The Most Addictive Python and SQL Courses
PowerBI Data Analyst - Create visualizations and dashboards from scratch
Overview
Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Learn manual local enumeration techniques for Windows targets in this 20-minute video tutorial. Discover how to leverage built-in Windows commands and utilities to gather critical information during post-exploitation. Explore methods for enumerating user and group details, extracting system information, and determining the status of Windows Defender and Windows Firewall. Gain practical skills for effective reconnaissance and information gathering on compromised Windows systems to enhance your penetration testing and cybersecurity capabilities.
Syllabus
Windows Post Exploitation - Local Enumeration
Taught by
HackerSploit