Skip to Content
Learn Ethical Hacking from Scratch
book

Learn Ethical Hacking from Scratch

by Zaid Sabih
July 2018
Beginner
564 pages
12h 22m
English
Packt Publishing
Content preview from Learn Ethical Hacking from Scratch

Post Exploitation

In previous chapters, we covered how to access devices through the use of various techniques. We will now move on to the post exploitation task, which will focus on the Meterpreter session and how we can exploit a target system once we have gained access to it. Then, we will look at the basic filesystem commands that can help us to exploit a target system.

Hitherto in this book, we have accessed a targeted system only to the point that a victim has our backdoor file or software running on their system. Now, we will look at how to maintain our access to the system, through both simple and advanced methods. We will even cover what can be done after performing a keylogging attack. Then, we will look at the important concept ...

Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Learn Ethical Hacking From Scratch

Learn Ethical Hacking From Scratch

Zaid Sabih
Ethical Hacking Masterclass

Ethical Hacking Masterclass

SUNIL GUPTA (India), Sunil Gupta
Ethical Hacking

Ethical Hacking

Ric Messier
Ethical Hacking

Ethical Hacking

Daniel G. Graham

Publisher Resources

ISBN: 9781788622059Supplemental Content