>_ Post-Exploitation Lab

PRACIVO LAB — INTENTIONALLY VULNERABLE
⚠️ Pracivo Security Lab — Post-exploitation techniques for authorized penetration testing. Persistence, exfiltration, pivoting, LOLBins, C2 frameworks.

> Post-Exploitation Phases

PhaseGoalTechniques
PersistenceSurvive reboot, maintain accessRegistry, scheduled tasks, cron, SUID, services
Privilege EscalationGet SYSTEM/rootSUID, sudo, token impersonation, kernel exploits
Defense EvasionStay undetectedLOLBins, AMSI bypass, obfuscation, living off land
Credential AccessGet more passwords/hashesMimikatz, secretsdump, browser creds
Lateral MovementAccess other machinesPsExec, WMI, Pass the Hash, WinRM
ExfiltrationGet the data outDNS tunneling, HTTPS, steganography
Covering TracksRemove evidenceLog clearing, timestomping, file deletion