Tuesday, September 6, 2011

Some Post Exploitation Goodness

Via room362.com (Rob Fuller)

Rob Fuller has created three documents in Google Docs with a list of commands that can be used to gather information during the post exploitation phase in Windows, Linux and OSX systems.

I am sure the lists are  going to be really useful for many people with the help of some Metasploit Scripting skills.

Unix Post Exploitation

Windows Post Exploitation

OSX Post Exploitation

No comments:

Post a Comment