Daniel Roberson
  • Posts
  • About
  • Notes
  • Projects
  • Time
  • Posts
    About
    Notes
    Projects
    Time

post-exploitation

2024-08-28

In cybersecurity, post-exploitation is the phase in a cyberattack that takes place after successful exploitation.

Post-exploitation encompasses but is not limited to:

  • persistence

  • privilege escalation

  • lateral movement

  • data exfiltration


Links to this note

  • Linux Persistence: Processes
  • Apfell
  • AMSI patching
  • Kerberoasting
  • shadowbrowkersleakedexploitsexplained-brown2017
  • sliverintro-malone2023
  • hackingteamwriteup-fisher2016
  • borges2021
  • stealthshell-petrich2024
  • DanderSpritz
  • pupy

Recent Posts

Linux Persistence: Modular Software

2025-04-17 DFIR CTF persistence linux persistence apache asterisk

Linux Persistence: Web Shells

2025-04-16 DFIR persistence webshell linux persistence webshell apache nginx PHP

Linux Persistence: Rootkits

2025-04-15 DFIR persistence rootkit LKM linux persistence LKM rootkit LD_PRELOAD kprobe ftrace ld.so hooking

Linux Persistence: Processes

2025-04-11 DFIR persistence processes linux persistence processes

Defanging Linux LKM Rootkits With cleanup_module()

2025-04-05 Linux LKM rootkits EDR hooks incident response Linux LKM rootkit


Home

About

Notes

Projects

Time

© All rights reserved. Powered by Hugo and Erblog.