Top Commands Used in Windows (CMD) Hacking - Reconnaissance
Вставка
- Опубліковано 20 лис 2020
- In this video will be looking at how attackers use LOTL tactics in the reconnaissance phase.
Attackers who use LOTL (Living off the Land) tactics use trusted off-the-shelf and preinstalled system tools to carry out their work. It might not be obvious, but there are more than 100 Windows system tools that can be used by cyber attackers for nefarious purposes.
Tools discussed
Ipconfig
Systeminfo
Net commands
Netstat
Tasklist
Ping
Wmic commands
▶️ 𝙇𝙊𝙇𝘽𝘼𝙎 𝙇𝙞𝙗𝙧𝙖𝙧𝙮
lolbas-project.github.io
The LOLBAS project aims to create and library of the tools and techniques used by the attacker.
#CyberSecurity #Windows #Reconnaissance
Every video I watch of yours I learn several new things, this channel is a hidden gem, good stuff bud.
Highly appreciate your comment, feedback like this keeps me motivated. Thank you very much 👍👍👏
Again an excellent post with a lot of information for reconnaissance and elevation.
Thanks again Karthik
awesome video, very informative and helpful. thank u so much mate!!
awesome information, waiting for something related to Digital Forensics
Wow 🔥 Waiting for next video already
Coming soon, Thnakyou Harshan..
Good work bro!!
Excellent videos. Love your content. Can you please share those slides too. It will help so much for note keeping. Thanks a lot once again.
Awesome man 👍
Awesome Bro
Great content thank you
Very Nice video Sir.
Thanks and welcome Vineet.
Thanks for the useful tip
Happy to help Muvi , Thnakyou
Thanks
Thank you , and welcome
I really love your videos. But I believe that Linux machines are better for cybersecurity jobs. Let's focus on Linux systems. That's better than virtualize Linux systems on Windows OS. (as an offer)
👍
Thnak you buddy..