Skip to content
g0tmi1k edited this page Jul 11, 2012 · 10 revisions

Known Issues

ToDo List

Work on enumeration/"loot" functions

-> http://g0tmi1k.blogspot.co.uk/2011/08/basic-linux-privilege-escalation.html
-> http://pentestmonkey.net/tools/audit/unix-privesc-check

"stealth"/"encode" communication

-> export HISTFILE=/dev/null
-> *cough*base64*cough*

Windows support

-> Client (powershell)
-> Server (Commands)

Backdoor

-> Create a while loop to forever connect back to attacker (every 5 mins?)
-> Tested a few backdoors methonds out - need to finish testing the rest ASAP

Multiple sessions

-> ...Like Metasploit
-> Able to handle 'reverse' connections too (e.g. an alternative netcat)

Handling/Logging

-> Enable 'Tab Complete' on commands
-> Log all commands entered (e.g. @history to file)
-> Log the display to a file (e.g. |tee to file)

Banner

-> "refresh" the commands which are displayed in the banner    

Post Exploitation

-> Interesting files (e.g. "@enum history")
-> Inject BeEF
-> Install PHP code page (thus PHP meterpeter) <- "@enum writable" if we have permission
-> Web Proxy - get to internal network? (http://laudanum.inguardians.com)
Clone this wiki locally