Post Exploitation Command List

Level: This post it's addressed for a high/medium technical skill. This commands list can be used in any shell, useful for System Administrator, Pentesters, and anyone with eager to learn.

It is always helpful to have a set of commands that will be used after achieving a remote shell.
The commands used in the remote shell has been obtained by exploiting a vulnerability, they are called "post exploitation command list"

Here I leave the link to the list of commands. I hope you find this useful.
This command list has been obtained by: Twitter

Borja Merino

0 comentarios:

Publicar un comentario