Advanced Windows Recon Using the OMG Cable | HakByte
In today’s episode, we exfiltrate reconnaissance data from a Windows machine to a Dropbox account using only the OMG cable. The data includes Wi-Fi network names and passwords, system hardware, services running, open ports, and more.
Payload used:
Dropbox Apps:
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
Our Site →
Shop →
Subscribe →
Support →
Contact Us →
-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆
____________________________________________
Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.