Post Exploitation - Transferring Files to Windows Targets
Offered By: HackerSploit via YouTube
Course Description
Overview
Learn how to transfer exploit files and enumeration tools to Windows targets using the certutil program in this 23-minute video tutorial. Explore post-exploitation techniques for penetration testing on Windows systems, with a focus on file transfer methods. Gain practical knowledge on utilizing certutil to move critical tools and payloads onto compromised Windows machines during security assessments. The tutorial also provides links to additional resources like the Windows-Exploit-Suggester tool to enhance your post-exploitation capabilities.
Syllabus
Post Exploitation - Transferring Files To Windows Targets
Taught by
HackerSploit
Related Courses
Penetration Testing - Post ExploitationNew York University (NYU) via edX Metasploit Framework: Penetration Testing with Metasploit
Udemy Metasploit
Cybrary Armitage and Metasploit for Penetration Testing - From Information Collecting to Post Exploitation
CAE in Cybersecurity Community via YouTube Advanced Phishing Tactics Beyond User Awareness
YouTube