Skip navigation


Once you have a shell and you have some control over a target you go into the post-exploitation phase and you start thinking on how to exploit this control to achieve more stuff. That’s what post-exploitation is about.
We all know how to use Nessus or Acunetix to find remote vulnerabilities (SQLI, XSS, you name it…) but actually there are few tools that could be used to scan the server locally.

In this paper, I will talk about finding local vulnerabilities and I will talk a bit about exploiting them to gain root or to have access to valuable files. Although this article will be focused on Linux, the same basic idea can be applied to other Operating systems.

Download the Paper


Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: