Don’t forget to subscribe and like the video for continued Cyber Security viewing!

In this video you will learn that although some administrators may restrict certain tools from being run by a user. No one is perfect and not all tools will be locked down. Here’s how to use the more obscure tools to read files, download/upload data and gain reverse shells.

This is an educational video, gain permission from target owners before attempting anything from this tutorial. By not doing so, you risk being penalised by the computer misuse act or equivalent in your country



Leave a Reply

Your email address will not be published. Required fields are marked *