Recon
As a penetration tester, one of the first things to check after obtaining remote access to a system is to understand what software is currently running on the compromised machine. This could help us elevate our privileges or collect additional information in order to acquire further access into the network.
As an example, let's start the Leafpad text editor and then try to find its process ID (PID)2 from the command line by using the ps command : ps -ef
No Comments