Shared publicly  - 
Part 4: Post Exploit

This lecture teaches what to do after you break into a host. You'll learn how to interact with a host, browse files, steal keystrokes, kill programs, and use Metasploit's powerful post-exploitation modules. Armitage's logging features are covered as well.
Jean-Baptiste GIRAUD's profile photo
Add a comment...