There are two ways to solve this. one of them using metasploit and it’s the easy one. so we will not using this one here. And will use powershell..
1. Enumeration:
- Nmap:
There are two ways to solve this. one of them using metasploit and it’s the easy one. so we will not using this one here. And will use powershell..