Evasive Maneuvers and Post Exploitation
In this lab, you will (1) Use a port scanner to verify compliance with an existing egress policy, (2) Bypass the egress policy using a penetration-testing tool, (3) Gain real time access to a webmail session using a post-exploitation technique and (4) Demonstrate how it is possible to evade virus detection by Windows Defender.
Time
1 hour
Difficulty
Intermediate
Share
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or
Already have an account? Sign In »

Overview
In this lab, you will (1) Use a port scanner to verify compliance with an existing egress policy, (2) Bypass the egress policy using a penetration-testing tool, (3) Gain real time access to a webmail session using a post-exploitation technique and (4) Demonstrate how it is possible to evade virus detection by Windows Defender.
Learning Partner