Chapter 5 - Linux Post-Exploitation
Resources
Privesc Checking
Listing Packages
Uploading Files
Port Redirection
rinetd
SSH
Generate key
SSH with Key
SSH Tunneling
tgcd tunneling
HTTP Tunneling
Proxychains
Networking
Listen for Shell
Resources
TCP
UDP
Start a simple HTTP server
Bash Foo
bin2shellcode
Scan for string in all files in a directory
Convert file contents to lowercase
Simple for loop
Remove last byte from a file
Hijack full path to a binary for current pts
Use Env to force scripts to run a different command
Port Knocking
Breakout Shell
Resources
Upgrade Shell
Netcat
Resources
Insecure Sudo
Finding gems on the file system
Unmounted drives
Exim
Wildcard Manipulation
Resources
Sudoedit
Tar
Last updated