Video Description

This lesson re-visits the main points of the module. This module covers reviews the main points of:

  • Information Gathering

  • Persistence and backdooring

  • Covering tracks

  • Password cracking

Course Modules

Post Exploitation Hacking