Video Description

This brief lesson discusses the usefulness which occurs after you have successfully exploited a system by impersonating other users. This tool is called incognito and it is built into the meterpretor shell as well as the metasploit framework. Participants learn step by step instructions in how to load incognito to add users to groups which exist and list all tokens.

Course Modules