Coming mid-July
Cybrary Reimagined.
People first, Security first.
Coming mid-July.
Cybrary Reimagined.
Celebrate Cybersecurity Awareness Month with our buy 2, get 1 offer!
People first, Security first.
Valid until October 31. Elevate your skills today!
Start for free

Perform Post-Exploit Activities

Learn about the types of post-exploit activities that adversaries may engage in once they have breached the security of a target. You will use Metasploit to gain remote access to a Windows limited user account, perform post-exploit privilege escalation and other activities by using SYSTEM-level privileges, and hide files by using New Technology File System (NTFS) alternate data streams (ADS).

Overview

Learn about the types of post-exploit activities that adversaries may engage in once they have breached the security of a target. You will use Metasploit to gain remote access to a Windows limited user account, perform post-exploit privilege escalation and other activities by using SYSTEM-level privileges, and hide files by using New Technology File System (NTFS) alternate data streams (ADS).

Learning Partner
Skillable
Skillable
Ready-built content across a variety of topics and technologies