Post-exploitation exercises
As you work through this exercise, please keep in mind that this stage is where you maintain access within the environment after gaining the initial access. Information gathered during previous phases can be helpful in making it easier for persistence in this phase. In addition, you might start another round of reconnaissance and scanning but this time from within the environment. During this phase, you expand your footprints within the environment to maintain access and persistence.
The following activities aim to give you a feel for using the tools. Please remember to stay within the ethical boundaries and don’t conduct these activities on any organization systems that would be deemed illegal.
Privilege escalation and lateral movement
Let’s begin with privilege escalation activities using the following:
- Use
unix-privsec-check
to find the weakness in the local compromised system to discover whether there is any path to escalate...