Linux Post Exploitation Discovery
Linux Post Exploitation Discovery
Description
Techniques
Resources
Identify current user ID and privileges
Identify network connections (for lateral movement)
Identify Running processes
Identify Chron jobs/scheduled tasks
Identify if Active Directory environment then identify users/groups/computers if in cloud or on-prem
If not AD, then find applications, firewalls, AV
whoami /priv netstat -na | findstr "ESTABLISHED" or "WAITING" arp -a systeminfo | findstr "Domain"
Linux Exploits
Commands
Redirect IPv6 listening TCP port to localhost IPv4.
Find Juicy Stuff in the File System
Find public ip
Make output easier to read
Encrypted Exfil channel
Check service every second
Website Cloner
Type “gah” after you forgot to use sudo, and it’ll sudo your most recent command.
Create a reverse shell back to a given IP address and port.
Encode or decode base64 information.
Helpful Commands
Linux Post Exploitation Tools
BusyBox
NMAP
Responder.py
tcpdump
http://www.monkey.org/~dugsong/dsniff/
http://www.dest-unreach.org/socat/
https://www.gnu.org/software/screen/
http://average-coder.blogspot.com/2011/09/simple-socks5-server-in-c.html
http://tgcd.sourceforge.net/
Resources
Last updated