Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Post Exploitation - Transferring Files to Windows Targets

HackerSploit via YouTube

Overview

Learn how to transfer exploit files and enumeration tools to Windows targets using the certutil program in this 23-minute video tutorial. Explore post-exploitation techniques for penetration testing on Windows systems, with a focus on file transfer methods. Gain practical knowledge on utilizing certutil to move critical tools and payloads onto compromised Windows machines during security assessments. The tutorial also provides links to additional resources like the Windows-Exploit-Suggester tool to enhance your post-exploitation capabilities.

Syllabus

Post Exploitation - Transferring Files To Windows Targets

Taught by

HackerSploit

Reviews

Start your review of Post Exploitation - Transferring Files to Windows Targets

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.