Did you know Cybrary has FREE video training? Join more than 2,500,000 IT and cyber security professionals, students, career changers, and more, growing their careers on Cybrary.
This brief lesson discusses the usefulness which occurs after you have successfully exploited a system by impersonating other users. This tool is called incognito and it is built into the meterpretor shell as well as the metasploit framework. Participants learn step by step instructions in how to load incognito to add users to groups which exist and list all tokens.