Quantcast
Viewing all articles
Browse latest Browse all 1156

Post Exploitation Command Lists

I’ve had a private list of commands that I run on Windows or Linux when I pop a shell, as I’m sure most pentesters do. It isn’t so much a thing of hoarding as much it is just jumbled notes that are ‘not worth posting’ Well, I made two (now 3) public google docs (anyone can edit) *don’t be a dick clause Linux/Unix/BSD Post Exploitation: https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5NMH034VDM-1N-EWPRz2770K4/edit?hl=en_US Windows Post Exploitation: https://docs.google.com/document/d/1U10isynOpQtrIK6ChuReu-K1WHTJm4fgG3joiuz43rw/edit?hl=en_USImage may be NSFW.
Clik here to view.

Viewing all articles
Browse latest Browse all 1156

Trending Articles