Jump to content
Praetorian503

Post -- Exploitation Dump Data From The Victim Machine

Recommended Posts

Posted



Description: In this video I will show you how to Dump Data from the Victim machine after exploitation.
Most of 30 to 40% people save their sensitive information on the computer without any encryption. So let’s see if that pc compromised so you can dump the data using file type. Very easy to dump files dll, photos etc..

Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.

Original Source:

Source: Post -- Exploitation Dump Data From The Victim Machine

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...