Uploading / Downloading Files
After we gained a foothold on our target (exploitation) we want to upload and download files.
In our first stage we are limited to what the exploited target offers.
Some examples are:
- tftp
- ftp (sftp / ftps)
- wget (http)
- curl
- bits (windows)
- smb
- netcat
- custom scripts that make use of the available script interpreters:
- Powershell (windows)
- Visual Basic (windows)
- perl
- python
- etc
TFTP
Create a the tftp...Read More »
Privilege Escalation
References
Basic Linux Privilege Escalation
Windows Privilege Escalation
- http://www.fuzzysecurity.com/tutorials/16.html
- http://www.bhafsec.com/wiki/index.php/Windows_Privilege_Escalation
- https://pentest.blog/windows-privilege-escalation-methods-for-pentesters/?lipi=urn%3Ali%3Apage%3Ad_flagship3_pulse_read%3BzIszsQ%2FYRU%2BiWuuAK42a9w%3D%3DÂ
- https://github.com/ankh2054/windows-pentest?lipi=urn%3Ali%3Apage%3Ad_flagship3_pulse_read%3BzIszsQ%2FYRU%2BiWuuAK42a9w%3D%3D
- https://github.com/SecWiki/windows-kernel-exploits
- https://github.com/abatchy17/WindowsExploits
...Read More »