Level: This post it's addressed for a high/medium technical skill. This commands list can be used in any shell, useful for System Administrator, Pentesters, and anyone with eager to learn.
It is always helpful to have a set of commands that will be used after achieving a remote shell.
The commands used in the remote shell has been obtained by exploiting a vulnerability, they are called "post exploitation command list"
Here I leave the link to the list of commands. I hope you find this useful.
This command list has been obtained by: Twitter
RT @mubix {blog} Post Exploitation Command Lists http://bit.ly/nuc0N0
0 comentarios:
Publicar un comentario