Chapter 5 - Linux Post-Exploitation

Unplug the network cable and instantiate draconian measures for physical security, You’ll make sure nobody can get in, but you’ll also make sure that nobody actually wants to use the platform. And that may sound like an extreme case, but it’s a very fundamental issue in security. You cannot look at security as something separate. Security issues are ‘just’ normal bugs

Linus Torvald

This is the phase I like to refer to as second pass enumeration or enumeration from the inside. Now that we've gained a foothold into the network it is crucial to run all of our enumeration from the ground up as an inside actor.

Resources

The Linux Programming Interface

DirtyCow

kernel-exploits - GitHub

Linux Kernel Exploits - GitHub

Basic Linux Privilege Escalation - g0tm1lk

UNIX PrivEsc Check

LinEnum

linuxprivchecker.py

Linux PrivEsc for fun and profit and all around mischief

A PenTester's Guide to Pivoting

Understanding systemd

Privesc Checking

Listing Packages

Uploading Files

Port Redirection

rinetd

SSH

Generate key

SSH with Key

SSH Tunneling

tgcd tunneling

HTTP Tunneling

Proxychains

Networking

Listen for Shell

Resources

Reverse Shell Cheat Sheet

TCP

UDP

Start a simple HTTP server

Bash Foo

bin2shellcode

Scan for string in all files in a directory

Convert file contents to lowercase

Simple for loop

Remove last byte from a file

Hijack full path to a binary for current pts

Use Env to force scripts to run a different command

Port Knocking

Breakout Shell

Resources

Escape from Shellcatraz: Breaking out of restricted UNIX shells

Upgrade Shell

Netcat

Resources

Upgrading Simple shells to fully interactive TTYs

Insecure Sudo

Finding gems on the file system

Unmounted drives

Exim

Wildcard Manipulation

Resources

UNIX Wildcards gone wild

Sudoedit

Tar

Last updated

Was this helpful?