CoCalc Logo Icon
StoreFeaturesDocsShareSupportNewsAboutSign UpSign In
rapid7

Real-time collaboration for Jupyter Notebooks, Linux Terminals, LaTeX, VS Code, R IDE, and more,
all in one place.

GitHub Repository: rapid7/metasploit-framework
Path: blob/master/documentation/modules/post/linux/gather/enum_commands.md
Views: 11789

Vulnerable Application

This module will check which shell commands are available on a system.

Verification Steps

  1. Start msfconsole

  2. Get a session

  3. Do: use post/linux/gather/enum_commands

  4. Do: set session <session ID>

  5. Do: run

  6. You should receive a list of shell commands

Options

DIR

Optional directory name to list (in addition to default system PATH and common paths)

Scenarios

Ubuntu 22.04.1 (x86_64)

msf6 > use post/linux/gather/enum_commands msf6 post(linux/gather/enum_commands) > set session 1 session => 1 msf6 post(linux/gather/enum_commands) > run [+] Found 3795 executable binaries/commands /bin/GET /bin/HEAD /bin/POST /bin/VGAuthService /bin/X /bin/X11 /bin/Xephyr /bin/Xorg /bin/Xwayland /bin/[ /bin/aa-enabled /bin/aa-exec /bin/aa-features-abi ... [*] Post module execution completed msf6 post(linux/gather/enum_commands) >