AIX for Penetration Testers

Background: On a recent internal pentesting engagement I managed to get an unprivileged shell on one of my client’s servers. It was a business critical server so enumerating it and rooting it was the next logical move to make. I always begin my enumeration by running the “uname -a” command to get some basic system…