Problem Statement
You gained low-privilege shell on a server in scope. How do you apply ethical post-exploitation?
Explanation
Confirm the host is in scope, then gather minimal situational data: whoami, hostname, network routes, patch level. Seek written approval before privilege escalation. Avoid data harvesting; prove access with a harmless file or unique token if allowed. Keep timestamps, commands, and outputs in your notes. When done, remove any artifacts you placed and help the client validate containment.
Code Solution
SolutionRead Only
whoami && hostname && ip addr show; touch /tmp/POC_README; exit
