πŸ”’Post-Exploitation Persistence

🎯 Overview

Post-exploitation persistence ensures stable access after hard-fought initial compromise. Transform unstable reverse shells into persistent SSH access, escalate to root privileges, and establish reliable pivot points for internal Active Directory attacks.

πŸ”’ Establishing Stable Access

πŸ”‘ SSH Connection Upgrade

# Leverage discovered credentials for stable access
ssh srvadm@TARGET_IP
Password: ILFreightnixadm!

# Benefits of SSH over reverse shells:
- Stable connection (no timeouts)
- Daily access restoration capability
- Efficient tunneling/pivoting setup
- Professional testing workflow
- Backup access method

πŸ“Š System Information Gathering

# Network interface analysis
Welcome to Ubuntu 20.04.3 LTS (GNU/Linux 5.4.0-113-generic x86_64)

System information as of [DATE]:
IPv4 address for br-65c448355ed2: 172.18.0.1    # Docker bridge
IPv4 address for docker0:         172.17.0.1    # Docker default
IPv4 address for ens160:          10.129.203.111 # External interface
IPv4 address for ens192:          172.16.8.120   # Internal AD network

# Key observations:
- DMZ positioning with dual interfaces
- Docker environment present
- Internal network connectivity confirmed
- Pivot opportunity into 172.16.8.0/23 scope

πŸ”Ί Local Privilege Escalation

πŸ” Privilege Assessment

πŸ› οΈ OpenSSL GTFOBin Exploitation

πŸ” SSH Key Persistence Setup

🎯 Persistence Benefits Analysis

πŸš€ Access Advantages

πŸ”„ Alternative Persistence Methods

🌐 Network Position Assessment

πŸ“Š DMZ Host Analysis

🎯 Internal Network Preparation

πŸ›‘οΈ Operational Security

πŸ”’ Access Maintenance

πŸ“‹ Pivot Preparation Checklist

🎯 HTB Academy Lab

πŸ“‹ Lab Solution Summary

πŸ” Learning Objectives

πŸ›‘οΈ Defensive Recommendations

πŸ”’ System Hardening

Last updated