Don’t forget to subscribe and like the video for continued Cyber Security viewing!

In this video you will learn that although some administrators may restrict certain tools from being run by a user. No one is perfect and not all tools will be locked down. Here’s how to use the more obscure tools to read files, download/upload data and gain reverse shells.

~~~
This is an educational video, gain permission from target owners before attempting anything from this tutorial. By not doing so, you risk being penalised by the computer misuse act or equivalent in your country
~~~

GTFOBins: https://gtfobins.github.io/
LOLBAS: https://lolbas-project.github.io/

18 views

Leave a Reply

Your email address will not be published. Required fields are marked *