Lesson 10: Fundamentals of Evasion and Post Exploitation Techniques
This section is mostly to provide you additional references and requires that you already have the following:
- A vulnerable Windows machine.
- You have already used a successful exploit to get a foothold of the victim machine.
Maintaining persistence, pivoting, and data exfiltration.
- Watch this video(s) to refresh your memory of what you learned in class about maintaining persistence, pivoting, and data exfiltration.
Learn how to evade detection and cover your tracks.
- Watch this video to learn how to evade detection and cover your tracks.
Additional Reference!
FREE Offensive Security Metasploit training: Post Exploitation