Environment_settings - zollak/pentest-notes GitHub Wiki

Use bash's Parameter Expansion to list PATH variable:

root@alive # echo "${PATH//:/$'\n'}"
/usr/local/sbin
/usr/local/bin
/usr/sbin
/usr/bin
/sbin
/bin

This replaces all : in $PATH by a newline (\n) and prints the result. The content of $PATH remains unchanged.

root@alive # echo $PATH
/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
root@alive # ls -la /opt/scripts/
total 748
drwxr-xr-x  2 root root    4096 May 24 07:58 .
drwxr-xr-x 13 root root    4096 May 20 00:25 ..
-rwxr-xr-x  1 root root     278 Oct 24  2019 burp.sh
-rwxr-xr-x  1 root root     136 Jun 11  2018 chrome.sh
-rwxr-xr-x  1 root root     261 Jan 20  2018 http-verb-tampering.sh
-rwxr-xr-x  1 root root  254013 Mar 30  2016 Linux_Exploit_Suggester.pl
-rwxr-xr-x  1 root root     285 Apr  5  2017 mount-shared-folders.sh
-rwxr-xr-x  1 root root    2363 Dec 21  2017 rename.sh
-rwxr-xr-x  1 root staff    772 Aug 15  2018 startap.sh
-rwxr-xr-x  1 root staff    602 Aug 29  2017 startap_without_proxy.sh
-rwxr-xr-x  1 root staff    552 Apr 12  2017 stopap.sh
-rwxr-xr-x  1 root staff    851 Nov 24  2018 timesync.sh
-rwxr-xr-x  1 root root  460370 Mar 30  2016 windows-exploit-suggester.py
root@alive # ln -s /opt/scripts/windows-exploit-suggester.py /usr/local/sbin/windows-exploit-suggester
root@alive # ln -s /opt/scripts/rename.sh /usr/local/sbin/rename
root@alive # ln -s /opt/scripts/http-verb-tampering.sh /usr/local/sbin/http-verb-tampering
root@alive # ln -s /opt/scripts/Linux_Exploit_Suggester.pl /usr/local/sbin/linux_exploit_suggester
root@alive # ln -s /opt/scripts/mount-shared-folders.sh /usr/local/sbin/mount-shared-folders

⚠️ **GitHub.com Fallback** ⚠️