In this video walkthrough, we covered enumerating Windows and Linux during the post-exploitation phase of a penetration test. Enumeration post-exploitation can have many objectives including credential harvesting, privilege escalation, persistence and/or data exfiltration. Enumeration includes gathering information about users, groups, applications installed, installed updates, OS and kernel version, privileges of the current user, services, running procsses, scheduled tasks, network connections,etc.
******
Receive Cyber Security Field, Certifications Notes and Special Training Videos
[ Ссылка ]
******
Writeup
[ Ссылка ]
TryHackMe Enumeration
[ Ссылка ]
********
Patreon
[ Ссылка ]
Instagram
[ Ссылка ]
Twitter
[ Ссылка ]
Facebook
[ Ссылка ]
LinkedIn
[1]: [ Ссылка ]
[2]: [ Ссылка ]
Website
[ Ссылка ]
Backup channel
[ Ссылка ]
My Movie channel:
[ Ссылка ]
******
Ещё видео!