YoVDO

Post Exploitation - Transferring Files to Windows Targets

Offered By: HackerSploit via YouTube

Tags

Post Exploitation Courses Cybersecurity Courses Ethical Hacking Courses Penetration Testing Courses

Course Description

Overview

Learn how to transfer exploit files and enumeration tools to Windows targets using the certutil program in this 23-minute video tutorial. Explore post-exploitation techniques for penetration testing on Windows systems, with a focus on file transfer methods. Gain practical knowledge on utilizing certutil to move critical tools and payloads onto compromised Windows machines during security assessments. The tutorial also provides links to additional resources like the Windows-Exploit-Suggester tool to enhance your post-exploitation capabilities.

Syllabus

Post Exploitation - Transferring Files To Windows Targets


Taught by

HackerSploit

Related Courses

Ethical Hacking
Indian Institute of Technology, Kharagpur via Swayam
Investigación en Informática Forense y Ciberderecho
University of Extremadura via Miríadax
MSc Cyber Security
Coventry University via FutureLearn
Network Security - Introduction to Network Security
New York University (NYU) via edX
Network Security - Advanced Topics
New York University (NYU) via edX