DataPhreak Posted April 3, 2013 Share Posted April 3, 2013 Okay, so just about every guide or tutorial out there tells you to "Cover your tracks" and "Clean the logs" but never have I ever found a guide that tells you what you need to be cleaning after compromising a windows machine. If anyone has a guide on the topic, I'd love a link. Otherwise, lets assume a windows machine is compromised with meterpreter after a browser attack, we set up persistence, pass the hash, and pivot. Maybe take a shot from the webcam. Quote Link to comment Share on other sites More sharing options...
Join the conversation
You can post now and register later. If you have an account, sign in now to post with your account.