System Enumeration

Kernel Version

uname -a
Linux kali 5.15.0-kali2-amd64 #1 SMP Debian 5.15.5-2kali2 (2021-12-22) x86_64 GNU/Linux

Version Information

cat /proc/version
Linux version 5.15.0-kali2-amd64 (devel@kali.org) (gcc-11 (Debian 11.2.0-12) 11.2.0, GNU ld (GNU Binutils for Debian) 2.37) #1 SMP Debian 5.15.5-2kali2 (2021-12-22)

Architecture

lscpu
Architecture: x86_64
CPU op-mode(s): 32-bit, 64-bit
Address sizes: 40 bits physical, 48 bits virtual
Byte Order: Little Endian
CPU(s): 4
On-line CPU(s) list: 0-3
Vendor ID: GenuineIntel
Model name: Intel(R) Core(TM) i7-7700HQ CPU @ 2.80GHz
CPU family: 6
Model: 158
Thread(s) per core: 1
Core(s) per socket: 1
Socket(s): 4
Stepping: 9
BogoMIPS: 5615.99
Flags: fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat ps
e36 clflush mmx fxsr sse sse2 ss syscall nx rdtscp lm constant_tsc a
rch_perfmon nopl tsc_reliable nonstop_tsc cpuid tsc_known_freq pni p
clmulqdq ssse3 fma cx16 sse4_1 sse4_2 movbe popcnt aes xsave avx hyp
ervisor lahf_lm 3dnowprefetch arat
Virtualization features:
Hypervisor vendor: VMware
Virtualization type: full
Caches (sum of all):
L1d: 128 KiB (4 instances)
L1i: 128 KiB (4 instances)
L2: 1 MiB (4 instances)
L3: 24 MiB (4 instances)
NUMA:
NUMA node(s): 1
NUMA node0 CPU(s): 0-3
Vulnerabilities:
Itlb multihit: KVM: Mitigation: VMX unsupported
L1tf: Mitigation; PTE Inversion
Mds: Vulnerable; SMT Host state unknown
Meltdown: Vulnerable
Spec store bypass: Vulnerable
Spectre v1: Vulnerable: __user pointer sanitization and usercopy barriers only;
no swapgs barriers
Spectre v2: Vulnerable, STIBP: disabled
Srbds: Not affected
Tsx async abort: Not affected

View running Processes

Note: The tool pspy can view process by all users regardless of users current permissions. Useful for hunting cronjobs running as root

https://github.com/DominicBreuker/pspy

ps -aux

ps -aux | grep root