Top Commands Used in Windows (CMD) Hacking - Reconnaissance

Поділитися
Вставка
  • Опубліковано 20 лис 2020
  • In this video will be looking at how attackers use LOTL tactics in the reconnaissance phase.
    Attackers who use LOTL (Living off the Land) tactics use trusted off-the-shelf and preinstalled system tools to carry out their work. It might not be obvious, but there are more than 100 Windows system tools that can be used by cyber attackers for nefarious purposes.
    Tools discussed
    Ipconfig
    Systeminfo
    Net commands
    Netstat
    Tasklist
    Ping
    Wmic commands
    ▶️ 𝙇𝙊𝙇𝘽𝘼𝙎 𝙇𝙞𝙗𝙧𝙖𝙧𝙮
    lolbas-project.github.io
    The LOLBAS project aims to create and library of the tools and techniques used by the attacker.
    #CyberSecurity #Windows #Reconnaissance

КОМЕНТАРІ • 22

  • @j_white1305
    @j_white1305 2 роки тому

    Every video I watch of yours I learn several new things, this channel is a hidden gem, good stuff bud.

    • @HackeXPlorer
      @HackeXPlorer  2 роки тому

      Highly appreciate your comment, feedback like this keeps me motivated. Thank you very much 👍👍👏

  • @karthikeyanv3400
    @karthikeyanv3400 3 роки тому

    Again an excellent post with a lot of information for reconnaissance and elevation.

  • @ruthawele2102
    @ruthawele2102 3 роки тому

    awesome video, very informative and helpful. thank u so much mate!!

  • @shabeeb09
    @shabeeb09 3 роки тому +1

    awesome information, waiting for something related to Digital Forensics

  • @harshanharidasan1649
    @harshanharidasan1649 3 роки тому

    Wow 🔥 Waiting for next video already

  • @gayandushantha
    @gayandushantha 3 роки тому

    Good work bro!!

  • @cdm297
    @cdm297 3 роки тому

    Excellent videos. Love your content. Can you please share those slides too. It will help so much for note keeping. Thanks a lot once again.

  • @silentmodesec
    @silentmodesec 3 роки тому

    Awesome man 👍

  • @udaya1111
    @udaya1111 3 роки тому

    Awesome Bro

  • @munyaradzimunoz9536
    @munyaradzimunoz9536 2 роки тому

    Great content thank you

  • @vbarval
    @vbarval 3 роки тому

    Very Nice video Sir.

  • @muruga403
    @muruga403 3 роки тому

    Thanks for the useful tip

  • @oai9106
    @oai9106 3 роки тому +2

    Thanks

  • @witblack
    @witblack Рік тому

    I really love your videos. But I believe that Linux machines are better for cybersecurity jobs. Let's focus on Linux systems. That's better than virtualize Linux systems on Windows OS. (as an offer)

  • @damithsampath8898
    @damithsampath8898 3 роки тому

    👍