April 2018
Intermediate to advanced
176 pages
4h 16m
English
In this chapter, we've learned the different ways to execute privilege escalation and exploit the vulnerabilities. We started with exporting a file to EXE and then moved to target a vulnerable software. After this, we initiated backdoor creation and subsequently covered our tracks to avoid detection.
In the next chapter, we'll deal with different types of encryption algorithms.