Ok geeks, @mubix from Room362.com compiled a list of linux and windows commands on google docs that can be useful after eheem eheem 😛 tunneling into someone’s computer. These commands listed are normal commands but most of the time they are not mentioned or posted by penetration testers. Really a good Compilation.
- Linux Post-Explotation Commands
- Windows Post Exploitation:
All Credit Goes to @mubix (Rob Fuller)