In the last chapter, we discussed the three main components of Windows post-exploitation, which you will recall are the following:
These are the same for Linux- or UNIX-based systems; the only difference is the techniques used to do them. A strong pentester is OS-agnostic. It doesn’t matter if you’re on a Windows machine, FreeBSD UNIX, CentOS Linux, or macOS. You should know enough about where to find credentials, how to establish reliable re-entry, and how to move laterally to succeed during any engagement. In this chapter, you will learn several post-exploitation techniques for penetrating further into Linux or UNIX environments. Let’s begin by quickly reviewing the three primary components (figure 9.1) of post-exploitation and privilege escalation.