Phase 6 : Post-Exploitation
Gather information about the system:
System Architecture
Account Status
Account Persmission
Running Services and their permission level
Map the network
Privilege Escalation:
- UAC Bypass
- Exploit service misconfiguration
- Choosing the right service :
- Has high privileges:
- Look for the write permission folders, drives,etc
- Can run on low privileges
- Can run on a reboot :
- Check the booting/ start mode (auto)
- Can be DOS (service can be crashed by the DOS), to force Windows OS to reboot
- Has high privileges:
- Choosing the right service :
- Pivoting
Gather artifacts:
- Passwords
- Tokens