Living Off the Land : Scanning
- by Vince
-
in Blog
-
Hits: 1759
In an ideal world, we have access to all of our tools but things being what they are, eventually we will find ourselves in a situation where we our separated from our attacking server. Let's say you takeover a host and you need to enumerate from that host which doesn't even have Nmap? First we need to find targets and once we find targets, we need to enumerate each target.