LinEnum is a shell script that automates the process of gathering information from a Linux system to help identify potential security vulnerabilities.

1. Basic Usage

1.1 Running LinEnum

./LinEnum.sh
# Runs the script with default options.

1.2 Running with Verbose Output

./LinEnum.sh -v
# Runs the script in verbose mode to provide more detailed output.

2. Script Options

2.1 Detailed Enumeration

./LinEnum.sh -t
# Runs thorough (detailed) tests.

2.2 Export to HTML

./LinEnum.sh -r report.html -h
# Outputs the results to an HTML file named 'report.html'.

2.3 Include Additional Checks

./LinEnum.sh -a
# Runs additional tests.

3. Key Checks Performed

3.1 System Information

  • Kernel version
  • Operating system details
  • Network configuration

3.2 User Information

  • Current user details
  • Super users listing
  • Users with console

3.3 Environmental Information

  • Environment variables
  • Sudo version
  • Cron jobs

3.4 Security Information

  • SUID/GUID files
  • Config files accessible by current user
  • Installed packages and potential vulnerabilities

4. Automating with Cron

4.1 Setup Cron Job

echo "*/5 * * * * /path/to/LinEnum.sh" | crontab -
# Sets up a cron job to run LinEnum every 5 minutes.

5. Tips for Effective Use

5.1 Updating Script

Regularly update the script from its GitHub repository to ensure the latest checks and features are included.

5.2 Combine with Other Tools

For a comprehensive security assessment, use LinEnum in conjunction with other tools like pspy and chkrootkit.

6. Download and Installation

6.1 Clone from GitHub

git clone https://github.com/rebootuser/LinEnum.git
# Clones the repository to get the latest version of the script.

6.2 Running from Remote Server

curl -O https://raw.githubusercontent.com/rebootuser/LinEnum/master/LinEnum.sh
chmod +x LinEnum.sh
./LinEnum.sh
# Downloads and runs the script directly from GitHub.

7. References