August 2018
Intermediate to advanced
254 pages
6h 20m
English
In this chapter we covered various tools and techniques for getting access to our target system including cracking passwords, creating backdoors, exploiting services, and launching social engineering attacks.
Read now
Unlock full access