Loading...
「ツール」は右上に移動しました。
利用したサーバー: natural-voltaic-titanium
725いいね 17859回再生

Windows Post Exploitation - Local Enumeration

In this video, I cover the process of performing manual local enumeration on a Windows target by leveraging inbuilt Windows commands and utilities.
I demonstrate how you can enumerate user and group information, system information and how to identify whether Windows Defender and Windows Firewall are active.

-----------------------------------------------------------------------------------

BLOG ►► bit.ly/3qjvSjK
FORUM ►► bit.ly/39r2kcY
ACADEMY ►► bit.ly/39CuORr

-----------------------------------------------------------------------------------

TWITTER ►► bit.ly/3sNKXfq
DISCORD ►► bit.ly/3hkIDsK
INSTAGRAM ►► bit.ly/3sP1Syh
LINKEDIN ►► bit.ly/360qwlN
PATREON ►► bit.ly/365iDLK
MERCHANDISE ►► bit.ly/3c2jDEn

-----------------------------------------------------------------------------------

CYBERTALK PODCAST ►► open.spotify.com/show/6j0RhRiofxkt39AskIpwP7

-----------------------------------------------------------------------------------

We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

-----------------------------------------------------------------------------------
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d'avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
-----------------------------------------------------------------------------------
#Pentesting#Infosec

コメント