Post Exploitation

Post-exploitation techniques for penetration testing and ethical hacking. Comprehensive guides on privilege escalation, persistence, lateral movement, data exfiltration, and maintaining access on compromised systems for security professionals and red team operators.

In this section

  • Credential Dumping
    Credential Dumping
    • Browser Credential Dumping
      Browser credential dumping guide for post-exploitation: extracting saved passwords, cookies, and payment data from Chromium-based browsers (Chrome, Edge, Brave) and others using ChromElevator, LaZagne, and manual DPAPI decryption on Windows.
  • Privilege Escalation
    Privilege escalation techniques for penetration testing covering Linux and Windows privilege escalation methods. Learn to exploit misconfigurations, vulnerabilities, and weak permissions to gain root or administrator access on compromised systems.
    • Linux
      Complete Linux privilege escalation guide for penetration testing and ethical hacking. Learn sudo abuse, SUID/SGID exploitation, kernel exploits, capabilities, cron jobs, systemd timers, and automated enumeration with LinPEAS to gain root access on compromised Linux systems.
  • Tunneling
    Post-exploitation tunneling and pivoting: use SSH, SOCKS, HTTP(S), and other tunnels to route traffic through compromised hosts for lateral movement and egress when direct access is restricted.
    • SSH Tunneling and Pivoting
      SSH tunneling and pivoting: local, remote, and dynamic port forwarding and SSH agent forwarding and hijacking for post-exploitation.
Monday, February 2, 2026 Saturday, January 24, 2026