Did you know Cybrary's video training is FREE? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This lesson covers keylogging with keyscan. In this lesson, participants receive step by step instructions in how to learn more about the victim's system such as what applications they are using and what their credentials are, what logins they use for other web sites. Using the meterpreter shell and the victim command, you can learn ways to escalate privileges.