List of Tools

  • Use port scanning and other techniques to find target machines in the network

  • Find open shares on target machines and abuse them

Last updated

Was this helpful?