# Post Exploitation

- [Shell Escape Techniques](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/shell-escape-techniques.md)
- [Getting stable shell after compromise](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/getting-stable-shell-after-compromise.md)
- [Linux Privilege Escalation](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation.md)
- [Sudoers file](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation/sudoers-file.md): Basics ref: https://www.linux.com/training-tutorials/configuring-linux-sudoers-file/
- [Sudoers entry - Yum](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation/sudoers-entry-yum.md): tryhackme:dailybugle
- [Wildcards - Basics](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation/wildcards-basics.md): Learnt on TryHackMe's Skynet challenge
- [Wildcards - Chown](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation/wildcards-chown.md): Learnt on tryhackme's skynet
- [Wildcards - Tar](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation/wildcards-tar.md): Learnt while tryhackme: skynet
- [Linux Permissions & SUID/SGID/Sticky Bit](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation/linux-permissions-and-suid-sgid-sticky-bit.md)
- [SUID - nmap](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation/suid-nmap.md): Learnt while tryhackme: mrrobot CTF
- [SUID - bash](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation/suid-bash.md): In challenge tryhackme:overpass2
- [SUID - man](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation/suid-man.md)
- [NFS no\_root\_squash](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation/nfs-no_root_squash.md)
- [SUID - pkexec](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation/suid-pkexec.md)
- [Capabilities](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation/capabilities.md)
- [Bad permissions](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/linux-privilege-escalation/bad-permissions.md)
- [Windows Privilege Escalation](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/windows-privilege-escalation.md): Updating continuously
- [SeImpersonatePrivilege Token Impersonation](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/windows-privilege-escalation/seimpersonateprivilege-token-impersonation.md)
- [Firefox Creds](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/windows-privilege-escalation/firefox-creds.md): Learnt in room: Gatekeeper
- [Potatoes](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/windows-privilege-escalation/potatoes.md)
- [Print Spooler Basics](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/windows-privilege-escalation/print-spooler-basics.md)
- [Print Spooler CVE 2020-1030](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/windows-privilege-escalation/print-spooler-cve-2020-1030.md): https://www.accenture.com/us-en/blogs/cyber-defense/discovering-exploiting-shutting-down-dangerous-windows-print-spooler-vulnerability
- [SpoolFool](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/windows-privilege-escalation/spoolfool.md): https://research.ifcr.dk/spoolfool-windows-print-spooler-privilege-escalation-cve-2022-22718-bf7752b68d81
- [Data Exfiltration Post Exploitation](https://hexisanoob.gitbook.io/hexisanoob/post-exploitation/data-exfiltration-post-exploitation.md): Personal discoveries added but majorly derived from: https://raw.githubusercontent.com/RackunSec/Penetration-Testing-Grimoire/master/Post%20Exploitation/data-exfiltration-infiltration.md
