Post Exploitation – Transferring Files To Windows Targets
In this video, I will be demonstrating the process of transferring exploit files and enumeration tools to Windows targets by utilizing the certutil program.
———————————————————————————–
LINKS:
Windows-Exploit-Suggester: https://bit.ly/3mhXcjs
———————————————————————————–
BLOG ►► https://bit.ly/3qjvSjK
FORUM ►► https://bit.ly/39r2kcY
ACADEMY ►► https://bit.ly/39CuORr
———————————————————————————–
TWITTER ►► https://bit.ly/3sNKXfq
DISCORD ►► https://bit.ly/3hkIDsK
INSTAGRAM ►► https://bit.ly/3sP1Syh
LINKEDIN ►► https://bit.ly/360qwlN
PATREON ►► https://bit.ly/365iDLK
MERCHANDISE ►► https://bit.ly/3c2jDEn
———————————————————————————–
CYBERTALK PODCAST ►► https://open.spotify.com/show/6j0RhRiofxkt39AskIpwP7
———————————————————————————–
We hope you enjoyed the video and found value in the content. We value your feedback, If you have any questions or suggestions feel free to post them in the comments section or contact us directly via our social platforms.
———————————————————————————–
Thanks for watching!
Благодарю за просмотр!
Kiitos katsomisesta
Danke fürs Zuschauen!
感谢您观看
Merci d’avoir regardé
Obrigado por assistir
دیکھنے کے لیے شکریہ
देखने के लिए धन्यवाद
Grazie per la visione
Gracias por ver
شكرا للمشاهدة
———————————————————————————–
#Pentesting#Windows
by HackerSploit
linux dhcp server
This is a great video. Overall it covers more than transferring files. However, I expected to see more than one way (certutil) to transfer files to windows targets.
Thank you
How to transfer files from windows cmd to kali linux after post exploitation.Kindly help me
How People Get Infected With Malicious Word Document:
https://www.youtube.com/watch?v=E-Xc_bQyG2c&t=29s
Thats soo cool , i tried all along with you .
Please make a video on certutil covered in depth .
sir mujhe professional hacker ki zrurt thi boht jyda can u pls help meee ..
Great content, thanks !
I like your voice bro
Upload as fast as Android pentesting
Do i need to know about vlan for hacking
?
Set up your anonymity lab Final part https://youtu.be/8W2G7UxCu4g
How to find metasploit ip address bro
The most underrated channel on YouTube, please keep it up!
This was awesome… I came across your video on twitter today and its worth it…. thank you… now I have to watch all videos and learn from it…
Woo
Finally …thank you
your contact details mail
First time I see your face my master😃
I have got nothing to do with computer science or hacking. My curiosity made me watch whole video 😀
This content is so Great!
Thanks a lot for this Alexis
LOve content…
Wow. Windows is even less secure than I ever imagined
Thank god he is still alive ❤️❤️🙏🏻🙏🏻
Thank you.
GREAT WORK SIR …… AS I EXPECTED ….. KEEP IT UP ……. ALL MY LOVE TO YOU
Sir, can we get a series on the latest burp suite community edition?
More video on Network Pentesting. Please?
We appreciate your effort boss! I pray may the almighty God Grant You All Your Wishes
Godly content ❤
Your 10000 way better then my cs teacher😁
great video, would love to see the in depth video of winpeas and linpeas of what to know exactly what to look for.