Learn Generative AI, Prompt Engineering, and LLMs for Free
Google Data Analytics, IBM AI & Meta Marketing — All in One Subscription
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn how to transfer exploit files and enumeration tools to Windows targets using the certutil program in this 23-minute video tutorial. Explore post-exploitation techniques for penetration testing on Windows systems, with a focus on file transfer methods. Gain practical knowledge on utilizing certutil to move critical tools and payloads onto compromised Windows machines during security assessments. The tutorial also provides links to additional resources like the Windows-Exploit-Suggester tool to enhance your post-exploitation capabilities.
Syllabus
Post Exploitation - Transferring Files To Windows Targets
Taught by
HackerSploit