Overview
Learn about the types of post-exploit activities that adversaries may engage in once they have breached the security of a target. You will use Metasploit to gain remote access to a Windows limited user account, perform post-exploit privilege escalation and other activities by using SYSTEM-level privileges, and hide files by using New Technology File System (NTFS) alternate data streams (ADS).
Learning Partner
Skillable
Ready-built content across a variety of topics and technologies