Lesson 10: Fundamentals of Evasion and Post Exploitation Techniques


This section is mostly to provide you additional references and requires that you already have the following:

  1. A vulnerable Windows machine.
  2. You have already used a successful exploit to get a foothold of the victim machine.

Maintaining persistence, pivoting, and data exfiltration.

  • Watch this video(s) to refresh your memory of what you learned in class about maintaining persistence, pivoting, and data exfiltration.

Learn how to evade detection and cover your tracks.


Additional Reference!

FREE Offensive Security Metasploit training: Post Exploitation

results matching ""

    No results matching ""