February 2018
Intermediate to advanced
396 pages
9h 38m
English
Finally, the penetration tester must clean up the compromised systems of any used scripts, binaries, new accounts, and configurations during the previous post-exploitation steps.
Read now
Unlock full access