dhcp server liuxLinux serverNETWORK ADMINISTRATIONS

Post Exploitation – Transferring Files To Windows Targets

In this video, I will be demonstrating the process of transferring exploit files and enumeration tools to Windows targets by utilizing the certutil program.

———————————————————————————–
LINKS:
Windows-Exploit-Suggester: https://bit.ly/3mhXcjs

———————————————————————————–

BLOG ►► https://bit.ly/3qjvSjK
FORUM ►► https://bit.ly/39r2kcY
ACADEMY ►► https://bit.ly/39CuORr

———————————————————————————–

TWITTER ►► https://bit.ly/3sNKXfq
DISCORD ►► https://bit.ly/3hkIDsK
INSTAGRAM ►► https://bit.ly/3sP1Syh
LINKEDIN ►► https://bit.ly/360qwlN
PATREON ►► https://bit.ly/365iDLK
MERCHANDISE ►► https://bit.ly/3c2jDEn

———————————————————————————–

CYBERTALK PODCAST ►► https://open.spotify.com/show/6j0RhRiofxkt39AskIpwP7

———————————————————————————–

We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.

———————————————————————————–
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d’avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
———————————————————————————–
#Pentesting#Windows

source

by HackerSploit

linux dhcp server

Alice AUSTIN

Alice AUSTIN is studying Cisco Systems Engineering. He has passion with both hardware and software and writes articles and reviews for many IT websites.

31 thoughts on “Post Exploitation – Transferring Files To Windows Targets

Comments are closed.