Overview
For this exercise, you will need the Kali, Windows 10, and Windows Server 2016 VMs open. You'll exploit a Windows system using a reverse TCP Trojan and then use the access to establish persistence and move laterally through the network.
For this exercise, you will need the Kali, Windows 10, and Windows Server 2016 VMs open. You'll exploit a Windows system using a reverse TCP Trojan and then use the access to establish persistence and move laterally through the network.