Summary
We covered plenty of things in this chapter. We learned advanced post-exploitation. We also covered migration, obtaining system privileges, timestomp, and obtaining hashes. We also saw how we could use Metasploit for privilege escalation and maintaining access for both Linux and Windows systems.
You had a variety of exercises to complete throughout this chapter. However, if you would like to try more, then try performing the following tasks:
- Try privilege escalation on a variety of systems, including Windows Server 2003, Windows XP, Windows 7, Windows 8.1, and Windows 10. Notice the differences and maintain a list of modules used for escalating privileges on these systems.
- Install two- to three-year-old copies of Red Hat, CentOS, and Ubuntu operating systems, figure out the kernel version, and try escalating privileges on those machines.
- Figure out ways to obtain persistence on OSX, BSD, and Solaris operating systems.
In Chapter 5, Testing Services with Metasploit, we will look at testing...