Video Description

This lesson covers keylogging with keyscan. In this lesson, participants receive step by step instructions in how to learn more about the victim's system such as what applications they are using and what their credentials are, what logins they use for other web sites. Using the meterpreter shell and the victim command, you can learn ways to escalate privileges.

Course Modules

Metasploit