Post Exploitation - Transferring Files to Windows Targets
Offered By: HackerSploit via YouTube
Course Description
Overview
Learn how to transfer exploit files and enumeration tools to Windows targets using the certutil program in this 23-minute video tutorial. Explore post-exploitation techniques for penetration testing on Windows systems, with a focus on file transfer methods. Gain practical knowledge on utilizing certutil to move critical tools and payloads onto compromised Windows machines during security assessments. The tutorial also provides links to additional resources like the Windows-Exploit-Suggester tool to enhance your post-exploitation capabilities.
Syllabus
Post Exploitation - Transferring Files To Windows Targets
Taught by
HackerSploit
Related Courses
Ethical HackingIndian Institute of Technology, Kharagpur via Swayam Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax MSc Cyber Security
Coventry University via FutureLearn Network Security - Introduction to Network Security
New York University (NYU) via edX Network Security - Advanced Topics
New York University (NYU) via edX