Files
metasploit-gs/documentation/modules/post/linux/gather/enum_commands.md
T
2025-07-17 09:53:40 +01:00

53 lines
897 B
Markdown

## Vulnerable Application
This module will check which shell commands are available on a system.
## Verification Steps
1. Start msfconsole
1. Get a session
1. Do: `use post/linux/gather/enum_commands`
1. Do: `set session <session ID>`
1. Do: `run`
1. You should receive a list of shell commands
## Options
### DIR
Optional directory name to list (in addition to default system PATH and common paths)
## Scenarios
### Ubuntu 22.04.1 (x86_64)
```
msf > use post/linux/gather/enum_commands
msf post(linux/gather/enum_commands) > set session 1
session => 1
msf post(linux/gather/enum_commands) > run
[+] Found 3795 executable binaries/commands
/bin/GET
/bin/HEAD
/bin/POST
/bin/VGAuthService
/bin/X
/bin/X11
/bin/Xephyr
/bin/Xorg
/bin/Xwayland
/bin/[
/bin/aa-enabled
/bin/aa-exec
/bin/aa-features-abi
...
[*] Post module execution completed
msf post(linux/gather/enum_commands) >
```