Advanced Windows Recon Using the OMG Cable | HakByte

In today’s episode, we exfiltrate reconnaissance data from a Windows machine to a Dropbox account using only the OMG cable. The data includes Wi-Fi network names and passwords, system hardware, services running, open ports, and more. Payload used: Dropbox Apps: -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ Our Site → Shop → Subscribe → Support → Contact Us → -----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆-----☆ ____________________________________________ Founded in 2005, Hak5’s mission is to advance the InfoSec industry. We do this through our award winning educational podcasts, leading pentest gear, and inclusive community – where all hackers belong.
Back to Top