HackingSkills
5 min readAug 22, 2020

--

First: Software:-

Second: Vpn connection:

Third: Enumeration:-

Forth step:-Foothold:

Fifth:- Privilege Escalation:-

Sixth: Completed:-

--

--