eJPT Junior Penetration Tester
ShopAuthorPatreonHTB Pro Labs
eJPT Junior Penetration Tester
eJPT Junior Penetration Tester
  • 🍕eJPT Study Notes
  • Author
  • eCPPTv2 Study Notes
  • INE eJPT Exam
    • Description
    • eJPT Certification
  • RFS Tips
    • Before the Exam
    • Prepare your Setup
    • Questions?
    • Start Hacking
  • Methodology
    • 1️⃣To Scan a Network
    • 2️⃣To Attack a Linux Machine
    • 3️⃣To Attack a Windows Machine
    • 4️⃣Pivoting Methodology
    • 5️⃣Linux Post Exploitation
    • 6️⃣Windows Post Exploitation
  • Community
    • LinkedIn
    • Discord
  • Networking
    • 🟢OSI Layers
    • 🟢Protocols
    • 🟢Subnetting
    • 🟢Routing
    • Pivoting
  • Network Protocols
    • 🟢FTP 21
    • 🟢SSH 22
    • ✅HTTP 80
    • 🟢NetBIOS 139
    • 🟠SMB 445
    • MySQL 3306
    • 🟢RDP 3389
  • Web Attacks
    • XSS
    • SQLi
    • Path Traversal
    • Command Injection
    • LFI - Local File Inclusion
    • LFI cheatsheet - HTB
  • Web CMS Attacks
    • Wordpress
    • Joomla
    • TomCat
  • Exploits
    • Search Exploits
    • Linux
    • Windows
  • Tools
    • dirb
    • 🟢Gobuster
    • Nmap
    • Netcat
    • Burpsuite
    • 🟢SQLMap
    • 🟢Metasploit
    • Hydra
    • 🟢John the Ripper
    • Hashcat
  • Web Tools
    • 😍RevShells
    • MD5 Crack
    • CyberChef
    • SecLists
  • TryHackMe Rooms
    • DogCat
    • Archangel
    • OWASP Juice Shop
  • Hack The Box Rooms
    • Page 2
  • Create Your Own Lab
    • Page 3
  • Other Resources
    • Page 1
  • TCM Security Courses
    • Page 4
Powered by GitBook
On this page
  • Information Gathering
  • Privilege Escalation
  • Maintaining Persistence
  • Lateral Movement
  • Data Exfiltration
  • Covering Tracks
  • Exploiting Services:
  • Resource Abuse

Was this helpful?

  1. Methodology

Linux Post Exploitation

Uncover the advanced techniques employed by cybersecurity experts to navigate and control Linux systems post-compromise. Elevate your understanding of post-exploitation strategies, privilege escalatio

Understanding post-exploitation methodologies in a Linux environment is crucial for cybersecurity professionals.

Here's an overview of the Linux post-exploitation methodology:

Information Gathering

  • System Identification: Identify the Linux distribution, kernel version, and other system details.

  • User Enumeration: Enumerate users and their privileges on the compromised system.

Privilege Escalation

  • Exploiting Vulnerabilities: Identify and exploit vulnerabilities to escalate privileges.

  • Abusing Sudo Permissions: Exploit misconfigurations in sudo permissions to gain higher privileges.

  • Kernel Exploits: Look for kernel vulnerabilities that can be exploited for privilege escalation.

Maintaining Persistence

  • Backdoors: Install backdoors for persistent access.

  • Cron Jobs: Create scheduled tasks for continuous access.

  • SSH Keys: Add SSH keys for persistent remote access.

Lateral Movement

  • SSH Tunnels: Establish SSH tunnels for accessing other systems in the network.

  • Pass-the-Hash (PtH): Use compromised credentials to move laterally within the network.

  • Exploiting Trust Relationships: Leverage trust relationships between systems to move across the network.

Data Exfiltration

  • Compression and Encryption: Compress and encrypt sensitive data before exfiltration.

  • Covert Channels: Use covert channels for stealthy data transfer.

Covering Tracks

  • Log Tampering: Modify or delete logs to erase traces of the compromise.

  • Clearing Shell History: Erase command history to hide executed commands.

  • Rootkit Installation: Install rootkits to hide malicious activities.

Exploiting Services:

  • Database Exploitation: Exploit databases for data retrieval and manipulation.

  • Web Application Attacks: Identify and exploit vulnerabilities in web applications hosted on the server.

Resource Abuse

  • CPU and Memory Usage: Exploit resources for cryptocurrency mining or denial-of-service attacks.

  • Network Scanning: Scan the internal network for potential targets.

PreviousPivoting MethodologyNextWindows Post Exploitation

Last updated 1 year ago

Was this helpful?

5️⃣
Page cover image