April 2018
Intermediate to advanced
176 pages
4h 16m
English
In this chapter, we'll mainly focus on exploiting vulnerable software in Windows and proceed to use different techniques within privilege escalation. Subsequently, we'll also create backdoors and cover our tracks. This chapter will give a general idea of how we can leverage the power of a Python script to our advantage.
The following topics will be covered in this chapter: