Quick efficiency tip, once your meterpeter session is established you can run those post exploitation modules from the meterpreter line. In this instance you could write " run post/windows/gather/enum_shares" and it will enumerate that on the Meterpreter CL
@husseindhooma58162 жыл бұрын
Thank you Motasem what a beautifully explained video
@fizzymint3 жыл бұрын
Brilliant video - well explained thanks!
@johnvardy9559 Жыл бұрын
07:13 where you findall of these info?actually your notes?
@diale132 жыл бұрын
Great video man! Thank you very much
@iftekmahmud3 жыл бұрын
It will be highly appreciated if you can make a video on the Exploitation part of this course next on the line up.
@huuloc87193 жыл бұрын
Thank you Motasem.
@felipecg65872 жыл бұрын
amazing stuff. thanks so much
@MoneyManNL1452 жыл бұрын
I have session not created error is this cuz i dont do potforwarding?
@icychan-te1jp Жыл бұрын
Hi, i am learning oscp.. May I get a obsidian note copy? That's much appreciate tq
@pj21052 жыл бұрын
Thanks for the walkthrough. Everything ran smoothly until you migrated to 780 mine didn't work. I went back over the processes and my lsass.exe was process 772
@zenkat4893 жыл бұрын
Can I ask about how to get the Cyber Security Manual as you show in this video.
@MotasemHamdan3 жыл бұрын
Hello, Notes are part of the channel membership. Take a look here kzbin.info/door/NSdU_1ehXtGclimTVckHmQjoin
@spayc12142 жыл бұрын
is this your own notes summary at 7:00? If yes, can you please provide them to us?
@MotasemHamdan2 жыл бұрын
Hello, notes are part of channel membership tier 2 kzbin.info/door/NSdU_1ehXtGclimTVckHmQjoin
@AdityaMukati-z7m11 ай бұрын
could you please share me your metasploit notes
@othmanh3 жыл бұрын
Thank u
@tiavee7 ай бұрын
not helpful since I don't know where you get the second IP address from. I don't have tun0 like you do in kali