Windows Meterpreterless Post Exploitation

Abstract

This write up will explore areas what an attacker can do with post exploitation techniques in scenarios where a normal windows shell is obtained instead of meterpreter shell

Publication
Exploit-DB Paper
Date
Links