Credential Hunting in Linux
π― Overview
π§ Linux-Specific Credential Locations
System Configuration Directories
/etc/ # System-wide configuration files
/etc/passwd # User account information
/etc/shadow # Password hashes (requires root)
/etc/sudoers # Sudo configuration
/etc/crontab # Scheduled tasks with potential credentials
/etc/fstab # Filesystem mounts (SMB/NFS credentials)
/etc/network/interfaces # Network configuration
/etc/wpa_supplicant/ # WiFi credentialsUser-Specific Locations
Application-Specific Paths
π― HTB Academy Enhanced Techniques
HTB Academy File Extension Search Method
HTB Academy Log Analysis Method
π File System Search Techniques
1. Find Command - File Discovery
2. Grep Command - Content Searching
3. Advanced Search Patterns
π Specific Configuration File Hunting
SSH Configuration and Keys
Database Configuration Files
Web Application Configurations
π°οΈ History File Analysis
Command History Files
Application History Files
π Environment Variables and Process Analysis
Environment Variable Hunting
Service and Daemon Analysis
π Log File Analysis
System Logs
Application-Specific Logs
π§ Linux-Specific Tools and Techniques
1. Mimipenguin - Linux Memory Credential Extraction
2. LaZagne for Linux
3. Firefox Decrypt - Browser Credential Extraction
4. LinPEAS (Linux Privilege Escalation Awesome Scripts)
5. Custom Linux Credential Scripts
π³ Container and Orchestration Credential Hunting
Docker Credential Hunting
Kubernetes Credential Hunting
π Memory and Process Credential Extraction
Process Memory Analysis
System Memory Analysis
π Systematic Linux Credential Hunting Checklist
Phase 1: Initial Reconnaissance
Phase 2: File System Discovery
Phase 3: Content Analysis
Phase 4: History and Environment
Phase 5: Application-Specific Hunting
π‘οΈ Detection Evasion for Linux
Stealth Techniques
Cleanup Commands
π― HTB Academy Lab Example
Lab Scenario
Systematic Approach
Common Discovery Patterns
π‘ Key Takeaways for Linux Credential Hunting
Last updated