[ Pen Testing ] :: Step by Step: Post-Exploitation

Glenn Norman

Post-Exploitation Now we’re in, and it’s time to expand our powers. Post-Exploitation in Windows CrackMapExec is our most excellent friend here. It’s a Windows/Active Directory exploration/exploitation tool that lets us walk their domain and machines and do whatever we damn well wanna. And it’s current as of this writing (2018). Here’s a really good walk-through: …

[ Pen Testing ] :: Step by Step: Exploitation

Exploitation BOF (buffer overflow) Exploits Buffer overflows are pretty technical, but eventually you’ll find yourself using them. In most cases you’ll copy or create code and encode it into a shellcode exploit. Review and correct the initial pre for configurable variables. Pay special attention to removing all badchars. Which characters are bad depends heavily on …

[ Pen Testing ] :: Step by Step: Enumeration

Enumeration Okay, by now you’ve spent hours, days or weeks stealthily footprinting your scope. Since this is pen testing, you’ve been mighty careful not to exceed your scope, right? So let’s talk tools and techniques. See https://security.stackexchange.com/questions/168247/reduce-noise-when-penetration-testing for an extensive list of tools. LinEnum https://github.com/rebootuser/LinEnum Local Linux Enumeration & Privilege Escalation Cheatsheet: an item-by-item list …