Jump to content
Nytro

Post Exploitation - System Information Gathering

Recommended Posts

Posted

Post Exploitation - System Information Gathering

Description: In this video I will show you how to use Interesting Post – Exploitation Modules for Windows.

So I’m going to use four Post – Exploitation Modules.

1 post/windows/gather/enum_applications

This module will Dump All the list of Installed Application With Versions.

2 post/windows/gather/usb_history

This Module will show you victims USB_History.

3 post/windows/gather/enum_devices

This module for Enumerating Hardware.

4 post/windows/gather/enum_chrome

This module is very interesting – using this module you will get all the information about chrome browser – Information like, Web Data, Coockie History, Login Data bookmarks, Preferences etc ..

Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.

Original Source:

Sursa: Post Exploitation - System Information Gathering

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...