Video Description

This lesson re-visits the main points of the module. This module covers reviews the main points of:

  • Information Gathering
  • Persistence and backdooring
  • Covering tracks
  • Password cracking

Course Modules

Post Exploitation Hacking

Instructed By

Instructor Profile Image
Joe Perry
Instructor