Is there any post exploitation modules that can loosen the defense of the system #16243
Unanswered
flamecopper
asked this question in
General
Replies: 1 comment 1 reply
-
In short, |
Beta Was this translation helpful? Give feedback.
1 reply
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
For example,
I am using the following, is there any of the same in metasploit?
netsh firewall set opmode disable
netsh advfirewall firewall add rule name="ICMP Allow incoming V4 echo request" protocol=icmpv4:8,any dir=in action=allow
reg add "HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\Terminal Server" /v fDenyTSConnections /t REG_DWORD /d 0 /f
Beta Was this translation helpful? Give feedback.
All reactions