What are good ways of exploiting a system after getting a successful reverse shell? exploiting cmd commands.
What are good ways of exploiting a system after getting a successful reverse shell? exploiting cmd commands.
Post-Exploitation Methodology
│
├── 1 - Local Enumeration
│ ├── Enumerating System Information
│ ├── Enumerating Users And Groups
│ ├── Enumerating Network Information
│ ├── Enumerating Services
│ └── Automating Local Enumeration
│
├── 2 – Transfering Files
│ ├── Setting Up A Web Server With Python
│ ├── Transfering Files To Windows Targets
│ └── Transfering Files To Linux Targets
│
├── 3 - Upgrading Shells
│ ├── Upgrading Command Shells To Meterpreter
│ └── Spawning TTY Shells
│
├── 4 - Privilege Escalation
│ ├── Identifying PrivEsc Vulns
│ ├── Windows PrivEsc
│ └── Linux PrivEsc
│
├── 5 - Persistence
│ ├── Setting Up Persistence On Windows
│ └── Setting Up Persistence On Linux
│
├── 6 - Dumping & Cracking Hashes
│ ├── Dumping & Cracking Windows Hashes
│ └── Dumping & Cracking Linux Hashes
│
├── 7 - Pivoting
│ ├── Internal Network Recon
│ └── Pivoting
│
└── 8 - Clearing Your Tracks
└── Clearing Your Tracks On Windows & Linux
did you extract this from somewhere you can share?Bash:Post-Exploitation Methodology │ ├── 1 - Local Enumeration │ ├── Enumerating System Information │ ├── Enumerating Users And Groups │ ├── Enumerating Network Information │ ├── Enumerating Services │ └── Automating Local Enumeration │ ├── 2 – Transfering Files │ ├── Setting Up A Web Server With Python │ ├── Transfering Files To Windows Targets │ └── Transfering Files To Linux Targets │ ├── 3 - Upgrading Shells │ ├── Upgrading Command Shells To Meterpreter │ └── Spawning TTY Shells │ ├── 4 - Privilege Escalation │ ├── Identifying PrivEsc Vulns │ ├── Windows PrivEsc │ └── Linux PrivEsc │ ├── 5 - Persistence │ ├── Setting Up Persistence On Windows │ └── Setting Up Persistence On Linux │ ├── 6 - Dumping & Cracking Hashes │ ├── Dumping & Cracking Windows Hashes │ └── Dumping & Cracking Linux Hashes │ ├── 7 - Pivoting │ ├── Internal Network Recon │ └── Pivoting │ └── 8 - Clearing Your Tracks └── Clearing Your Tracks On Windows & Linux
my own cheat sheetdid you extract this from somewhere you can share?![]()
do you have a cheatsheet for persistence?my own cheat sheet
it's easy to find something like that this daysdo you have a cheatsheet for persistence?
Yes, I did make such a cheatsheet for everything from Recon to Data-Exfiltration, only I don't have the right cheatsheet for persistence. I've searched a bit, but I'd haven't found anything really good.It's easy to find something like that this days
do you have a cheatsheet for persistence?
do you have a cheatsheet for persistence?