Reader challenge

For this section, review the information from the chapter and try and expand on the topics. This will allow you to increase your knowledge on the different topics. To stimulate your thinking, try some of the following topics:

  • Create scripts to enumerate the machine. Throughout this chapter, we have discussed the commands you can use to enumerate information from a compromised machine; as an added challenge, create script files, so that when you compromise the machine, you can grab the information from that machine with one command. Experiment with this and try a number of different scripting languages to include the shell scripts as well. There are multiple possibilities that you may encounter, so the more variety you have in your scripts, the better chance you have of enumerating a system in a timely manner.
  • Create a double pivot. That is a pivot from a compromised machine that was compromised via a previous pivot. This can be a challenge, so it will take time to create the pivot. Then create the second pivot point. For an added challenge, do all of the pivots from within the meterpreter shell and not with the aid of Armitage.

These two challenges are designed to increase your skills with respect to post-exploitation, and also provide you with more scripting practice. Enjoying and challenging yourself, it is the best way to learn!

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset