April 2018
Intermediate to advanced
176 pages
4h 16m
English
In this chapter, we've covered a wide range of topics ranging from bypassing firewalls to interacting with websites. We've performed these tasks after usage of various tools and different methodologies, which enabled us to attack the victim machine with our attacker machine or encrypt and decrypt our messages.
In this next chapter, we'll cover privilege escalations pertaining to weak service file permissions, preparing vulnerable software, breaching legitimate windows service via a backdoor, and creating a new admin account.