OSX1 POST EXPLOITATION COMMAND LISTS I've had a private list of commands that I run on Windows or Linux when I pop a shell, as I'm sure most pentesters do. It isn't so much a thing of hoarding as much it is just jumbled notes that are 'not worth posting' Well, I made two (now 3) public google docs (anyone can edit) *don't be a dick clause Linux/Unix/BSD Post Exploitation: https://docs.google.com/document/d/1ObQB6hmVvRPCgPTRZM5NMH03.. 2011. 9. 9. 이전 1 다음