Post-exploit check

/root hostname && whoami && cat proof.txt && /sbin/ifconfig ; w|uname -a|id|pwd

  • Any databases contents (e.g. mysql -uroot -pzaq1xsw2cde3 -e 'show databases;')

Linux - root user

*may reset any user password and then rdp / ssh in

Password hashes: cat /etc/shadow

User folders: ls -lahR /home/ (look for ".*_history" files, ".ssh" or ".gpg") ;

check /etc/passwd to see if any users with other paths as their user folders

Network connections: netstat -antup (checking with high privileged may see more)

GUI: pidof X (anything save in web browser e.g. history, saved passwords, homepage ; any 'recently opened' app/files)

history as root: cat ~/.bash_history

Windows - admin / system

HKLM Hash

Last updated