Friday 6 January 2017

What happens after we are inside the network | Post Exploitation Wizardary

What happens when you have you have gained access? what next?
well to help you out there is some sorcery we can perform to further pivot inside the network possibly going from a low level user to root access with admin privileges.
 

Well thanks to +Rob Fuller  aka @mubix who has put together some advanced post exploit techniques which amounts to shear awesomeness from the command line simply enter.

git clone https://github.com/mubix/post-exploitation-wiki.git

[this will download and create a folder called  post-exploitation-wiki in whatever directory you run the above command from]

congratulations - you know have access to some really useful stuff  for example
  • useful commands (how do i see whose logged in again)
  • important file locations (where are those pesky passwords stored)
  • all kinds of other shit
  • I'm sure you get the hint