.

Post Exploitation

<<

LSOChris

Post Fri Nov 14, 2008 5:16 pm

Post Exploitation

I'm doing some work on some post exploitation tasks and automating them.

anyone care to share their favorite post exploitation activities?

From ValSmith's Defcon talk I have

1. renable RDP
2. get a password/hash log into every box in the domain and do "something"
<<

SynJunkie

Jr. Member
Jr. Member

Posts: 71

Joined: Thu Apr 17, 2008 2:41 pm

Location: UK

Post Fri Nov 14, 2008 7:31 pm

Re: Post Exploitation

Hi Chris,

In my opinion its all about the data, so effective methods of finding and extracting data from the network are pretty important.

Also, different ways of covering tracks is quite interesting, maybe overwriting tools by piping larger files into them using type (type bigfile.exe > evil.exe)

Also playing with the time on devices/hosts to make the forensics more interesting.  oh and log file manipulation, thats always fun.

Regards

Syn
----------------------------------
http://synjunkie.blogspot.com

Return to Gates

Who is online

Users browsing this forum: No registered users and 0 guests

.
Powered by phpBB® Forum Software © phpBB Group.
Designed by ST Software