Post-Exploitation Explained | TryHackMe Enumeration | Red Team Track

Описание к видео Post-Exploitation Explained | TryHackMe Enumeration | Red Team Track

In this video walkthrough, we covered enumerating Windows and Linux during the post-exploitation phase of a penetration test. Enumeration post-exploitation can have many objectives including credential harvesting, privilege escalation, persistence and/or data exfiltration. Enumeration includes gathering information about users, groups, applications installed, installed updates, OS and kernel version, privileges of the current user, services, running procsses, scheduled tasks, network connections,etc.
******
Receive Cyber Security Field, Certifications Notes and Special Training Videos
   / @motasemhamdan  
******
Writeup
https://motasem-notes.net/post-exploi...
TryHackMe Enumeration
https://tryhackme.com/room/enumerationpe
********
Patreon
https://www.patreon.com/motasemhamdan...
Instagram
  / dev.stuxnet  
Twitter
  / manmotasem  
Facebook
  / motasemhamdantty  
LinkedIn
[1]:   / motasem-hamdan-7673289b  
[2]:   / motasem-eldad-ha-bb42481b2  
Website
https://www.motasem-notes.net
Backup channel
   / @themastermindclips  
My Movie channel:
   / Канал  
******

Комментарии

Информация по комментариям в разработке