What do you do when you have shell?

I've spoken to a number of people about the techniques that they use when, during a penetration test or other computer security test, they get a command prompt | shell | backdoor | local command execution. It really depends upon what your testing goal is as to what you do after the shell.You looking to... Continue Reading →

A WordPress.com Website.

Up ↑

%d bloggers like this: