Abusing SSH for maintaining control on windows
I’m curious to how an attacker could install SSH on a windows server without a established RDP session. (Only cmd.exe shell)
Does anyone know of techniques or references to this?
Say an attacker has access to a windows ser… Continue reading Abusing SSH for maintaining control on windows