Post Exploitation methodology
Post-exploitation refers to any actions taken after a session is opened.
Some of the actions you can take in an open session include:
Collect System Information (Run script or manual find)
Pivot
Run Meterpreter Modules
Search the File System
Linux Privilege Escalation Checklist
Linux script
Linux post exploitation scripts
Windows script
See Linux Post exploitation command line
Linux Post Exploitation Command List
Things to look for
Miss-configured services (cronjobs)
any running as a privileged user?
Incorrect file permissions (exportfs, sudo)
Miss-configured environment ($PATH)
Binary with SUID bit
Software or OS with known vulnerabilities
SUDO
Can you su to root without a password?
Are you a sudo user already? Do you have access to powerful commands like chown or chmod?
Log in as another user''
Privilege Escalation using SUID Binaries
Linux Privilege Escalation using SUID Binaries
Grep hardcoded passwords
Last updated