December 2017
Intermediate to advanced
860 pages
16h 1m
English
This chapter will feature extended features and hardcore post exploitation. Throughout this chapter, we will focus on out-of-the-box approaches for post exploitation and will cover tedious tasks such as privilege escalation, getting passwords in clear text, finding juicy information, and much more.
During the course of this chapter, we will cover and understand the following key aspects:
Let's now jump into the post exploitation features of Metasploit and start with the basics in the next section.
Read now
Unlock full access