LINUX
for i in {1..254} ;do (ping -c 1 192.168.1.$i | grep "bytes from" &) ;done
Windows
for /L %i in (1,1,255) do @ping -n 1 -w 200 192.168.1.%i > nul && echo 192.168.1.%i is up
Identify and perform privilege escalation and integrity-level elevation
AutoElevate executables
| Some core windows executables are able to auto-elevate to higher integrity level
(Get-Command calc.exe).Path
sigcheck -m C:\WINDOWS\system32\calc.exe
Scheduled Tasks
| vulnerable scheduled tasks will have a "Run as User" or "Task to Run"
SSH Keys
SSH keys are asymetric(public/private) key pairs that can be used to authenticate a user to a system in combination with or to replace the use of a password
If you are able to find a users private ssh key it can potentially be used to gain access to other systems
Using Stolen SSH Keys
Bring private key to your own box
X86_64 Assembly - Common Terms
Reverse Engineering Workflow (Software)
Static
Behavioral