Summary

In this chapter, we learned various techniques to make persistent access to a compromised target. We also learned various methods to clear traces from the compromised system along with some of the anti-forensic abilities of the Metasploit framework.

In the next chapter, we will learn about the importance of correct vulnerability scoring.

..................Content has been hidden....................

You can't read the all page of ebook, please click here login for view all page.
Reset
3.145.115.195