Overview
In this lab, you will (1) Use a port scanner to verify compliance with an existing egress policy, (2) Bypass the egress policy using a penetration-testing tool, (3) Gain real time access to a webmail session using a post-exploitation technique and (4) Demonstrate how it is possible to evade virus detection by Windows Defender.
Learning Partner
CYBRScore
Cybersecurity Technical Hands-on Labs