August 2018
Intermediate to advanced
254 pages
6h 20m
English
In the previous chapter, we learned about privilege-escalation concepts along with practical escalation techniques.
In this chapter, we will be learning about maintaining access on a compromised system and cleaning up tracks using anti-forensic techniques. We will learn how to make persistent backdoors on the compromised system and use Metasploit's anti-forensic abilities to clear penetration trails.
We will cover the following topics in this chapter:
Read now
Unlock full access