Posted on Sunday, 3rd February 2019 by Michael

Part of my Path to OSCP series. I will be documenting my lab time to help others progress through the labs. Giving tips and encouragement along the way. Today I completed days 34 - 46 As of now I have compromised 25 machines in the 46 days I been in the lab. I have also completed all of the labs and exercises as well as completed my lab report.
In this video, we will review three great tools for windows post-enumeration exploitation (JAWS, Powerless.bat, Windows-exploit-suggester)

Tools:
Powerless: https://github.com/M4ximuss/Powerless
Windows Exploit Suggester: https://github.com/GDSSecurity/Windows-Exploit-Suggester
JAWS: https://github.com/411Hall/JAWS

Patreon:
Help create new content: https://www.patreon.com/join/2391355 .

Amazon store:
http://www.digitaloffensive.com/store

Social Media Contact:
Twitter: https://twitter.com/genxweb
LinkedIn: https://www.linkedin.com/in/michael-l…
YouTube: https://www.youtube.com/user/genxweb

Posted in OSCP | Comments (0)

Leave a Reply

*