Source |
Hacking Articles |
Identifiant |
2432102 |
Date de publication |
2021-03-04 05:49:12 (vue: 2021-03-04 06:05:57) |
Titre |
File Transfer Cheatsheet: Windows and Linux |
Texte |
File transfer is considered to be one of the most important steps involved in Post Exploitation. So, today in this article we are going to highlight the several techniques which can be used by the pentester to transfer files to the victim machine( Windows and Linux Machine) Table of Contents
|
Envoyé |
Oui |
Condensat |
are article can cheatsheet: considered contents exploitation file files going highlight important involved linux machine most one pentester post several steps table techniques today transfer used victim which windows |
Tags |
|
Stories |
|
Notes |
|
Move |
|