00 — Overview
Post-Exploitation Basics
You have a shell — now what? Learn how to quickly understand any compromised machine: who you are, what's running, what credentials are lying around, and where to look for a path to root.
Intermediate·50 min·6 tasks
// By the end of this module
→Perform immediate situational awareness on a new foothold
→Hunt for sensitive files: configs, history, SSH keys, and creds
→Map internal network topology and reachable hosts from a shell
→Run LinPEAS and interpret its output to prioritise next steps
// Prerequisites
Complete these before starting this module for the best experience.