You got a shell - now what? Post-exploitation is everything that happens after initial access. This includes enumeration, privilege escalation, persistence, lateral movement, and achieving your objectives.
Getting initial access is just the beginning. The real work starts in post-exploitation - understanding the environment, escalating privileges, and moving through the network.
Situational Awareness
Linux Enumeration
Windows Enumeration
File Transfers
Basic Persistence
Persistence should only be used in authorized engagements. Always document what you add and clean up after yourself!
Knowledge Check
Key Takeaways
- First: situational awareness - who, where, what system
- Enumerate systematically - users, processes, network, files
- Know multiple file transfer methods - some will be blocked
- Document everything for your report
- Persistence requires cleanup - always remove your artifacts