Chapter 5 - Linux Post-Exploitation
Unplug the network cable and instantiate draconian measures for physical security, You’ll make sure nobody can get in, but you’ll also make sure that nobody actually wants to use the platform. And that may sound like an extreme case, but it’s a very fundamental issue in security. You cannot look at security as something separate. Security issues are ‘just’ normal bugs
— Linus Torvald
This is the phase I like to refer to as second pass enumeration or enumeration from the inside. Now that we've gained a foothold into the network it is crucial to run all of our enumeration from the ground up as an inside actor.
Resources
The Linux Programming Interface
Linux Kernel Exploits - GitHub
Basic Linux Privilege Escalation - g0tm1lk
Linux PrivEsc for fun and profit and all around mischief
A PenTester's Guide to Pivoting
Privesc Checking
Listing Packages
Uploading Files
Port Redirection
rinetd
SSH
Generate key
SSH with Key
SSH Tunneling
tgcd tunneling
HTTP Tunneling
Proxychains
Networking
Listen for Shell
Resources
TCP
UDP
Start a simple HTTP server
Bash Foo
bin2shellcode
Scan for string in all files in a directory
Convert file contents to lowercase
Simple for loop
Remove last byte from a file
Hijack full path to a binary for current pts
Use Env to force scripts to run a different command
Port Knocking
Breakout Shell
Resources
Escape from Shellcatraz: Breaking out of restricted UNIX shells
Upgrade Shell
Netcat
Resources
Upgrading Simple shells to fully interactive TTYs
Insecure Sudo
Finding gems on the file system
Unmounted drives
Exim
Wildcard Manipulation
Resources
Sudoedit
Tar
Last updated
Was this helpful?