Linux
Introduction
In this section, you will find several useful commands for the Post-Exploitation phase in Linux systems.
User
Creating a user
Add a user to a group
Create an alternative root user
Login through SSH
There are times when we have a remote terminal as a user but we want to have access as that user via SSH although we do not know their password. SSH keys are used for these cases.
Generate a SSH key pair.
Add the public key to the victim's file
~/.ssh/authorized_keys
:
Log in.
Shell Escapes
It could be the case that you have obtained access to a restricted shell allowing you to perform a minimal amount of commands and preventing you from accessing other directories or files.
In this section, you will find some ways to escape those restricted shells.
SSH
Python Jail
For more examples of how to escape restricted shells, read the following articles.
Last updated