July 2018
Beginner
564 pages
12h 22m
English
So far, we have just been using commands and tools to gather information about the victim. Now, we will make use you information that we get from URLs the victims browses, also how we can analyze the files from the targets machine to which we have access to and what useful information we can gather through them. We will then see how to use the gathered information to launch attacks.