Video Description

This lesson offers step by step instructions in how to re-establish a connection with the victim system. Participants learn how to establish a connection with a regular user account and how to escalate privileges to the other system account

Course Modules

Metasploit