Learn manual local enumeration techniques for Windows targets in this 20-minute video tutorial. Discover how to leverage built-in Windows commands and utilities to gather critical information during post-exploitation. Explore methods for enumerating user and group details, extracting system information, and determining the status of Windows Defender and Windows Firewall. Gain practical skills for effective reconnaissance and information gathering on compromised Windows systems to enhance your penetration testing and cybersecurity capabilities.
Overview
Syllabus
Windows Post Exploitation - Local Enumeration
Taught by
HackerSploit