VK9 Security

  • Home
  • Red Team
    • Anonymity
      • Anonymity
    • Information Gathering
      • Active Gathering
      • Passive Gathering
    • Exploitation
      • Android Exploitation
      • Linux Exploitation
      • Windows Exploitation
      • Network
      • Application
        • Web Exploitation
    • Post-Exploitation
      • Linux Post-Exploitation
      • WIndows Post-Exploitation
      • Cleaning Tracks
    • Red Team Operations
    • Reporting
    • Tools
  • Blue-Team
    • Incident Response
    • OS
      • Linux OS
        • Linux Management
        • Linux Commands
        • Linux Misc
      • Windows OS
        • Windows Commands
        • Windows Misc
        • Windows Management
    • Device Configuration
  • Labs
    • Labs

Post-Exploitation

Post-Exploitation

Linux – Post-Exploitation

Enumeration Post-Exploitation
  • linux-exploit-suggester – Enumeration Linux kernelLinux-based machine
  • LinEnum – Linux Config Enumeration
  • Linux Config Enumeration – Linuxprivchecker
  • Linux Config Enumeration – Unix-Privesc-CheckLinux
Linux privilege escalation techniques:
  • Perl – Privilege Escalation
  • Nmap – Privilege Escalation
  • find – privilege escalation
  • service – Privilege Escalation
  • apt-get – Privilege escalation
  • wget – Privilege Escalation
  • HT – privilege escalation
Cron
  • Using crontab and command injection privilege escalation
  • laravel – schedule task – crontab
CVE
  • ssl-heartbleed – CVE-2014-0160
  • Chkrootkit 0.49 – Local Privilege Escalation – CVE-2014-0476

Windows – Post-Exploitation

CVE Exploits
  • Windows MS10_092 – Schelevator – Privilege Escalation
  • Windows Exploit MS15-051 – CVE-2015-1701 – Privilege Escalation
Enumeration Post-Exploitation
  • Local_exploit_suggester – Windows Enum
  • Windows-Exploit-Suggester – Windows Enum
Windows Hashes
  • Windows Password Hashes
  • Windows XP – Get Hashes (Local)
  • Windows 7 – Get Hashes (Local)
  • Windows 10 – Get Hashes (Local)
  • Windows 10 – Get Hashes (Domain)
  • Domain Server – Get Hashes
  • Blog
  • Blue-Team
  • Labs
  • Main
  • Red Team
VK9 Security | By Vry4n