Myvideo

Guest

Login

Advanced Windows Recon Using the OMG Cable | HakByte

Uploaded By: Myvideo
1 view
0
0 votes
0

In today’s episode, we exfiltrate reconnaissance data from a Windows machine to a Dropbox account using only the OMG cable. The data includes Wi-Fi network names and passwords, system hardware, services running, open ports, and more. Payload used: Dropbox Apps: -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → Shop → Subscribe → Support → Contact Us → -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ ____________________________________________ Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.

Share with your friends

Link:

Embed:

Video Size:

Custom size:

x

Add to Playlist:

Favorites
My Playlist
Watch Later