Data Gathering
Data Harvesting (Pillaging)
Essential information:
System info
Applications
Services
Networks
Documents
Messaging
...
Meterpreter
Try to identify whether the machine is a server/workstation, and what is their purpose / which department ...
In Metasploit, there are post exploit enumeration modules:
run post/windows/gather/*
run post/linux/gather/*
Services
Also in native cmd we can use WMIC
or net start
:
In case of Linux shell, we can do:
Applications
In Meterpreter:
Find DC in Windows
Using cmd:
Using Meterpreter:
Find other hosts
In Meterpreter:
Users / Groups
In Windows cmd:
In Linux shell:
Shares
Windows:
Meterpreter:
Cheatsheets
Post Exploit Wiki: https://github.com/mubix/post-exploitation-wiki
Windows: https://docs.google.com/document/d/1U10isynOpQtrIK6ChuReu-K1WHTJm4fgG3joiuz43rw/edit?hl=en_US
Linux: https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5NMH034VDM-1N-EWPRz2770K4/edit?hl=en_US
macOS: https://docs.google.com/document/d/10AUm_zUdAQGgoHNo_eS0SO1K-24VVYnulUD2x3rJD3k/edit?hl=en_US
Metasploit: https://docs.google.com/document/d/1ZrDJMQkrp_YbU_9Ni9wMNF2m3nIPEA_kekqqqA2Ywto/edit?pref=2&pli=1
Some other good stuff: http://tim3warri0r.blogspot.com/
Metasploit Scripts
For Windows machines, we may use scraper / winenum.
Screenshot the client:
First attach the Meterpreter process to winlogon.exe or explorer.exe and enable Keylogger:
We can also use keylogrecorder.
Meterpreter - Search
Meterpreter - Information gathering
run post/windows/gather/credentials/*
run post/windows/gather/enum_chrome
run post/multi/gather/*
For gathering applications on the host:
run post/windows/gather/enum_applications
We can also use Web Browser Pass View to extract credentials saved in web browser
Linux version Mimikatz
Require root
Dump passwords in memory from:
GDM password (Kali / Debian)
Gnome Keyring (Ubuntu / ArchLinux Desktop)
VSFTPd
Apache2
OpenSSH
Last updated