Hacking Linux: Difference between revisions

From Enlace Hacktivista
Jump to navigation Jump to search
mNo edit summary
Line 13: Line 13:


== Stabilizing Shells ==
== Stabilizing Shells ==
For stabilizing your shells to be more functional:
After gaining a [https://github.com/swisskyrepo/PayloadsAllTheThings/blob/master/Methodology%20and%20Resources/Reverse%20Shell%20Cheatsheet.md reverse shell] it's good practice to stabilize it for better usability and functionality.
 
<pre>
See [[Stabilizing shells]].
python3 -c 'import pty;pty.spawn("/bin/bash");'
stty -a
stty rows <NUMBER> cols <NUMBER>
echo $SHELL
export SHELL=bash
echo $TERM
export TERM=xterm-256color
press CTRL+Z
stty raw -echo ; fg
reset
</pre>


== Evade Detection ==
== Evade Detection ==

Revision as of 14:47, 14 September 2023

Rooting

These tools will quickly help you analyze a system for vulnerabilities that will aid in your privilege escalation and maintaining persistence.

Rooting

Tools

Stabilizing Shells

After gaining a reverse shell it's good practice to stabilize it for better usability and functionality.

python3 -c 'import pty;pty.spawn("/bin/bash");'
stty -a
stty rows <NUMBER> cols <NUMBER>
echo $SHELL
export SHELL=bash
echo $TERM
export TERM=xterm-256color
press CTRL+Z
stty raw -echo ; fg
reset

Evade Detection

For evading detection whilst you're hacking:

See Linux - Evasion.

Linux Persistence

For persisting your access on a Linux system:

See Linux - Persistence.

General tips and tricks: