Environment_settings - zollak/pentest-notes GitHub Wiki
Use bash's Parameter Expansion to list PATH variable:
root@alive # echo "${PATH//:/$'\n'}"
/usr/local/sbin
/usr/local/bin
/usr/sbin
/usr/bin
/sbin
/bin
This replaces all : in $PATH by a newline (\n) and prints the result. The content of $PATH remains unchanged.
root@alive # echo $PATH
/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
root@alive # ls -la /opt/scripts/
total 748
drwxr-xr-x 2 root root 4096 May 24 07:58 .
drwxr-xr-x 13 root root 4096 May 20 00:25 ..
-rwxr-xr-x 1 root root 278 Oct 24 2019 burp.sh
-rwxr-xr-x 1 root root 136 Jun 11 2018 chrome.sh
-rwxr-xr-x 1 root root 261 Jan 20 2018 http-verb-tampering.sh
-rwxr-xr-x 1 root root 254013 Mar 30 2016 Linux_Exploit_Suggester.pl
-rwxr-xr-x 1 root root 285 Apr 5 2017 mount-shared-folders.sh
-rwxr-xr-x 1 root root 2363 Dec 21 2017 rename.sh
-rwxr-xr-x 1 root staff 772 Aug 15 2018 startap.sh
-rwxr-xr-x 1 root staff 602 Aug 29 2017 startap_without_proxy.sh
-rwxr-xr-x 1 root staff 552 Apr 12 2017 stopap.sh
-rwxr-xr-x 1 root staff 851 Nov 24 2018 timesync.sh
-rwxr-xr-x 1 root root 460370 Mar 30 2016 windows-exploit-suggester.py
root@alive # ln -s /opt/scripts/windows-exploit-suggester.py /usr/local/sbin/windows-exploit-suggester
root@alive # ln -s /opt/scripts/rename.sh /usr/local/sbin/rename
root@alive # ln -s /opt/scripts/http-verb-tampering.sh /usr/local/sbin/http-verb-tampering
root@alive # ln -s /opt/scripts/Linux_Exploit_Suggester.pl /usr/local/sbin/linux_exploit_suggester
root@alive # ln -s /opt/scripts/mount-shared-folders.sh /usr/local/sbin/mount-shared-folders