00 — Overview

Post-Exploitation Basics

You have a shell — now what? Learn how to quickly understand any compromised machine: who you are, what's running, what credentials are lying around, and where to look for a path to root.

Intermediate·50 min·6 tasks
// By the end of this module
Perform immediate situational awareness on a new foothold
Hunt for sensitive files: configs, history, SSH keys, and creds
Map internal network topology and reachable hosts from a shell
Run LinPEAS and interpret its output to prioritise next steps
// Prerequisites
Complete these before starting this module for the best experience.