Post Exploitation 101

I read the following tweet by Florian Roth a couple of days ago:

I could not agree more with the reply from Florian. See below a list of resources that help tuning detection mechanisms for post exploitation activities.

  1. Windows enumeration commands 
  2. Windows post exploitation resources
  3. Living off the land
  4. Windows commands abused by the attackers
  5. Post Exploitation using WMIC
  6. Post Exploitation in Windows using dir Command
  7. Post Exploitation on Windows PC
  8. Linux post exploitation
  9. Patterns of behaviour

Enjoy and happy hunting ;)

Advertisements

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

w

Connecting to %s