A lived-in Linux box ships with iputils-ping, ca-certificates, and nmap available. Their absence is a cheap tell, and they're handy for letting the attacker move laterally in ways we want to observe. iproute2 (ip a) was already installed for attribution — noted here for completeness.
4.6 KiB
4.6 KiB