Post-Exploitation Enumeration
Overview
After gaining initial access to a system, enumeration determines what you have, where you are, and where to go next. Systematic post-exploitation enumeration identifies the current user context, system configuration, network position, installed software, and potential privilege escalation vectors. This is the foundation for every subsequent post-exploitation activity — escalation, credential harvesting, lateral movement, and persistence all depend on thorough enumeration.
Topics in This Section
General Approach
- Situational awareness — who am I, where am I, what OS/kernel, what privileges
- Network position — interfaces, routes, connections, accessible subnets
- User and group context — local users, groups, sudo rights, domain membership
- Running services — processes, listening ports, scheduled tasks
- Installed software — packages, versions, known vulnerable applications
- File system — writable directories, SUID/SGID binaries, sensitive files
- Credential hunting — config files, history files, cached credentials
- Defense posture — AV, EDR, firewall rules, logging configuration