Reader challenge

For this section, review the information from the chapter and try and expand on the topics. This will allow you to increase your knowledge on the different topics. To stimulate your thinking, try some of the following topics:

  • Create scripts to enumerate the machine. Throughout this chapter, we have discussed the commands you can use to enumerate information from a compromised machine; as an added challenge, create script files, so that when you compromise the machine, you can grab the information from that machine with one command. Experiment with this and try a number of different scripting languages to include the shell scripts as well. There are multiple possibilities that you may encounter, so the more variety you have in your ...

Get Advanced Penetration Testing for Highly-Secured Environments - Second Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.