Skip to Content
The Art of Network Penetration Testing
book

The Art of Network Penetration Testing

by Royce Davis
December 2020
Intermediate to advanced
304 pages
8h 57m
English
Manning Publications
Content preview from The Art of Network Penetration Testing

9 Linux or UNIX post-exploitation

This chapter covers

  • Harvesting credentials from .dot files
  • Tunneling through SSH connections
  • Automating SSH pubkey authentication with bash
  • Scheduling a reverse callback using cron
  • Escalating privileges with SUID binaries

In the last chapter, we discussed the three main components of Windows post-exploitation, which you will recall are the following:

  • Maintaining reliable re-entry

  • Harvesting credentials

  • Moving laterally

These are the same for Linux- or UNIX-based systems; the only difference is the techniques used to do them. A strong pentester is OS-agnostic. It doesn’t matter if you’re on a Windows machine, FreeBSD UNIX, CentOS Linux, or macOS. You should know enough about where to find credentials, ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Penetration Testing

Penetration Testing

Georgia Weidman
Penetration Testing: A Survival Guide

Penetration Testing: A Survival Guide

Wolf Halton, Bo Weaver, Juned Ahmed Ansari, Srinivasa Rao Kotipalli, Mohammed A. Imran

Publisher Resources

ISBN: 9781617296826Supplemental ContentPublisher SupportOtherPublisher WebsiteSupplemental ContentPurchase Link