method_5_post-exploitation
Differences
This shows you the differences between two versions of the page.
Both sides previous revisionPrevious revision | |||
method_5_post-exploitation [2023/01/12 00:30] – [Overview] gman | method_5_post-exploitation [2023/01/12 00:31] (current) – [First Thing] gman | ||
---|---|---|---|
Line 46: | Line 46: | ||
- '' | - '' | ||
- '' | - '' | ||
+ | |||
+ | Linux passwords are usually found in ''/ | ||
+ | * You can simply copy that file to your attack machine and crack offline (if you have root). | ||
+ | * Therefore, priv esc is a key part of acquiring credentials. | ||
---- | ---- |
method_5_post-exploitation.1673483436.txt.gz · Last modified: by gman