Post-exploitation

Once we get an access to the system, we will see what we can do after we gain access to this computer, regardless of the method used to gained access to it. This could involve a server-side exploit, a client-side exploit, or even just physical access, where the victim leaves their desk and you get in. We're going look at what we can do once we have access to the target, how we can further exploit that target and increase our privileges, or target other computers in the same place.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.147.89.85