For this section, review the information from the chapter and try and expand on the topics. This will allow you to increase your knowledge on the different topics. To stimulate your thinking, try some of the following topics:
Create scripts to enumerate the machine. Throughout this chapter, we have discussed the commands you can use to enumerate information from a compromised machine; as an added challenge, create script files, so that when you compromise the machine, you can grab the information from that machine with one command. Experiment with this and try a number of different scripting languages to include the shell scripts as well. There are multiple possibilities that you may encounter, so the more variety you have in your scripts, the better chance you have of enumerating a system in a timely manner.
Create a double pivot. That is a pivot from a compromised machine that was compromised via a previous pivot. This can be a challenge, so it will take time to create the...