What would be your methodology in this case?

Hello, I'm trying to understand the methodology or workflow of people more experienced than me.

What would you do in this scenario:

HOST: Port 445 open along with other ports, Windows 7 2016 RDC

You need to get inside this to delete some logs or something

how would you get inside like, what would you use (rdcclient + metasploit for example) what would you look for (ports, other stuff) and what would you do once you get a foothold

Thanks to whoever will reply

Edit:typos

submitted by /u/SantoIsBack
[link] [comments]

from hacking: security in practice https://ift.tt/3sBHpPN

Comments