anyone care to share their favorite post exploitation activities?
From ValSmith's Defcon talk I have
1. renable RDP
2. get a password/hash log into every box in the domain and do "something"
Student mentor, course developer & .mil red team member, Chris Gates will bring you a number of written and video tutorials.
Users browsing this forum: No registered users and 1 guest