- 10 Linux Post-Exploitation
- 10.1 User Configuration Files
- 10.1.1 VIM Config Simple Backdoor 🕐S
- 10.1.1.1 Exercises
- 10.1.1.2 Extra Mile
- 10.1.2 VIM Config Simple Keylogger 🕐S
- 10.1.2.1 Exercises
- 10.1.1 VIM Config Simple Backdoor 🕐S
- 10.2 Bypassing AV
- 10.2.1 Kaspersky Endpoint Security 🕐M
- 10.2.2 Antiscan.me 🕐M
- 10.2.2.1 Exercises
- 10.2.2.2 Extra Mile
- 10.3 Shared Libraries
- 10.3.1 How Shared Libraries Work on Linux 🕐S
- 10.3.2 Shared Library Hijacking via LD_LIBRARY_PATH 🕐M
- 10.3.2.1 Exercises
- 10.3.2.2 Extra Mile
- 10.3.3 Exploitation via LD_PRELOAD 🕐M
- 10.3.3.1 Exercises
- 10.4 Wrapping Up 🕐S
- 10.1 User Configuration Files