July 2018
Beginner
564 pages
12h 22m
English
In this chapter, we focused on post exploitation tasks, which involved what can be done after we have broken into a target system. We covered basic filesystem commands and illustrated how to access a victim's machine, even if the user is not using a particular software or has powered off the system. We implemented both simple and advanced methods to maintain access to a system. Then, we looked at how to obtain user credentials after performing a keylogging attack on a target device. Later, we went over the concept of pivoting, which means targeting a system that is not directly present on our network. We even studied examples of pivoting autoroutes.
In the next few chapters, we will cover the fundamentals of website penetration testing. ...