Pentest
CtrlK
  • Homepage
  • Pentest Links
  • 01 Prep
  • 02 Scan
  • 03 Getting In
  • 04 WebApps
  • 05 Passwords & Ciphers
  • 06 Linux PrivEsc
    • 1 Look Around
    • 2 Enums
    • 3 PrivEsc
    • 4 Kernel Exploits
    • 5 Looting
    • binaries
    • Buffer Overflow
    • bash prison
    • Monitor Files
    • mongodb node
    • Pivots
    • Remote Execute
    • Shell TTY Fix
    • TAR backups
    • Transfer Files
    • vnc
  • 07 Windows PrivEsc
Powered by GitBook
On this page

Was this helpful?

  1. 06 Linux PrivEsc

5 Looting

After root

  1. dump etc/shadow

  2. check /var/mail

  3. Cheat sheet: https://xapax.gitbooks.io/security/content/tcp-dumps_on_pwnd_machines.html

https://xapax.github.io/security/ https://xapax.github.io/security/#post_exploitation/privilege_escalation_-_linux/

https://github.com/mubix/post-exploitation-wiki

Previous4 Kernel ExploitsNextbinaries

Last updated 2 years ago

Was this helpful?