Post Exploitation
This page contains notes on post-exploitation
About Post Exploitation
Post-exploitation refers to the phase of a cybersecurity attack that occurs after an attacker has successfully compromised a target system. During this phase, the attacker aims to maintain access, gather valuable information, escalate privileges, and potentially launch further attacks. It involves activities such as lateral movement within the network, data exfiltration, creating backdoors, and covering their tracks to avoid detection. Post-exploitation is a crucial part of the attack lifecycle as it allows the attacker to maximize the impact of their initial compromise and achieve their ultimate objectives.
Tunneling with Chisel
Chisel is a fast TCP/UDP tunnel, transported over HTTP, secured via SSH. Single executable including both client and server. Written in Go (golang). Chisel is mainly useful for passing through firewalls, though it can also be used to provide a secure endpoint into your network.
Exposing Internal Service
On attacker machine, run this command:
Example, on target there is service running on port 8000 at localhost, then run this command:
Now, we can access the service from port 8001 on our machine.
Scanning Internal Server / IP
From attacker machine, run chisel server.
From Client:
Now, from attacker machine, add proxy to proxychains4.conf
Now you can scan internal target IP from attacker machine.
Related Links
Last updated