Post Exploitation

 

Uploading / Downloading Files

After we gained a foothold on our target (exploitation) we want to upload and download files.

In our first stage we are limited to what the exploited target offers.

Some examples are:

  • tftp
  • ftp (sftp / ftps)
  • wget (http)
  • curl
  • bits (windows)
  • smb
  • netcat
  • custom scripts that make use of the available script interpreters:
    • Powershell (windows)
    • Visual Basic (windows)
    • perl
    • python
    • etc

TFTP

Create a the tftp...Read More »


Privilege Escalation

References

Basic Linux Privilege Escalation

Windows Privilege Escalation

 

...Read More »