Post-Exploitation Explained | TryHackMe Enumeration | Red Team Track
In this video walkthrough, we covered enumerating Windows and Linux during the post-exploitation phase of a penetration test.
by Motasem Hamdan
simple network management protocol