AI, Data Science & Cloud Certificates from Google, IBM & Meta
Most AI Pilots Fail to Scale. MIT Sloan Teaches You Why — and How to Fix It
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Learn manual local enumeration techniques for Windows targets in this 20-minute video tutorial. Discover how to leverage built-in Windows commands and utilities to gather critical information during post-exploitation. Explore methods for enumerating user and group details, extracting system information, and determining the status of Windows Defender and Windows Firewall. Gain practical skills for effective reconnaissance and information gathering on compromised Windows systems to enhance your penetration testing and cybersecurity capabilities.
Syllabus
Windows Post Exploitation - Local Enumeration
Taught by
HackerSploit