This is intended to be a resource where learners can obtain small nudges or help while working on the PWK machines.
It consists in 3 main steps which are taught in the PWK course:
- Information gathering (Enumeration)
- Shell (Vulnerability exploitation)
- Privilege Escalation
Note that we do not recommend learners to rely entirely on this resource while working on the lab machines. Learners should do their own enumeration and research and then come to this resource if they feel they have exhausted all of their options for a specific system.
gh0st
- Initial Enumeration:
- Some machines may have certain defensive mechanisms.Check Machine Dependencies
- Search beneath the surface (Source)
- Shell:
- Decode as you see it, use as you decode. (Mainly for the order of the link)
- Privilege Escalation:
- Check your user, check your shell
- Remember your basic enumeration steps