After accessing a system, one of the first things to do is to find executables with SUID set. Use the following command:
find / \( -perm -4000 -o -perm -2000 \) -type f -exec ls -la {} \;
Notes on penetration testing journeys
After accessing a system, one of the first things to do is to find executables with SUID set. Use the following command:
find / \( -perm -4000 -o -perm -2000 \) -type f -exec ls -la {} \;