Pentest
search
Ctrlk
Pentest
  • Homepage
  • Pentest Links
  • 01 Prep
  • 02 Scan
  • 03 Getting In
  • 04 WebApps
  • 05 Passwords & Ciphers
  • 06 Linux PrivEsc
    • 1 Look Around
    • 2 Enums
    • 3 PrivEsc
    • 4 Kernel Exploits
    • 5 Looting
    • binaries
    • Buffer Overflow
    • bash prison
    • Monitor Files
    • mongodb node
    • Pivots
    • Remote Execute
    • Shell TTY Fix
    • TAR backups
    • Transfer Files
    • vnc
  • 07 Windows PrivEsc
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. 06 Linux PrivEsc

5 Looting

hashtag
After root

  1. dump etc/shadow

  2. check /var/mail

  3. Cheat sheet: https://xapax.gitbooks.io/security/content/tcp-dumps_on_pwnd_machines.htmlarrow-up-right

https://xapax.github.io/security/arrow-up-right https://xapax.github.io/security/#post_exploitation/privilege_escalation_-_linux/arrow-up-right

https://github.com/mubix/post-exploitation-wikiarrow-up-right

Previous4 Kernel Exploitschevron-leftNextbinarieschevron-right

Last updated 2 years ago