Sunday, 11 September 2011

Post Exploitation Command Lists

This post is very interesting article from room362, so please go to the Source.

I've had a private list of commands that I run on Windows or Linux when I pop a shell, as I'm sure most pentesters do. It isn't so much a thing of hoarding as much it is just jumbled notes that are 'not worth posting'
Well, I made two (now 3) public google docs (anyone can edit) *don't be a dick clause
Linux/

No comments:

Post a Comment