Is there any post exploitation modules that can loosen the defense of the system #16243
Unanswered
flamecopper
asked this question in
General
Replies: 1 comment 1 reply
-
In short, |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Uh oh!
There was an error while loading. Please reload this page.
-
For example,
I am using the following, is there any of the same in metasploit?
netsh firewall set opmode disable
netsh advfirewall firewall add rule name="ICMP Allow incoming V4 echo request" protocol=icmpv4:8,any dir=in action=allow
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
Beta Was this translation helpful? Give feedback.
All reactions