Hello, I'm trying to understand the methodology or workflow of people more experienced than me.
What would you do in this scenario:
HOST: Port 445 open along with other ports, Windows 7 2016 RDC
You need to get inside this to delete some logs or something
how would you get inside like, what would you use (rdcclient + metasploit for example) what would you look for (ports, other stuff) and what would you do once you get a foothold
Thanks to whoever will reply
Edit:typos
[link] [comments]
from hacking: security in practice https://ift.tt/3sBHpPN
Comments
Post a Comment