Skip to content

Latest commit

 

History

History
75 lines (48 loc) · 3.24 KB

File metadata and controls

75 lines (48 loc) · 3.24 KB
description
So, you have successfully gotten your first toe hold into your targets network. What next?

Post Exploitation

Post Exploitation Tasks and Checklists

Command and Control

Similar to exploitation frameworks for one-stop shopping, Command and Control tools provide a wealth of bundled utilities for post exploitation activities and remote control. These are your post-exploitation easy button.

{% content-ref url="../../post-exploitation/c2-frameworks.md" %} c2-frameworks.md {% endcontent-ref %}

Persistence

Your initial exploit and your first shell connecting to your target might often be a delicate connection. One of the first things you should do is establish persistence in the way of a backdoor into your target for quicker, easier, and more reliable access.

{% content-ref url="persistence.md" %} persistence.md {% endcontent-ref %}

Defense Evasion

Most devices that you will attack will have some sort of defense mechanisms in place to prevent you from your goal. Follow some of these tools and tactics to evade detection.

{% content-ref url="defense-evasion.md" %} defense-evasion.md {% endcontent-ref %}

Enumeration and Harvesting

Once a device has had its initial compromise, you can empty it of all of its goodies. Discover interesting files and settings, as well as things that might help you compromise another host such as stored credentials!

{% content-ref url="enumeration-and-harvesting.md" %} enumeration-and-harvesting.md {% endcontent-ref %}

Exfiltration and File Transfer

After scooping up all the goodies in your compromised device, you can sneakily move them out of your target's network to a safe place. You can use the same utilities to move tools and utilties onto compromised devices for further exploitation.

{% content-ref url="../../post-exploitation/file-transfer.md" %} file-transfer.md {% endcontent-ref %}

Network Harvesting

The other side to endpoint harvesting, you can use your newly compromised device to inspect and interact with passing network traffic, to gather even more useful information like credentials.

{% content-ref url="../../post-exploitation/network-attacks-harvesting-mitm.md" %} network-attacks-harvesting-mitm.md {% endcontent-ref %}

Privilege Escalation

Some exploits only give you lower level privileges, but we can use exploits and harvesting techniques to give ourselves a high level of privilege on our compromised target, that allows us to interact with a larger array of things.

{% content-ref url="privilege-escalation.md" %} privilege-escalation.md {% endcontent-ref %}

Meterpreter Post-Auth Runbook

For those using the super powerful remote shell Meterpreter, here is a handy runbook of all the things you can do once you have your shell to a compromised device.

{% content-ref url="meterpreter-post-auth-runbook.md" %} meterpreter-post-auth-runbook.md {% endcontent-ref %}