How would you best get a reverse shell on a computer through a network? let’s say you’ve done your nmap scans etc. what vulnerabilities are you mainly looking for and what would be a few ways of “attacking” another computer on that network, with the goal of gaining a reverse shell or power shell?
[link] [comments]
from hacking: security in practice https://ift.tt/thBGA0u
Comments
Post a Comment