Results 1 to 2 of 2

Thread: Post Exploit Books / Resources / Tutorials?

  1. #1
    Just burned their ISO
    Join Date
    Dec 2012
    Posts
    4

    Default Post Exploit Books / Resources / Tutorials?

    Hi everyone,

    I've been reading a ton of resources on a lot of different aspects to pen testing and security; Exploits, Metasploit, Web App Security, Injection Vulnerabilities, Networking etc etc. I've found it all fascinating and I'm keen to learn a heap more. One area I've found unfortunately a little lacking is post exploitation. I'm really interested in common techniques found in establishing back doors, rootkits, how to detect them on your system, escalating a windows command shell into something more effective and permanent, etc.

    My question is - what do you think are great resources on post exploitation? Are there any good books that focus comprehensively on this area? I've tried googling and also searching for forums here for "post exploit" and "post" just browsing through the pages, but I haven't found anything comprehensive unfortunately.

    Again, found some brief mentions / sections in books, but was hoping for something more comprehensive (if it exists).

    As an example, given only a default windows XP command shell with no additional programs, how would you establish a permanent connection without user interaction? I could only think of perhaps launching iexplore from the command shell to an infected browser perhaps, but I'd love to learn more.

    Thanks all.

  2. #2
    Good friend of the forums scottm99's Avatar
    Join Date
    Feb 2010
    Location
    underwater
    Posts
    371

    Default Re: Post Exploit Books / Resources / Tutorials?

    Have you checked out the Metasploit Unleashed course on the Offensive Security website? I think they go into post-exploitation. Also, you might do some looking for a post-exploit presentation done by Carlos Perez (aka DarkOperator). I think it was at DerbyCon 2011.
    If I could figure out how to scuba dive & hack at the same time, there would be nothing I couldn't do...

Similar Threads

  1. Books about BT5
    By ChrissyAA3 in forum BackTrack 5 General Topics
    Replies: 0
    Last Post: 06-10-2012, 03:44 PM
  2. any tutorials on exploit-db.com?
    By roonie in forum Beginners Forum
    Replies: 3
    Last Post: 10-11-2010, 07:49 AM
  3. need good resources to learn about group policy domain, admin
    By KingMidas in forum OLD General IT Discussion
    Replies: 1
    Last Post: 01-20-2010, 01:30 AM
  4. IO Resources / Virtualbox
    By Smokabowl in forum OLD BT4beta Software Related Issues
    Replies: 0
    Last Post: 04-25-2009, 09:17 PM
  5. nikto consumes all resources and hangs machine with -mutate 1 flag
    By cartel in forum OLD BT4beta Bugs and Fixes
    Replies: 0
    Last Post: 02-19-2009, 07:50 PM

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •