Chapter 5 - Linux Post-Exploitation

Unplug the network cable and instantiate draconian measures for physical security, You’ll make sure nobody can get in, but you’ll also make sure that nobody actually wants to use the platform. And that may sound like an extreme case, but it’s a very fundamental issue in security. You cannot look at security as something separate. Security issues are ‘just’ normal bugs

Linus Torvald

This is the phase I like to refer to as second pass enumeration or enumeration from the inside. Now that we've gained a foothold into the network it is crucial to run all of our enumeration from the ground up as an inside actor.

Resources

The Linux Programming Interfacearrow-up-right

DirtyCowarrow-up-right

kernel-exploits - GitHubarrow-up-right

Linux Kernel Exploits - GitHubarrow-up-right

Basic Linux Privilege Escalation - g0tm1lkarrow-up-right

UNIX PrivEsc Checkarrow-up-right

LinEnumarrow-up-right

linuxprivchecker.pyarrow-up-right

Linux PrivEsc for fun and profit and all around mischiefarrow-up-right

A PenTester's Guide to Pivotingarrow-up-right

Understanding systemdarrow-up-right

Privesc Checking

Listing Packages

Uploading Files

Port Redirection

rinetd

SSH

Generate key

SSH with Key

SSH Tunneling

tgcd tunneling

HTTP Tunneling

Proxychains

Networking

Listen for Shell

Resources

Reverse Shell Cheat Sheetarrow-up-right

TCP

UDP

Start a simple HTTP server

Bash Foo

bin2shellcode

Scan for string in all files in a directory

Convert file contents to lowercase

Simple for loop

Remove last byte from a file

Hijack full path to a binary for current pts

Use Env to force scripts to run a different command

Port Knocking

Breakout Shell

Resources

Escape from Shellcatraz: Breaking out of restricted UNIX shellsarrow-up-right

Upgrade Shell

Netcat

Resources

Upgrading Simple shells to fully interactive TTYsarrow-up-right

Insecure Sudo

Finding gems on the file system

Unmounted drives

Exim

Wildcard Manipulation

Resources

UNIX Wildcards gone wildarrow-up-right

Sudoedit

Tar

Last updated