Linux Post Exploitation Discovery

Linux Post Exploitation Discovery

Description

Techniques

Resources

  • Identify current user ID and privileges

  • Identify network connections (for lateral movement)

  • Identify Running processes

  • Identify Chron jobs/scheduled tasks

  • Identify if Active Directory environment then identify users/groups/computers if in cloud or on-prem

  • If not AD, then find applications, firewalls, AV

whoami /priv netstat -na | findstr "ESTABLISHED" or "WAITING" arp -a systeminfo | findstr "Domain"

Linux Exploits

Commands

Redirect IPv6 listening TCP port to localhost IPv4.

Find Juicy Stuff in the File System

Find public ip

Make output easier to read

Encrypted Exfil channel

Check service every second

Website Cloner

Type “gah” after you forgot to use sudo, and it’ll sudo your most recent command.

Create a reverse shell back to a given IP address and port.

Encode or decode base64 information.

Helpful Commands

Linux Post Exploitation Tools

  • BusyBox

  • NMAP

  • Responder.py

  • tcpdump

  • http://www.monkey.org/~dugsong/dsniff/

  • http://www.dest-unreach.org/socat/

  • https://www.gnu.org/software/screen/

  • http://average-coder.blogspot.com/2011/09/simple-socks5-server-in-c.html

  • http://tgcd.sourceforge.net/

Resources

Last updated

Was this helpful?