Commit f07062e5 authored by bobloblaw's avatar bobloblaw
Browse files

Updates loot.md

Auto commit by GitBook Editor
parent 4a27513f
Loading
Loading
Loading
Loading
+1 −1
Original line number Diff line number Diff line
@@ -72,7 +72,7 @@
    * [Privilege Escalation - Windows](privilege_escalation_windows.md)
    * [Escaping Restricted Shell](escaping_restricted_shell.md)
    * [Bypassing antivirus](bypassing_antivirus.md)
    * [Loot](loot.md)
    * [Loot and Enumerate](loot.md)
        * [Loot Windows](loot_windows_-_for_credentials_and_other_stuff.md)
        * [Loot Linux](tcp-dumps_on_pwnd_machines.md)
    * [Persistence](persistence.md)
+3 −1
Original line number Diff line number Diff line
# Loot
# Loot and Enumerate

After you have gained access to a machine you must loot it. This is useful in order to be able to pivot into other machine.  

@@ -8,3 +8,5 @@ So after we have exploited a machine we want to use that machine to learn as muc

We can start getting an understanding of the network by taking a tcp-dump.

We also want to look for password that might be reused on other machines, and sensitive information found in databases. Information about the user might be interesting in order to use social engineering attacks against other users in the network.