August 2018
Intermediate to advanced
254 pages
6h 20m
English
In this chapter, we learned various techniques to make persistent access to a compromised target. We also learned various methods to clear traces from the compromised system along with some of the anti-forensic abilities of the Metasploit framework.
In the next chapter, we will learn about the importance of correct vulnerability scoring.
Read now
Unlock full access