akde/infosec

Information security is ultimately about managing risk


Enumeration

Mandatory

  1. Try to access ssh ‑v $target

Optional

  • Reuse exist­ing credentials
  • Brute-force with exist­ing user­names (Pass­word-spray­ing)
  • Try ssh-audit $target
  • Try known user­naes with user­name as pass­word or oth­er found strings.

Privilege Escalation

  • Find .ssh direc­to­ry on the file sys­tem and check all files within.
  • Check sshd_config file.
  • Check SSH ver­sion for exploits.

Leave a Reply

About

Personal collection of some infosec stuff. Primary purpose of this site is to collect and organize for myself.

Note: Some content is not publicly visible due to copyright issues. Therefore, some links could be broken.

Checklists

Categories

Checklists: Ports

python -c 'import pty;pty.spawn("/bin/bash")';

python3 -c 'import pty;pty.spawn("/bin/bash")';