Рет қаралды 410
In Part 3, we are working through the Post-Exploitation phase of our internal penetration test.
Disclaimer: All tools utilized in this video are either paid for in full OR they are open source. None of this content should ever be used illegally. Love ya!
Disclaimer: All operations being conducted, are taking place in an internal, on-site laboratory environment. This material is produced to assist OffSec students in the offensive cyber methodology.
Software Utilized:
NetExec : github.com/Pennyw0rth/NetExec
NMap: nmap.org/download.html
Evil-WinRM: github.com/Hackplayers/evil-w...
Thanks!