Skip to main content

One post tagged with "Post-exploitation Enumeration"

The techniques used in cybersecurity for gathering additional information about a target system after successful intrusion, aiding attackers in escalating privileges or extracting sensitive data.

View All Tags

THM | Enumeration

· 13 min read

Red Teaming | Enumeration | Summary:

This room is designed to introduce learners to post-exploitation enumeration techniques within unknown corporate environments.

It covers both Linux and Windows systems, detailing various methods for gathering system information, identifying users, understanding networking configurations, and listing running services.

The room also explores DNS, SMB, and SNMP protocols, along with additional tools like Sysinternals Suite, Process Hacker, and GhostPack Seatbelt, specifically for Windows enumeration.