Post Exploitation

This topic contains 1 reply, has 2 voices, and was last updated by  SynJunkie 10 years, 11 months ago.

  • Author
    Posts
  • #3011
     Anonymous 
    Participant

    I’m doing some work on some post exploitation tasks and automating them.

    anyone care to share their favorite post exploitation activities?

    From ValSmith’s Defcon talk I have

    1. renable RDP
    2. get a password/hash log into every box in the domain and do “something”

  • #20600
     SynJunkie 
    Participant

    Hi Chris,

    In my opinion its all about the data, so effective methods of finding and extracting data from the network are pretty important.

    Also, different ways of covering tracks is quite interesting, maybe overwriting tools by piping larger files into them using type (type bigfile.exe > evil.exe)

    Also playing with the time on devices/hosts to make the forensics more interesting.  oh and log file manipulation, thats always fun.

    Regards

    Syn

You must be logged in to reply to this topic.

Copyright ©2019 Caendra, Inc.

Contact Us

Thoughts, suggestions, issues? Send us an email, and we'll get back to you.

Sending

Sign in with Caendra

Forgot password?Sign up

Forgot your details?