Phase 6 : Post-Exploitation

  • Gather information about the system:

    • System Architecture

    • Account Status

    • Account Persmission

    • Running Services and their permission level

    • Map the network

  • Privilege Escalation:

    • UAC Bypass
    • Exploit service misconfiguration
      • Choosing the right service :
        • Has high privileges:
          • Look for the write permission folders, drives,etc
        • Can run on low privileges
        • Can run on a reboot :
          • Check the booting/ start mode (auto)
        • Can be DOS (service can be crashed by the DOS), to force Windows OS to reboot
    • Pivoting
  • Gather artifacts:

    • Passwords
    • Tokens

results matching ""

    No results matching ""