πPost-Exploitation Persistence
π― Overview
Post-exploitation persistence ensures stable access after hard-fought initial compromise. Transform unstable reverse shells into persistent SSH access, escalate to root privileges, and establish reliable pivot points for internal Active Directory attacks.
π Establishing Stable Access
π SSH Connection Upgrade
# Leverage discovered credentials for stable access
ssh srvadm@TARGET_IP
Password: ILFreightnixadm!
# Benefits of SSH over reverse shells:
- Stable connection (no timeouts)
- Daily access restoration capability
- Efficient tunneling/pivoting setup
- Professional testing workflow
- Backup access methodπ System Information Gathering
# Network interface analysis
Welcome to Ubuntu 20.04.3 LTS (GNU/Linux 5.4.0-113-generic x86_64)
System information as of [DATE]:
IPv4 address for br-65c448355ed2: 172.18.0.1 # Docker bridge
IPv4 address for docker0: 172.17.0.1 # Docker default
IPv4 address for ens160: 10.129.203.111 # External interface
IPv4 address for ens192: 172.16.8.120 # Internal AD network
# Key observations:
- DMZ positioning with dual interfaces
- Docker environment present
- Internal network connectivity confirmed
- Pivot opportunity into 172.16.8.0/23 scopeπΊ Local Privilege Escalation
π Privilege Assessment
π οΈ OpenSSL GTFOBin Exploitation
π SSH Key Persistence Setup
π― Persistence Benefits Analysis
π Access Advantages
π Alternative Persistence Methods
π Network Position Assessment
π DMZ Host Analysis
π― Internal Network Preparation
π‘οΈ Operational Security
π Access Maintenance
π Pivot Preparation Checklist
π― HTB Academy Lab
π Lab Solution Summary
π Learning Objectives
π‘οΈ Defensive Recommendations
π System Hardening
Last updated