How Hackers Use netsh.exe For Persistence & Code Execution (Sliver C2)

9 ヵ月 2 ビュー
カテゴリー:
解説:
https://j-h.io/plextrac || Save time and effort on pentest reports with PlexTrac's premiere reporting & collaborative platform in a FREE one-month trial! https://j-h.io/plextrac 😎

My binnim tool: https://github.com/JohnHammond/binnim

Help the channel grow with a Like, Comment, & Subscribe!
❤️ Support ➡ https://j-h.io/patreonhttps://j-h.io/paypalhttps://j-h.io/buymeacoffee
Check out the affiliates below for more free or discounted learning!
🐱‍👤SEKTOR7 ➡ Malware Development, AV Evasion https://j-h.io/sektor7
🖥️ Zero-Point Security ➡ Certified Red Team Operator https://j-h.io/crto
💻Zero-Point Security ➡ C2 Development with C# https://j-h.io/c2dev
🐜Zero2Automated ➡ Ultimate Malware Reverse Engineering https://j-h.io/zero2auto
⛳Point3 ESCALATE ➡ Top-Notch Capture the Flag Training https://j-h.io/escalate
📗Humble Bundle ➡ https://j-h.io/humblebundle
🐶Snyk ➡ https://j-h.io/snyk

🌎Follow me! ➡ https://j-h.io/discordhttps://j-h.io/twitterhttps://j-h.io/linkedinhttps://j-h.io/instagramhttps://j-h.io/tiktok

📧Contact me! (I may be very slow to respond or completely unable to)
🤝Sponsorship Inquiries ➡ https://j-h.io/sponsorship
🚩 CTF Hosting Requests ➡ https://j-h.io/ctf
🎤 Speaking Requests ➡ https://j-h.io/speaking
💥 Malware Submission ➡ https://j-h.io/malware
❓ Everything Else ➡ https://j-h.io/etc