May 2018
Intermediate to advanced
492 pages
10h 54m
English
Throughout this chapter, we covered post-exploitation in detail. We looked at post-exploitation scenarios, from basic to advanced. We also looked at privileged escalation in a Windows environment, and a couple of other advanced techniques.
Following are the exercises you should try on your own:
In the next chapter, we will make use of most of the post-exploitation tricks we covered in this chapter to circumvent and evade ...
Read now
Unlock full access