drives
    • Unquoted Service Paths
    • Recent Documents
    • Potentially Interesting Files in the Users Directory
    • 10 Last Modified Files in C:\User
    • MUICache Files
    • System Files with Passwords
    • AlwaysInstalledElevated Registry Key`