4th Month Advanced Exploitation and Post
4th Month Advanced Exploitation and Post
Duration: 1 Month
Objective: Master Server-Side Request Forgery (SSRF) and Remote Code Execution
(RCE) vulnerabilities and exploitation techniques.
1. RCE Vulnerabilities:
o Learn how attackers exploit Remote Code Execution (RCE) vulnerabilities,
allowing them to execute arbitrary code on the target server.
o Understand how file upload vulnerabilities, command injection, and
deserialization issues lead to RCE.
2. Hands-on Practice:
o Exploit file upload vulnerabilities and gain remote code execution on a
vulnerable server.
o Practice deserialization-based RCE on vulnerable web apps.
3. Resources:
o Platform: Hack The Box or TryHackMe rooms focused on RCE.
o Book: The Web Application Hacker's Handbook (RCE chapter).
o Video: “Exploiting Remote Code Execution” on YouTube.
1. Web Shells:
o Learn how to upload and use web shells for maintaining access to a
compromised web server.
o Understand how to secure web shells to prevent detection by intrusion
detection systems (IDS) or firewalls.
2. Hands-on Practice:
o Upload a web shell using a vulnerable file upload functionality and control
the server via a web interface.
o Explore reverse shells and how to interact with them securely.
3. Resources:
o Platform: TryHackMe or Hack The Box with web shell challenges.
o Video: “How to Upload and Use Web Shells” on YouTube.
1. Lateral Movement:
o Understand how to move laterally between compromised systems to access
more sensitive areas of the network.
o Pivoting: Learn how to pivot through compromised web servers to access
internal systems that are otherwise unreachable.
2. Hands-on Practice:
o Use a compromised web server as a jumping-off point to pivot and attack
internal services.
o Learn to configure VPNs or SSH tunnels to further access internal resources.
3. Resources:
o Platform: TryHackMe or Hack The Box rooms focused on pivoting.
o Video: “Pivoting Through a Compromised Server” on YouTube.
1. Privilege Escalation:
o Learn about web application privilege escalation techniques such as
exploiting insecure access control mechanisms.
o Escalate privileges from normal users to admin by exploiting weak roles or
configurations.
2. Hands-on Practice:
o Exploit a broken access control vulnerability to escalate your privileges
within a compromised web application.
o Explore configuration flaws in the web app that allow unauthorized privilege
escalation.
3. Resources:
o Book: The Hacker Playbook (privilege escalation section).
o Platform: TryHackMe or Hack The Box privilege escalation rooms.
Week 4: Data Exfiltration and Clean-Up Techniques
Objective: Learn about data exfiltration methods and how to properly clean up after
exploiting vulnerabilities.
1. Covering Tracks:
o Learn how to clean up after performing a pentest or exploiting a vulnerability.
o Techniques include deleting logs, removing web shells, and clearing traces of
exploitation from the server.
2. Hands-on Practice:
o After exploiting vulnerabilities, practice clearing your tracks by removing
logs, reversing changes made to the server, and cleaning up shell access.
3. Resources:
o Platform: TryHackMe or Hack The Box rooms focused on cleaning up
after exploitation.
Review and reinforce the advanced exploitation techniques learned throughout the
month.
Continue practicing on real-world platforms like Hack The Box, TryHackMe, and
VulnHub to improve your skills.
By the end of Month 4, you’ll be proficient in advanced exploitation techniques and post-
exploitation activities, including maintaining access, privilege escalation, data exfiltration,
and covering your tracks.