ENVIRONMENT VARS
these are additional ways or alternative methods users are able to provide input to a program specially in the context of buffer overflow vulnerabilities.
environment variables are publicly accessible variables in the OS that any software can interact with. environment variables control different aspect of the system
#WINDOWS
PS C:\> Get-ChildItem Env:
Name Value
---- -----
ALLUSERSPROFILE C:\ProgramData
APPDATA C:\Users\**********.MIL\AppData\Roaming
CommonProgramFiles C:\Program Files\Common Files
CommonProgramFiles(x86) C:\Program Files (x86)\Common Files
CommonProgramW6432 C:\Program Files\Common Files
COMPUTERNAME EISEW3U216NB102
ComSpec C:\WINDOWS\system32\cmd.exe
DEFLOGDIR C:\ProgramData\McAfee\Endpoint Security\Logs
DriverData C:\Windows\System32\Drivers\DriverData
EFC_3592 1
HOMEDRIVE C:
HOMEPATH \Users\**********.MIL
LOCALAPPDATA C:\Users\**********.MIL\AppData\Local
LOGONSERVER \\EISEW3U216NB102
NUMBER_OF_PROCESSORS 12
OneDrive C:\Users\**********.MIL\OneDrive - US Army
OneDriveCommercial C:\Users\**********.MIL\OneDrive - US Army
OS Windows_NT
Path C:\WINDOWS\system32;C:\WINDOWS;C:\WINDOWS\System32\Wbem;C:\WINDOWS\System32\WindowsPo...
PATHEXT .COM;.EXE;.BAT;.CMD;.VBS;.VBE;.JS;.JSE;.WSF;.WSH;.MSC;.CPL
PROCESSOR_ARCHITECTURE AMD64
PROCESSOR_IDENTIFIER Intel64 Family 6 Model 186 Stepping 3, GenuineIntel
PROCESSOR_LEVEL 6
PROCESSOR_REVISION ba03
ProgramData C:\ProgramData
ProgramFiles C:\Program Files
ProgramFiles(x86) C:\Program Files (x86)
ProgramW6432 C:\Program Files
PSModulePath C:\Users\**********.MIL\OneDrive - US Army\Documents\WindowsPowerShell\Modules;C:\Pro...
PUBLIC C:\Users\Public
SESSIONNAME Console
SystemDrive C:
SystemRoot C:\WINDOWS
TEMP C:\Users\******~1.MIL\AppData\Local\Temp
TMP C:\Users\******~1.MIL\AppData\Local\Temp
USERDNSDOMAIN ecuf.ds.deas.mil
USERDOMAIN ECUF
USERDOMAIN_ROAMINGPROFILE ECUF
USERNAME **********.MIL
USERPROFILE C:\Users\**********.MIL
windir C:\WINDOWS
ZES_ENABLE_SYSMAN 1
#modification
#LINUX
remnux@remnux:~$ printenv
...
* display environment variables
remnux@remnux:~$ printenv HOME
/home/remnux
if you are able to determine that an application has access to the environment variable, a red team can manipulate it
Last updated