December 2020
Intermediate to advanced
304 pages
8h 57m
English
This chapter covers
In the last chapter, we discussed the three main components of Windows post-exploitation, which you will recall are the following:
Maintaining reliable re-entry
Harvesting credentials
Moving laterally
These are the same for Linux- or UNIX-based systems; the only difference is the techniques used to do them. A strong pentester is OS-agnostic. It doesn’t matter if you’re on a Windows machine, FreeBSD UNIX, CentOS Linux, or macOS. You should know enough about where to find credentials, ...