12 Ways to Enumerate Linux for Privilege Escalation
Enumeration is one of the key stages of penetration testing. It's the first thing to do when you've compromised a target system as a penetration tester. Although there are a plethora of tools to automate this process, it's always recommended to manually scour through and double-check the system for potential vectors of privilege escalation.
Also: New GobRAT Remote Access Trojan Targeting Linux Routers in Japan [Ed: The problem here is some unspecified Web UI, maybe proprietary, rather than Linux]